ClickFix: The Fake CAPTCHA That’s Tricking Employees

Laptop computer open in a darkened room, screen glowing with code suggesting a cybersecurity scenario

A social engineering technique called ClickFix is now the leading way cybercriminals break into organizations, and it asks nothing more from victims than pressing three keys on a keyboard. According to Microsoft’s 2025 Digital Defense Report, ClickFix has become the number one initial access method, responsible for 47% of all attacks observed by Microsoft Defender Experts, surpassing traditional phishing at 35%. If your security awareness training program has not yet addressed this technique, your employees are unprepared for one of the fastest-growing attack types in 2025 and 2026.

How a Fake CAPTCHA Becomes a Security Crisis

The attack begins on a compromised or malicious website. When an employee visits the page, they see what looks like a standard Cloudflare CAPTCHA verification prompt, the familiar “I’m not a robot” interface that millions of people encounter every day. But instead of a visual puzzle, the page instructs the user to press Windows Key + R, then Ctrl + V, and then Enter to “verify” they are human.

What the page does not reveal is that malicious JavaScript has already silently copied a PowerShell command to the user’s clipboard. When the employee follows the instructions, they paste and execute that command in Windows’ Run dialog, giving attackers immediate code execution on the machine. No suspicious email attachment. No file download warning. Just three keystrokes, and the attacker is in.

ESET’s H1 2025 Threat Report measured a 517% surge in ClickFix attacks over just six months. ClickFix builder kits are now sold on cybercriminal forums for as little as $200 per month, and evolving variants with names like FileFix, JackFix, and CrashFix continue to refine the technique to evade detection. In February 2026, compromised Chrome extensions were observed injecting ClickFix prompts disguised as fake Google Update alerts.

Why Employees Are the Intended Target

ClickFix succeeds because it exploits conditioned behavior. Employees have been trained to expect CAPTCHA verification when browsing the web. They see a security check and assume it is protecting them, not attacking them. The fake prompt is visually indistinguishable from the real Cloudflare interface, and because the attack runs entirely through the browser with no conventional file downloads, many endpoint security tools generate no alert.

The malware most commonly delivered through ClickFix, particularly the StealC infostealer, harvests browser credentials, session cookies, saved passwords, cryptocurrency wallets, and screenshots, exfiltrating everything to an attacker-controlled server. Because no suspicious file is written to disk in the traditional sense, detection is significantly harder than with standard phishing payloads.

This is also a highly scalable threat. Unlike targeted spear phishing, ClickFix campaigns are mass-distributed. Any organization running Windows workstations is a potential victim, and the low barrier to entry for attackers means campaigns can launch and spread quickly.

What Employees Need to Know Right Now

The most important thing employees can learn about ClickFix is a single rule: no legitimate CAPTCHA will ever ask you to press keyboard shortcuts or run a command. Cloudflare, Google, and every major verification provider present visual or audio challenges. None of them ask you to open a Run dialog or paste anything into a terminal. If a verification page asks you to do that, it is an attack.

Building this specific rule into employee training gives staff a concrete behavioral anchor. Rather than asking employees to identify technical indicators they may not understand, the message is simple enough to apply immediately in the moment. Research from Hoxhunt’s 2026 Phishing Trends Report found that organizations implementing behavior-change training achieved an 87% reduction in employees engaging with malicious content.

Employees should also know the response protocol: close the browser tab immediately, do not follow any instructions on the page, and notify IT or the security team right away. If an employee has already followed the prompts, immediate escalation is critical to contain the damage before credentials are exfiltrated.

What Security Teams Should Do Next

On the technical side, teams can reduce exposure by blocking PowerShell launched from Windows Run dialogs, applying application control policies such as WDAC or AppLocker, and monitoring for encoded PowerShell commands and unusual access to browser credential stores.

But ClickFix is fundamentally a human risk management problem. The attack was engineered specifically to bypass technical controls, which means the people layer is your most critical line of defense. Adding ClickFix to your phishing simulation exercises alongside realistic CAPTCHA-style scenarios gives employees the kind of hands-on practice that changes behavior, not just awareness scores.

ClickFix is a textbook example of why attackers continue to invest in social engineering over technical exploits: people remain a reliable entry point when training does not keep pace with threat evolution. Organizations that close that gap are consistently better positioned when attacks arrive.

Sources