{"id":36514,"date":"2025-07-03T23:08:09","date_gmt":"2025-07-03T23:08:09","guid":{"rendered":"https:\/\/www.europesays.com\/us\/36514\/"},"modified":"2025-07-03T23:08:09","modified_gmt":"2025-07-03T23:08:09","slug":"if-you-see-these-messages-on-your-pc-youre-being-hacked","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/us\/36514\/","title":{"rendered":"If You See These Messages On Your PC, You\u2019re Being Hacked"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.europesays.com\/us\/wp-content\/uploads\/2025\/07\/1751584089_665_960x0.jpg\" alt=\"Woman using computer\" data-height=\"2010\" data-width=\"3016\" style=\"position:absolute;top:0\"\/><\/p>\n<p class=\"color-body light-text\" role=\"button\">Do not become a ClickFix victim.<\/p>\n<p>getty<\/p>\n<p>Republished on July 3 with reports into a new attack with a different twist.<\/p>\n<p>There\u2019s a new attack \u201ctaking the threat landscape by storm,\u201d and it should have all PC users worried. \u201cWhile virtually nonexistent a year ago,\u201d this attack has surged to such an extent in recent months that it\u2019s now second only to <a class=\"color-link\" href=\"https:\/\/www.forbes.com\/sites\/zakdoffman\/2025\/05\/15\/do-not-click-this-message-just-10-minutes-to-hack-your-phone\/\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/sites\/zakdoffman\/2025\/05\/15\/do-not-click-this-message-just-10-minutes-to-hack-your-phone\/\" target=\"_self\" aria-label=\"phishing\" rel=\"noopener\">phishing<\/a> on the danger list.<\/p>\n<p>We\u2019re talking <a class=\"color-link\" href=\"https:\/\/www.forbes.com\/sites\/zakdoffman\/2025\/04\/21\/do-not-click-if-you-see-this-on-your-pc-its-an-attack\/\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/sites\/zakdoffman\/2025\/04\/21\/do-not-click-if-you-see-this-on-your-pc-its-an-attack\/\" target=\"_self\" aria-label=\"so-called ClickFix attacks\" rel=\"noopener\">so-called ClickFix attacks<\/a>, in which you are tricked into hacking your own PC when you follow on-screen instructions to fix a technical issue, open a secure file or website, or prove your human through a popup CAPTCHA challenge.<\/p>\n<p><a class=\"embed-base color-body color-body-border link-embed embed-3\" href=\"https:\/\/www.forbes.com\/sites\/zakdoffman\/2025\/06\/28\/porn-ban-warning-for-millions-of-iphone-and-android-users\/\" target=\"_blank\" aria-label=\"Porn Ban Warning For Millions Of iPhone And Android Users\" rel=\"noopener noreferrer\" data-ga-track=\"forbesEmbedly:https:\/\/www.forbes.com\/sites\/zakdoffman\/2025\/06\/28\/porn-ban-warning-for-millions-of-iphone-and-android-users\/\">ForbesPorn Ban Warning For Millions Of iPhone And Android UsersBy Zak Doffman<\/a><\/p>\n<p>The latest warning comes from <a class=\"color-link\" href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/eset-threat-report-h1-2025\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/www.welivesecurity.com\/en\/eset-research\/eset-threat-report-h1-2025\/\" aria-label=\"ESET\">ESET<\/a>, which says in its new <a class=\"color-link\" href=\"https:\/\/web-assets.esetstatic.com\/wls\/en\/papers\/threat-reports\/eset-threat-report-h12025.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/web-assets.esetstatic.com\/wls\/en\/papers\/threat-reports\/eset-threat-report-h12025.pdf\" aria-label=\"Threat Report\">Threat Report<\/a> that these attacks have now \u201cskyrocketed.\u201d That should maybe be no surprise, given the <a class=\"color-link\" href=\"https:\/\/www.forbes.com\/sites\/zakdoffman\/2024\/09\/21\/microsoft-windows-10-windows-11-warning-for-millions-of-pc-users\/\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/sites\/zakdoffman\/2024\/09\/21\/microsoft-windows-10-windows-11-warning-for-millions-of-pc-users\/\" target=\"_self\" aria-label=\"multiple warnings\" rel=\"noopener\">multiple warnings<\/a> that have been issued in recent months.<\/p>\n<p>But what should come as more of a surprise is that these attacks are still claiming countless victims, despite being so easy to detect and avoid \u2014 in theory at least.<\/p>\n<p class=\"color-body light-text\" role=\"button\">ClickFix attack<\/p>\n<p>Proofpoint<\/p>\n<p>ESET warns \u201cpayloads at the end of ClickFix attacks vary widely \u2013 from infostealers to ransomware and even to nation-state malware \u2013 making this a versatile and formidable threat.\u201d It targets different operating systems, but this is really a Windows PC threat.<\/p>\n<p>ClickFix always works by asking users to copy and paste text into a Run window, thus executing a script. That script can itself be dangerous, but more likely seems benign and actually downloads and runs the malicious script out of sight of the user.<\/p>\n<p class=\"color-body light-text\" role=\"button\">2025 Threat Report<\/p>\n<p>ESET<\/p>\n<p>\u201cBy the end of 2024,\u201d ESET says, \u201cattacks using the same social engineering technique flooded the web. Threat actors have been creating fake websites mimicking popular services \u2013 such as Booking.com or Google Meet \u2013 compromising legitimate websites with fake browser update prompts, fake Cloudflare verifications or reCAPTCHA checks, and distributing links leading to ClickFix pages via email campaigns.\u201d<\/p>\n<p class=\"color-body light-text\" role=\"button\">ClickFix attack.<\/p>\n<p>McAfee<\/p>\n<p>The ClickFix attack is just a shop window for multiple threats that will be installed on your device if you fall for that initial lure. \u201cThe list includes popular infostealers such as Lumma Stealer, VidarStealer, StealC, and Danabot; remote access trojans such as VenomRAT, AsyncRAT, and NetSupport RAT; remote monitoring and management tools such as MeshAgent; post-exploitation frameworks such as Havoc and Cobalt Strike; and cryptominers, loaders, clipboard hijackers, and much more.\u201d<\/p>\n<p>If you\u2019re not worried yet, then you should be. These attacks are varying rapidly. Hackers are seeking out new lures and testing what works best. The capability is also being farmed out to multiple groups with different malware to deploy. Recent attacks have even &#8220;attempted to deploy Interlock (formerly Rhysida) ransomware.\u201d<\/p>\n<p><a class=\"embed-base color-body color-body-border link-embed embed-4\" href=\"https:\/\/www.forbes.com\/sites\/zakdoffman\/2025\/06\/28\/microsofts-password-change-is-just-days-away-act-now\/\" target=\"_blank\" aria-label=\"Microsoft\u2019s Password Change Is Just Days Away\u2014Act Now\" rel=\"noopener noreferrer\" data-ga-track=\"forbesEmbedly:https:\/\/www.forbes.com\/sites\/zakdoffman\/2025\/06\/28\/microsofts-password-change-is-just-days-away-act-now\/\">ForbesMicrosoft\u2019s Password Change Is Just Days Away\u2014Act NowBy Zak Doffman<\/a><\/p>\n<p>If you ever see a message \u2014 <a class=\"color-link\" href=\"https:\/\/www.forbes.com\/sites\/zakdoffman\/2025\/05\/14\/if-you-see-this-serious-problem-on-your-pc-its-an-attack\/\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/sites\/zakdoffman\/2025\/05\/14\/if-you-see-this-serious-problem-on-your-pc-its-an-attack\/\" target=\"_self\" aria-label=\"however worded\" rel=\"noopener\">however worded<\/a> \u2014 asking you to press the Windows Key + \u201cR\u201d and then \u201cCtrl+V\u201d to paste and then \u201cEnter,&#8221; then your PC is being hacked. Period.<\/p>\n<p>Do none of those things. Escape or force exit the program. And then reboot your PC. If you think you have fallen into a ClickFix trap, run an antivirus scan on your PC and change all key account passwords. You should also check your financial accounts.<\/p>\n<p class=\"p1\">While ClickFix is synonymous with Windows, there\u2019s now a timely reminder that Mac users are also vulnerable to these tactics \u2014 being tricked into running a script on your device that seems to do one thing, when it\u2019s actually hacking you in the background.<\/p>\n<p class=\"p1\"><a href=\"https:\/\/www.sentinelone.com\/labs\/macos-nimdoor-dprk-threat-actors-target-web3-and-crypto-platforms-with-nim-based-malware\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/www.sentinelone.com\/labs\/macos-nimdoor-dprk-threat-actors-target-web3-and-crypto-platforms-with-nim-based-malware\/\" aria-label=\"SentinelOne\">SentinelOne<\/a> warn that North Korean hackers have been caught targeting victims with various malware payloads, which are installed on machines after users run a script that purports to be a Zoom update ahead of joining a scheduled call.<\/p>\n<p class=\"color-body light-text\" role=\"button\">\u201cClickFix\u201d Zoom lure<\/p>\n<p>SentinelOne<\/p>\n<p class=\"p1\">\u201cThe attack chain begins with a now-familiar social engineering vector: impersonation of a trusted contact over Telegram and inviting the target to schedule a meeting via Calendly. The target is subsequently sent an email containing a Zoom meeting link and instructions to run a so-called \u2018Zoom SDK update script\u2019.\u201d<\/p>\n<p class=\"p1\">While most ClickFix attacks are either wrapped in a tech support lure or a fake CAPTCHA challenge, we have seen multiple instances of users being asked to take actions to access a secure website or open a password protected document.<\/p>\n<p class=\"p1\">That fake Zoom script \u201cends with three lines of malicious code that retrieve and execute a second-stage script from a command-and-control server hosted at support.us05web-zoom[.]forum. This domain name format has been chosen for similarity to the legitimate Zoom meeting domain us05web.zoom[.]us.\u201d<\/p>\n<p><a class=\"embed-base color-body color-body-border link-embed embed-7\" href=\"https:\/\/www.forbes.com\/sites\/zakdoffman\/2025\/07\/03\/google-play-store-warning-find-and-delete-all-apps-on-this-list\/\" target=\"_blank\" aria-label=\"Google Play Store Warning\u2014Find And Delete All Apps On This List\" rel=\"noopener noreferrer\" data-ga-track=\"forbesEmbedly:https:\/\/www.forbes.com\/sites\/zakdoffman\/2025\/07\/03\/google-play-store-warning-find-and-delete-all-apps-on-this-list\/\">ForbesGoogle Play Store Warning\u2014Find And Delete All Apps On This ListBy Zak Doffman<\/a><\/p>\n<p class=\"p1\">Once installed on the user\u2019s Mac, the malware is designed to root our and steal credentials from Arc, Brave, Firefox, Google Chrome and Microsoft Edge browsers, again highlighting the vulnerability in saving passwords in browsers.<\/p>\n<p class=\"p1\">Beyond that, different malware payloads can be tasked with different outcomes. SentinelOne says this shows how threat actors will continually \u201cintroduce new levels of complexity for analysts.\u201d As ever, the teams says, \u201cin the cat-and-mouse game of threat and threat detection, when one side innovates, the other must respond.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"Do not become a ClickFix victim. getty Republished on July 3 with reports into a new attack with&hellip;\n","protected":false},"author":3,"featured_media":36515,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[29822,6486,29821,29823,158,67,132,68,29824,29825,6483],"class_list":{"0":"post-36514","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-technology","8":"tag-clickfix-attack","9":"tag-microsoft-delete-passwords","10":"tag-pc-attack","11":"tag-pc-warning","12":"tag-technology","13":"tag-united-states","14":"tag-unitedstates","15":"tag-us","16":"tag-windows-10-support","17":"tag-windows-11-upgrade-free","18":"tag-windows-warning"},"share_on_mastodon":{"url":"https:\/\/pubeurope.com\/@us\/114791822406505103","error":""},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/posts\/36514","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/comments?post=36514"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/posts\/36514\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/media\/36515"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/media?parent=36514"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/categories?post=36514"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/tags?post=36514"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}