Connect with us

Technology

ClickFix malware tricks you into infecting your own Windows PC

Published

on

ClickFix malware tricks you into infecting your own Windows PC

ClickFix is a social engineering trick that hackers have been using more and more since early 2024 to spread malware.

It fools you into running malicious commands on your own computer, and the attack is now more common than ever. Hackers are getting people to install password-stealing malware by making them press a series of keyboard shortcuts, all under the pretense of proving they’re not bots. 

Bots are automated computer programs that perform repetitive tasks online, often mimicking human behavior. By tricking you into proving they’re not bots, hackers exploit your lack of understanding about these automated systems to make you unwittingly install malware.

STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS – SIGN UP FOR KURT’S THE CYBERGUY REPORT NOW

A person working on a laptop (Kurt “CyberGuy” Knutsson)

Advertisement

What you need to know

As reported by KrebsOnSecurity, the latest ClickFix campaign tricks you into installing password-stealing malware under the guise of a routine “Verify You Are a Human” test. Initially seen in targeted attacks, it has now gone mainstream, affecting industries like hospitality and healthcare.

The scam begins when you visit a hacked or malicious website and see a fake CAPTCHA-style prompt. Clicking the “I’m not a robot” button triggers a set of instructions asking you to press specific keyboard shortcuts. First, you are told to press Windows + R, which opens the Windows Run dialog. Then you are instructed to press CTRL + V, which pastes a malicious script copied from the website’s virtual clipboard. If you press enter, a script is executed that downloads and runs malware. 

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Cybercriminals are using phishing emails and malicious websites to spread ClickFix. The hospitality industry has been heavily targeted, with attackers impersonating Booking.com and sending fake emails referencing guest reviews or promotions. Clicking on links in these emails directs you to a ClickFix trap. Healthcare workers have also been targeted, with malicious code embedded into the widely used physical therapy site HEP2go. 

Once ClickFix is on your PC, it installs various types of malware, including password stealers like XWorm, Lumma Stealer and DanaBot, which extract your login credentials and financial information. Some versions deliver remote access trojans like VenomRAT and AsyncRAT, giving attackers full control over your system. Others deploy NetSupport RAT, a remote access tool commonly misused for cyber espionage.

Advertisement

Executing this series of keypresses prompts Windows to download password-stealing malware. (KrebsOnSecurity)

THE HIDDEN COSTS OF FREE APPS: YOUR PERSONAL INFORMATION 

Previous ClickFix attacks

Security researchers believe ClickFix has been targeting people since March 2024. I reported on the malware back in June 2024 when it posed as fake Google Chrome, Word and OneDrive errors to trick users into downloading harmful code. Just like in the current campaign, attackers prompted victims to click a button that copied a PowerShell “fix” to the clipboard, then paste and run it in a Run dialog or PowerShell prompt.

By November 2024, attackers had expanded their targets to Google Meet users. The scam started with an email containing a link to a Google Meet session, often disguised to appear as if it were from the victim’s organization. This link leads to an invite for a meeting, webinar or online collaboration. Clicking the link directed the victim to a fake Google Meet page, which displayed a warning claiming there was an issue with their PC, such as problems with their microphone, camera or headset.

The attack was also seen in fake Chrome error pages and Facebook login prompts, further spreading the malware across different platforms and increasing its reach.

Advertisement

This malware attack pretends to be a CAPTCHA intended to separate humans from bots. (KrebsOnSecurity)

OUTSMART HACKERS WHO ARE OUT TO STEAL YOUR IDENTITY

6 ways you can stay safe from ClickFix malware

To protect yourself from the evolving threat of ClickFix malware, which continues to target users through sophisticated social engineering tactics, consider implementing these six essential security measures.

1. Be skeptical of CAPTCHA prompts: Legitimate CAPTCHA tests never require you to press Windows + R, copy commands or paste anything into PowerShell. If a website instructs you to do this, it’s likely a scam. Close the page immediately and avoid interacting with it.

2. Don’t click links from unverified emails and use strong antivirus software: Many ClickFix attacks start with phishing emails that impersonate trusted services like Booking.com or Google Meet. Always verify the sender before clicking on links. If an email seems urgent or unexpected, go directly to the company’s official website instead of clicking any links inside the email.

Advertisement

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

3. Enable two-factor authentication: Enable two-factor authentication whenever possible. This adds an extra layer of security by requiring a second form of verification, such as a code sent to your phone, in addition to your password.

4. Keep devices updated: Regularly updating your operating system, browser and security software ensures you have the latest patches against known vulnerabilities. Cybercriminals exploit outdated systems, so enabling automatic updates is a simple but effective way to stay protected.

5. Monitor your accounts for suspicious activity and change your passwords: If you’ve interacted with a suspicious website, phishing email or fake login page, check your online accounts for any unusual activity. Look for unexpected login attempts, unauthorized password resets or financial transactions that you don’t recognize. If anything seems off, change your passwords immediately and report the activity to the relevant service provider. Also, consider using a password manager to generate and store complex passwords. Get more details about my best expert-reviewed password managers of 2025 here.

Advertisement

6. Invest in personal data removal service: Consider using a service that monitors your personal information and alerts you to potential breaches or unauthorized use of your data. These services can provide early warning signs of identity theft or other malicious activities resulting from ClickFix or similar attacks. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

MASSIVE SECURITY FLAW PUTS MOST POPULAR BROWSERS AT RISK ON MAC

Kurt’s key takeaway

ClickFix is a reminder that malware doesn’t always rely on complex exploits. It often just needs you to follow the wrong instructions. Attackers are refining their methods, making scams like fake CAPTCHAs, phishing emails and deceptive pop-ups more convincing than ever. The best way to stay ahead is to question anything that seems even slightly off. If a website asks you to run commands or paste something into PowerShell, it’s a red flag. If an email pressures you into clicking a link, verify it first.

Do you think tech companies are doing enough to stop malware like ClickFix? Let us know by writing us at Cyberguy.com/Contact.

Advertisement

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Advertisement

Copyright 2025 CyberGuy.com. All rights reserved.

Technology

It’s amazing how good Alienware’s $350 OLED monitor is

Published

on

It’s amazing how good Alienware’s 0 OLED monitor is

I’ve recommended several OLED gaming monitors to readers over the years, and I’ve finally taken my own advice to buy one. Alienware’s new 27-inch 1440p QD-OLED has all the features that I want and a low $350 price that was too tempting to ignore.

The AW2726DM model has five things that make it stand out for the price: a 1440p QD-OLED screen with lush contrast, a fast 240Hz refresh rate, a semi-glossy screen coating to enhance details, a low-profile design without flashy RGB LEDs, and a great warranty (three years with coverage for burn-in).

I’ve been using Alienware’s new monitor for a couple days, and I’ve already spent hours with it playing Marathon. It was my first opportunity to see Bungie’s new first-person extraction shooter in its full HDR glory, and I can never go back. Switching on HDR wasn’t automatic, though it already looked so much better than my IPS panel without being activated.

Enabling it transformed how Marathon looked for the better, but made everything else about the OS look pretty washed-out. It’s a Windows issue, not an Alienware issue. It’s easy to enable HDR every time I launch a game and disable it afterward with the Windows + Alt + B keyboard shortcut, but unfortunately triggers HDR for all connected displays. This includes my IPS monitor that imbues everything with a terrible gray hue when HDR is on. So, using the system settings is the best way to adjust HDR for just the QD-OLED.

I landed on this QD-OLED after having spent a ton of time researching pricier models. The unanimous takeaway from reviewers was that LG’s Tandem RGB WOLED panels are some of the brightest out there, but also tend to exhibit lousy gray uniformity in dark scenes. QD-OLED monitors, on the other hand, offer slightly better contrast than WOLED and don’t suffer from those same uniformity issues. However, blacks sometimes appear as dark purple in bright rooms on QD-OLED panels, meaning they’re ideal for rooms that don’t have a bunch of light bouncing around.

Advertisement

There’s no perfect choice, and honestly I got tired of doing research, so I jumped in with the cheapest OLED. I’m glad that I did. Shopping for an OLED gaming monitor can be hard, but it can also be this easy. AOC makes a model that’s discounted to $339.99 at the time of publishing, and its specs are comparable.

As expected, the AW2726DM isn’t a cutting-edge monitor. Its QD-OLED panel isn’t as fast or as bright as some other pricier options, and it doesn’t have USB ports for connecting accessories. Considering its low price, it’s easy for me to overlook those omissions. I’d have a much harder time accepting them in a pricier display.

The fact that I mostly use my computer for text-based work at The Verge is what prevented me from upgrading to an OLED monitor. My 1440p IPS monitor is bright, it’s good at showing text clearly, and it has a fast refresh rate for gaming. Alienware’s QD-OLED is less bright, and some might be bothered by how text looks (I have to really squint to see the slight fringing from this QD-OLED’s subpixel layout). But I have a life outside of work, which includes playing a lot of PC games. That’s the slice of myself I bought this monitor for, and I’m so happy I did.

Photography by Cameron Faulkner / The Verge

Advertisement
Continue Reading

Technology

Michael and Susan Dell surpass $1 billion in donations backing AI-driven hospital project

Published

on

Michael and Susan Dell surpass  billion in donations backing AI-driven hospital project

NEWYou can now listen to Fox News articles!

Billionaire Michael Dell and his wife, Susan Dell, have become the first donors to give more than $1 billion to the University of Texas at Austin, funding a massive new medical research campus and hospital system powered by artificial intelligence.

The couple’s latest investment includes a $750 million gift to help build the UT Dell Medical Center, a planned “AI-native” hospital expected to open in 2030 as part of a more than 300-acre advanced research campus.

University officials said the project will integrate research, clinical care and advanced computing to improve early disease detection, personalize treatment and expand access to care in the rapidly growing Austin region.

The Dells’ support builds on decades of contributions to UT, including funding for its medical school, scholarships and research programs.

Advertisement

EXCLUSIVE: REPUBLICANS IN KEY RED STATE LAUNCH CAMPAIGN TO ELECT ‘TRUE’ CONSERVATIVES AHEAD OF TRUMP RETURN

Michael Dell and Susan Dell attend the Breakthrough Prize ceremony as they become the first to donate more than $1 billion to the University of Texas at Austin. ( Craig T Fruchtman/WireImage)

“By bringing together medicine, science and computing in one campus designed for the AI era, UT can create more opportunity, deliver better outcomes, and build a stronger future for communities across Texas and beyond,” Michael Dell and Susan Dell said.

The gift ranks among the largest in the history of higher education, alongside major contributions like Phil Knight’s $2 billion pledge to Oregon Health & Science University and Michael Bloomberg’s $1.8 billion donation to Johns Hopkins University.

The new UT Dell Medical Center will be developed in collaboration with MD Anderson Cancer Center, integrating cancer care into a system designed to connect prevention, diagnosis and treatment.

Advertisement

AI IS RUNNING THE CLASSROOM AT THIS TEXAS SCHOOL, AND STUDENTS SAY ‘IT’S AWESOME’

The University of Texas at Austin campus at sunset. (iStock)

“We will deliver better outcomes for patients by providing research-driven cancer care that is precise, compassionate and hope-filled,” Peter WT Pisters, president of UT MD Anderson, said.

Officials said the facility will be built from the ground up to incorporate AI, rather than retrofitting older infrastructure — an approach they say could transform how hospitals operate.

Independent experts have cautioned that AI in health care can introduce risks if not carefully validated. A widely cited study published in the journal Science by researchers at the University of California, Berkeley and the University of Chicago found that a commonly used healthcare algorithm underestimated the needs of Black patients due to biased training data, highlighting broader concerns about equity in AI-driven systems.

Advertisement

The project also includes funding for undergraduate scholarships, student housing and the Texas Advanced Computing Center, where officials are developing one of the nation’s most powerful academic supercomputers.

TURNING POINT USA BACKS TRUMP ACCOUNTS PROGRAM WITH ‘DOLLAR-FOR-DOLLAR MATCH’ FOR ELIGIBLE EMPLOYEE NEWBORNS

Artificial intelligence technology is expected to play a key role in diagnosis and patient care at the planned UT Dell Medical Center. (iStock)

Texas Gov. Greg Abbott said the investment will help position the state as a national leader in healthcare innovation.

“Texas already dominates in technology, energy and business, and now we will further cement our leadership in health care innovation as well,” Abbott said.

Advertisement

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

The university said it plans to break ground on the medical center later this year and has launched a broader campaign to raise $10 billion over the next decade.

The Associated Press contributed to this report.

Continue Reading

Technology

SpaceX cuts a deal to maybe buy Cursor for $60 billion

Published

on

SpaceX cuts a deal to maybe buy Cursor for  billion

SpaceX and Cursor are now working closely together to create the world’s best coding and knowledge work AI.

The combination of Cursor’s leading product and distribution to expert software engineers with SpaceX’s million H100 equivalent Colossus training supercomputer will allow us to build the world’s most useful models.

Cursor has also given SpaceX the right to acquire Cursor later this year for $60 billion or pay $10 billion for our work together.

Continue Reading
Advertisement

Trending