BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
Threat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /ClickFix Campaign Expands to Target Cryptocurrency Wallets and 25+ Browsers

ClickFix Campaign Expands to Target Cryptocurrency Wallets and 25+ Browsers

February 22, 2026Malware & Threats2 min readmedium

Originally reported by Hackread

#infostealer#clickfix#cryptocurrency#browser-attacks#social-engineering#powershell
Share

TL;DR

CyberProof researchers document ClickFix operation's expansion into cryptocurrency theft, using fake captchas to deploy infostealers across 25+ browsers and MetaMask wallets.

Why medium?

This represents an evolution of an existing threat campaign targeting valuable assets like crypto wallets, but lacks indicators of mass exploitation or critical infrastructure impact.

Campaign Evolution

CyberProof researchers have documented a significant expansion of the ClickFix operation, with threat actors now targeting cryptocurrency assets alongside traditional browser data theft. The campaign leverages fake captcha verification pages to socially engineer users into executing malicious PowerShell commands that deploy sophisticated infostealers.

Target Profile

The updated ClickFix campaign specifically targets:

  • Cryptocurrency wallets including MetaMask and other browser-based wallet extensions
  • 25+ browser variants across major families (Chrome, Firefox, Edge, Safari variants)
  • Gaming platform accounts for potential credential theft and virtual asset harvesting
  • Browser-stored credentials and session tokens

Attack Methodology

The social engineering component remains consistent with previous ClickFix operations - users encounter what appears to be a legitimate captcha verification system. When users attempt to "verify" their human status, they are presented with instructions to copy and execute PowerShell commands, ostensibly to resolve a technical issue.

Once executed, the PowerShell payload deploys an infostealer capable of:

  • Extracting browser profiles and stored credentials
  • Harvesting cryptocurrency wallet data and private keys
  • Collecting gaming platform authentication tokens
  • Establishing persistence mechanisms for continued access

Cryptocurrency Focus

The targeting of MetaMask and other browser-based cryptocurrency wallets represents a notable evolution in the ClickFix operation's scope. Browser extension wallets store sensitive cryptographic material that, when compromised, provides direct access to victim cryptocurrency holdings without requiring additional authentication factors.

Detection Considerations

Security teams should monitor for:

  • PowerShell execution following web browser activity
  • Unusual browser extension access patterns
  • Cryptocurrency wallet application launches outside normal user patterns
  • Network connections to known ClickFix infrastructure

Sources

  • https://hackread.com/clickfix-attack-crypto-wallets-browsers-infostealer/

Originally reported by Hackread

Tags

#infostealer#clickfix#cryptocurrency#browser-attacks#social-engineering#powershell

Related Intelligence

  • Compromised QuickLens Chrome Extension Deploys Crypto-Stealing Malware via ClickFix Tactics

    mediumMar 1, 2026
  • MacSync Malware Campaign Hijacks Google Ads and Impersonates Claude AI

    mediumFeb 17, 2026
  • Velvet Tempest Links Termite Ransomware to ClickFix CastleRAT Campaign

    highMar 8, 2026

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Massive Sybil Attack Cripples I2P Network with 700,000 Hostile Nodes

Next Article

Supply Chain Worms and State-Sponsored Malware: Weekend Threat Roundup →