Query Details
// ClickFix social engineering attack detection // https://www.proofpoint.com/us/blog/threat-insight/security-brief-clickfix-social-engineering-technique-floods-threat-landscape // Threat actors are increasingly using 'ClickFix' social engineering attacks to deploy malware. Proofpoint's latest analysis reveals multiple campaigns since March 2024, targeting popular software like Microsoft Word and Google Chrome. Malware such as AsyncRAT, Danabot, DarkGate, Lumma Stealer, and NetSupport have been identified. DeviceEvents | where (ActionType == "GetClipboardData" and InitiatingProcessFileName has "powershell.exe") or (InitiatingProcessCommandLine has "powershell" and InitiatingProcessCommandLine has "-enc")
This KQL (Kusto Query Language) query is designed to detect potential "ClickFix" social engineering attacks, which are used by threat actors to deploy malware. The query focuses on identifying suspicious activities related to the use of PowerShell, a common tool used in such attacks. Specifically, it looks for:
GetClipboardData) by a process initiated by "powershell.exe".The query is part of a broader effort to identify and mitigate threats involving malware like AsyncRAT, Danabot, DarkGate, Lumma Stealer, and NetSupport, which have been associated with these types of attacks.

Steven Lim
Released: November 20, 2024
Tables
Keywords
Operators