#1703812: Analyzing ClickFix: The browser-based technique behind infostealer breaches

Description: ClickFix, FileFix, fake CAPTCHA — whatever you call it, attacks where users interact with malicious scripts in their web browser are a fast-growing source of security breaches.

Most commonly, these attacks are used to deliver remote access software, infostealer malware, and keyloggers, using stolen session cookies and credentials to facilitate attacks on business apps and services. From there, the attacker simply dumps the data and holds the victim to ransom for its deletion — often dropping ransomware afterwards for double the extortion.

Join Luke Jennings, VP R&D at Push Security, to learn about:

How malicious copy & paste attacks work
Why they’re evading detection controls during both delivery & execution
Real-world attack examples showcasing the different attack variants
The future of malicious copy & paste techniques and payloads
What security teams can do to improve detection and response
We’re running multiple sessions for different timezones, so select the one that best suits you. Register for your spot now!
More info: https://pushsecurity.com/webinar/clickfix

Date added Sept. 21, 2025, 9:51 p.m.
Source push security
Subjects
  • ClickFix Phishing Campaign
  • Infostealer / Info-Stealer / infostealer Malware
  • PodCasts / Webcast / Webinar / eSummit / Virtual Event etc.
Venue Oct. 23, 2025, midnight - Oct. 23, 2025, midnight