What Is a ClickFix Attack? What Security Teams Need to Teach Users

How ClickFix attacks work, why they’re difficult to spot, what security teams are seeing in the field, and how to train users to recognize and report them.

Post hero image

Table of contents

See Hoxhunt in action
Drastically improve your security awareness & phishing training metrics while automating the training lifecycle.
Get a Demo
Updated
April 15, 2026
Written by
Mette Luntama
Fact checked by

What is a ClickFix attack?

A ClickFix attack is a social engineering technique where attackers trick a user into running a system command to “fix” a problem that does not actually exist. Instead of delivering malware directly, the attacker convinces the user to execute it themselves.

The attack typically begins with a phishing email, malicious advertisement, or compromised website. After clicking a link, the user is taken to a page that looks legitimate, but displays a fake issue that must be resolved before continuing. These pages often appear as familiar prompts such as verification checks, update requests, or access errors.

Instead of completing a normal verification step inside the browser, the page instructs the user to perform a system level action, such as opening the Run dialog or launching tools like PowerShell. In a ClickFix attack, the user becomes the installer.

It’s important to note that while many public examples use Windows shortcuts, ClickFix is not limited to Windows. Recent campaigns have also targeted macOS users by instructing them to paste commands into Terminal or other local tools.

If a webpage asks the user to leave the browser and run a command on their computer to continue, it is not a verification but an attack.

How a ClickFix attack works

Figure 1: How a ClickFix attack works

Classic method: Windows Run dialog (Win + R)

A common variation of ClickFix uses the Windows Run dialog to execute malicious commands (Figure 2). Once the user reaches the malicious page, the attacker attempts to convince them to execute a command on their own computer. The page displays a message that appears legitimate, often claiming that human verification is required, access is blocked, a session has expired, or a security check has failed. Instead of asking the user to click images or check a box like in a regular verification flow, the page instructs them to take a system-level action (Figure 1).

Typical instructions include:

Press Windows + R to open the Run dialog
Press Ctrl + V to paste a command
Press Enter to execute it

Security check ClickFix
Figure 2: Security check ClickFix

Some malicious pages automatically copy a command to the clipboard, while others display the command for the user to copy manually. When the command is pasted and executed, it often launches a built-in system tool such as PowerShell and retrieves additional code from the internet.

From there, attackers may steal credentials, install remote access tools, establish persistence on the device, or deliver additional malware payloads. Unlike traditional phishing, the malware is not delivered as a file attachment. Instead, the attacker guides the user into executing the command themselves.

Emerging variation: Windows Terminal (Win + X)

In February 2026, Microsoft identified a ClickFix campaign introducing a new variation that replaces the traditional Run dialog (Win + R) with Windows Terminal (Figure 3). The change helps attackers bypass detections specifically tuned to suspicious activity launched from the Run dialog. In this variation, instead of opening the Run dialog, the malicious page instructs the user to:

Press Windows + X to open the Power User menu
Press I to launch Windows Terminal
Press Ctrl + V to paste a command
Press Enter to execute it

Emerging variant - Windows Terminal
Figure 3: Emerging variant - Windows Terminal (Win + X)

Because Windows Terminal is a legitimate system tool commonly used for administration and development tasks, the instructions may appear less suspicious to the user.

Regardless of the command or system tool used, the core tactic remains the same: the attacker convinces the user to execute malicious code on their own computer.

Common ClickFix scenarios

ClickFix attacks often appear as common troubleshooting or verification prompts. The following examples (Figures 4-6) illustrate some of the scenarios users may encounter.

Fake human verification

Human verification ClickFix
Figure 4: Human verification ClickFix

Fake browser or system update

Figure 5:  Browser update ClickFix

Document or portal error

Video portal error ClickFix
Figure 6: Video portal error ClickFix

Why are ClickFix attacks dangerous?

ClickFix attacks exploit a gap between technical defenses and normal user behavior. Most security controls are designed to detect malicious files, suspicious links, or exploit activity. However, in ClickFix attacks, the user launches legitimate system tools themselves. Because tools like PowerShell are commonly used for legitimate administration, the activity may appear normal to security systems.

The attack works by turning a routine troubleshooting behavior into a malware delivery mechanism. The approach is particularly effective in environments where users are encouraged or expected to work independently and resolve issues quickly. When the priority is to keep work moving, instructions that appear to fix a problem may be followed without additional verification.

How to defend against ClickFix attacks

ClickFix attacks often succeed because of gaps across three areas: user awareness, organizational processes, and technical controls.

User awareness

Users may interpret the prompt as a normal part of their workflow. A ClickFix often presents a verification step, update request, or access issue; all elements that are common in daily work. Thus, the instructions to proceed may not immediately appear unusual.

Training should clearly define the boundary between browser based verification and operating system level actions. Public websites do not require users to open the Run dialog, launch PowerShell, or execute commands to verify access.

Organizational processes

When users encounter unexpected instructions, they may not know how to verify them. If reporting channels are unclear or escalation paths are not easy to access, users may follow the instructions rather than pause and ask for help.

Organizations should provide simple reporting mechanisms and reinforce that pausing to verify is encouraged and supported.

Technical controls

ClickFix attacks frequently rely on legitimate system utilities such as PowerShell or the Windows Run dialog. These tools are signed, widely used, and often permitted in normal workflows. As a result, the activity can resemble legitimate behavior rather than traditional malware execution.

Where operationally appropriate, organizations can reduce risk by limiting unnecessary scripting capabilities for standard users, monitoring command execution that originates from browsers, and restricting system-level execution rights that are not required for a user's role.

What to teach users

The most effective defense against ClickFix is helping users recognize the behavioral pattern behind the attack. Users should remember a simple rule: Websites do not require system commands to verify access.

If a webpage asks you to open the Run dialog, launch PowerShell or Terminal, or paste and execute a command, stop and verify before proceeding. Verification steps should always stay inside the browser. System commands belong to administrators and trusted internal processes.

How Hoxhunt helps organizations prepare

Hoxhunt helps organizations prepare for threats like ClickFix through phishing training and simulations based on relevant real-world attack techniques. This helps users recognize suspicious prompts, understand the difference between normal browser-based verification and unusual requests to run local system commands, and report attacks before they progress.

Hoxhunt also gives security leaders visibility into reporting behavior and response patterns, helping them understand where additional support or reinforcement is needed.

Want to learn more?
Be sure to check out these articles recommended by the author:
Get more cybersecurity insights like this