BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
CIPHER
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
CIPHERThreat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
β€’
Β© 2026
β€’
blacktemple.net
  1. Feed
  2. /ClickFix Campaign Evolution: Drive Mapping, VPN Spoofing, and Developer-Targeted Attacks

ClickFix Campaign Evolution: Drive Mapping, VPN Spoofing, and Developer-Targeted Attacks

March 18, 2026Data Breaches & Incidents2 min readmedium

Originally reported by Hackread

#clickfix#social-engineering#infostealer#malware#storm-2561#macsync#vpn-spoofing
Share

TL;DR

Security researchers have identified an evolution in ClickFix social engineering attacks, with new variants mapping attacker-controlled network drives, Storm-2561 using fake Fortinet/Ivanti VPN sites to distribute Hyrax infostealer, and MacSync malware targeting developers via fraudulent Claude AI extensions.

Why medium?

Multiple active social engineering campaigns using sophisticated techniques to deliver infostealers and malware, including Microsoft-tracked threat actor Storm-2561. While no confirmed mass exploitation, the campaigns target high-value victims including developers.

ClickFix Attacks Evolve Beyond Browser Fixes

Social engineering campaigns leveraging the ClickFix technique have expanded their technical arsenal, moving beyond simple browser troubleshooting lures to more sophisticated attack vectors targeting different user populations.

Drive Mapping Variant Emerges

Researchers have documented a new ClickFix variant that tricks Windows users into executing hidden PowerShell commands that map attacker-controlled network drives. This technique allows threat actors to establish persistent access to victim systems while appearing to resolve legitimate technical issues.

The attack leverages users' trust in technical support workflows, presenting fake error messages that prompt victims to run "diagnostic" commands that actually establish connections to malicious infrastructure.

Storm-2561 Spoofs Enterprise VPN Providers

Microsoft Defender Experts identified Storm-2561, a threat actor using fake Fortinet and Ivanti VPN login portals to distribute Hyrax infostealer malware. The campaign, active since mid-January 2026, targets organizations by spoofing legitimate VPN infrastructure.

The attack chain begins with convincing replica sites of popular enterprise VPN solutions. Users attempting to authenticate are instead served malware payloads designed to harvest credentials and system information.

MacSync Targets Developers Through AI Tool Spoofing

7AI security researchers documented a Claude Fraud campaign deploying MacSync malware against software developers. The attack uses fraudulent browser extensions claiming to enhance Claude AI functionality, distributed through malicious Google advertisements.

The campaign specifically targets tech professionals by exploiting the growing adoption of AI development tools. Fake extensions appear in search results for legitimate Claude AI utilities, leading developers to install information-stealing malware disguised as productivity enhancements.

Attack Pattern Analysis

These campaigns demonstrate the continued evolution of social engineering techniques, with threat actors adapting to target specific professional groups and leveraging emerging technology trends. The ClickFix methodology has proven effective enough to warrant expansion into new technical domains.

The combination of drive mapping, VPN spoofing, and AI tool impersonation represents a sophisticated understanding of different user trust models and technical environments.

Sources

  • https://hackread.com/clickfix-scam-users-mapping-hacker-controlled-drives/
  • https://hackread.com/storm-2561-fake-fortinet-ivanti-vpn-sites-hyrax-infostealer/
  • https://hackread.com/clickfix-attack-devs-macsync-malware-fake-claude-tools/

Originally reported by Hackread

Tags

#clickfix#social-engineering#infostealer#malware#storm-2561#macsync#vpn-spoofing

Tracked Companies

πŸ‡ΊπŸ‡ΈGoogle

Related Intelligence

  • Weekly Security Roundup: Teramind Phishing Campaign Targets Remote Workers

    mediumMar 2, 2026
  • CISA Flags Active Exploitation While New Ransomware Tactics and AI Shadow Operations Emerge

    criticalMar 17, 2026
  • Weekly Security Roundup: Banking Trojan Targets Brazil, Iranian Hackers Hit Healthcare Giants, HR Under Attack

    highMar 12, 2026

Related Knowledge

  • DFIR & Threat Hunting Deep Training β€” CIPHER Knowledge Base

    dfir
  • Digital Forensics Artifacts β€” Deep Dive Reference

    dfir
  • CIPHER Incident Response Playbooks β€” Operational Reference

    dfir

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Credential Theft Surge, Ransomware Evolution, and AI Security Risks Shape Threat Landscape