ClickFix Malware Campaign Now Hits Linux

by | May 13, 2025 | News




Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon
Reading Time: 3 Minutes

APT36 Launches Cross-Platform ClickFix Attacks, Now Targeting Linux Users

The threat group known as APT36 (aka Transparent Tribe) has launched a new ClickFix campaign targeting all major desktop operating systems—Windows, Linux, and macOS—with tailored social engineering techniques to deliver malware.

What is ClickFix?

ClickFix is a social engineering technique that tricks users into manually executing malicious commands via Run dialogs or terminal windows. These attacks often masquerade as application errors, CAPTCHAs, or verification prompts, leading unsuspecting users to run malware payloads themselves.

ClickFix attacks have previously been observed targeting Windows users, often prompting them to run PowerShell or MSHTA commands that lead to info-stealers or ransomware infections. In 2024, similar tactics expanded to macOS, using fake Google Meet errors to deliver malware.


New Linux-Focused Attack Flow

In a new campaign observed by Hunt.io, APT36 is now leveraging ClickFix against Linux users. The threat actors are using a malicious website impersonating India’s Ministry of Defence, with a fake press release used as bait.

Malicious website mimicking India's Ministry of DefenceMalicious website mimicking India’s Ministry of Defence
Source: Hunt.io

Once a visitor lands on the site, their operating system is fingerprinted to serve a tailored attack path:

  • Windows users are redirected to a full-screen warning about content restrictions. Clicking “Continue” copies a malicious MSHTA command to the clipboard, which the user is instructed to paste into a terminal window. This command runs a .NET loader, displaying a decoy PDF while silently connecting to a command-and-control (C2) server.

  • Linux users see a CAPTCHA page that copies a shell command to their clipboard after clicking the “I’m not a robot” button. The victim is then instructed to open the Run dialog (ALT+F2), paste the command, and execute it.

Instructions for Linux usersInstructions for Linux users
Source: Hunt.io

See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses




Discover your weakest link. Be proactive, not reactive. Cybercriminals need just one flaw to strike.

Technical Breakdown

For Linux targets, the current attack command drops a shell script named mapeal.sh, which:

  • Downloads a JPEG image from the attacker-controlled domain trade4wealth[.]in

  • Opens the image in the background

Hunt.io researchers emphasize that no persistence, lateral movement, or data exfiltration was observed, suggesting that APT36 may be testing the effectiveness of this infection chain before deploying active payloads.

“The script downloads a JPEG image from the same trade4wealth[.]in directory and opens it in the background,” noted Hunt.io.
“No additional activity was observed during execution.”

Nonetheless, replacing the image with a weaponized script is trivial and may be a matter of timing.

Linux ClickFix scriptLinux ClickFix script
Source: BleepingComputer


Implications

This expansion to Linux is a clear sign of the evolution and growing versatility of ClickFix tactics. By adapting social engineering strategies to each OS’s user behavior, attackers increase their chances of infection—especially against less technically aware users on platforms typically considered secure.

APT36 continues to focus its campaigns around Indian government targets and infrastructure, using legitimate-looking websites and localized lures to improve the credibility of their attacks.




Recommendations

  • Do not paste commands from unfamiliar websites into Run dialogs or terminals—even if they appear to come from official sources.

  • System administrators should warn users, especially in high-risk sectors, about these types of attacks.

  • Use endpoint detection and response (EDR) and web filtering solutions that can detect or block suspicious clipboard activity and malicious domains.

Are u a security researcher? Or a company that writes articles about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing? If you want to express your idea in an article contact us here for a quote: [email protected]

Source: bleepingcomputer.com

Source Link

Merch

Recent News

EXPLORE OUR STORE

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This