New ClickFix attack deploys Havoc C2 via Microsoft Sharepoint – BleepingComputer


Published on: 2025-03-03

Intelligence Report: New ClickFix attack deploys Havoc C2 via Microsoft Sharepoint – BleepingComputer

1. BLUF (Bottom Line Up Front)

A newly identified phishing campaign, dubbed ClickFix, is exploiting Microsoft SharePoint to deploy the Havoc post-exploitation framework. This campaign uses social engineering tactics to trick users into executing malicious PowerShell commands, leading to remote device compromise. The attack leverages legitimate cloud services to evade detection, posing significant risks to corporate networks.

2. Detailed Analysis

The following structured analytic techniques have been applied for this analysis:

Analysis of Competing Hypotheses (ACH)

The ClickFix campaign likely aims to infiltrate corporate networks for data exfiltration and lateral movement. The use of Havoc suggests a focus on maintaining long-term access and control over compromised systems.

SWOT Analysis

  • Strengths: Utilizes legitimate cloud services to blend malicious traffic with normal network activity.
  • Weaknesses: Relies on user interaction, which could be mitigated through awareness training.
  • Opportunities: Potential for widespread deployment across various sectors due to the use of common platforms like SharePoint.
  • Threats: Increased risk of data breaches and network compromise, particularly in organizations with inadequate cybersecurity measures.

Indicators Development

Key indicators of the ClickFix campaign include unexpected PowerShell command prompts, unusual SharePoint activity, and increased network traffic to Microsoft Graph API endpoints.

3. Implications and Strategic Risks

The ClickFix campaign poses significant risks to national security and economic interests by potentially compromising sensitive data and disrupting critical infrastructure. The use of legitimate cloud services complicates detection and mitigation efforts, increasing the likelihood of successful attacks.

4. Recommendations and Outlook

Recommendations:

  • Enhance user awareness training to recognize and avoid phishing attempts.
  • Implement advanced threat detection systems to monitor for unusual cloud service activity.
  • Strengthen regulatory frameworks to address the misuse of legitimate cloud services for malicious purposes.

Outlook:

In the best-case scenario, increased awareness and improved security measures will mitigate the impact of the ClickFix campaign. In the worst-case scenario, widespread adoption of similar tactics could lead to significant data breaches and financial losses. The most likely outcome involves a continued evolution of phishing tactics, necessitating ongoing vigilance and adaptation by cybersecurity professionals.

5. Key Individuals and Entities

The report mentions significant individuals and organizations involved in the discovery and analysis of the ClickFix campaign, including Fortinet FortiGuard Labs. No specific roles or affiliations are provided for individuals.

New ClickFix attack deploys Havoc C2 via Microsoft Sharepoint - BleepingComputer - Image 1

New ClickFix attack deploys Havoc C2 via Microsoft Sharepoint - BleepingComputer - Image 2

New ClickFix attack deploys Havoc C2 via Microsoft Sharepoint - BleepingComputer - Image 3

New ClickFix attack deploys Havoc C2 via Microsoft Sharepoint - BleepingComputer - Image 4