Cybercriminals Utilize ClickFix Tactic and Fake CAPTCHA Pages to Distribute CORNFLAKE.V3 Backdoor

August 21, 2025
Malware / Cryptocurrency

Threat actors have been observed employing the ClickFix social engineering tactic to disseminate a versatile backdoor known as CORNFLAKE.V3. Google-owned Mandiant reported this activity, identified as UNC5518, as part of an access-as-a-service scheme that utilizes fake CAPTCHA pages to entice users into granting initial system access, which is subsequently monetized by other threat groups. “The initial infection method, referred to as ClickFix, involves tricking users on compromised websites into copying and executing a malicious PowerShell script through the Windows Run dialog,” Google detailed in a report released today. Access provided by UNC5518 is believed to be exploited by at least two distinct hacking groups, UNC5774 and UNC4108, to launch a multi-stage infection process and introduce additional payloads. UNC5774, another financially motivated group, employs CORNFLAKE to deploy various subsequent payloads. UNC4108, also a threat actor…

Cybercriminals Exploit ClickFix Strategy to Distribute CORNFLAKE.V3 Backdoor via Fake CAPTCHA Pages

On August 21, 2025, cybersecurity experts reported a notable tactic employed by cybercriminals involving the deployment of a versatile backdoor, known as CORNFLAKE.V3, through a method termed ClickFix. This strategy was detailed by Mandiant, a subsidiary of Google, which classified the activity under the moniker UNC5518. This operation is part of a broader access-as-a-service scheme, where adversaries utilize fraudulent CAPTCHA pages to entice users into inadvertently granting access to their systems, subsequently monetized by various hacking factions.

According to Google’s report, the ClickFix infection vector primarily targets users visiting compromised sites. Upon accessing these malicious platforms, victims are encouraged to download and execute a harmful PowerShell script via the Windows Run dialog box. This approach not only exploits human psychology but also showcases a sophisticated level of social engineering, highlighting the risks associated with online interactions.

The initial access acquired by UNC5518 has reportedly been exploited by at least two distinct hacking groups: UNC5774 and UNC4108. These adversaries leverage the access to orchestrate a multi-stage infection process, introducing additional malicious payloads. Notably, UNC5774, identified as financially driven, employs the CORNFLAKE backdoor to facilitate the deployment of various subsequent threats, while UNC4108 has a separate operational agenda tied to its own nefarious goals.

Analyzing this incident through the lens of the MITRE ATT&CK Matrix reveals potential tactics and techniques employed during the attack. The ClickFix strategy clearly falls under the “Initial Access” tactic, where adversaries manipulate user behavior to infiltrate systems. This method integrates social engineering techniques along with potential execution vulnerabilities that can be capitalized upon within the Windows operating environment. Furthermore, the ongoing manipulation and exploitation of access might suggest efforts aimed at establishing persistence and privilege escalation within compromised networks.

Given the intricacies of modern cyber threats, businesses must remain vigilant against such sophisticated tactics. The use of deceptive methods like fake CAPTCHA pages is becoming increasingly prevalent, serving as a reminder that maintaining cybersecurity hygiene is more critical than ever. Organizations are encouraged to educate their employees about these risks and to implement robust security measures to mitigate potential breaches.

As the landscape of cybercrime continues to evolve, understanding the methodologies behind attacks like those orchestrated by UNC5518 is essential for business owners. By staying informed and proactive, organizations can better safeguard their systems against the growing threats posed by well-organized cybercriminals. In the face of such sophisticated strategies, collaboration between security professionals and stakeholders is imperative to navigate the complexities of the cybersecurity terrain effectively.

Source link