Comprehensive Threat Exposure Management Platform
The ClickFix campaign represents a sophisticated shift in cyber-attack methodologies, turning legitimate, trusted websites into silent launchpads for advanced malware delivery. First seen in February 2026, this operation targets the Higher Education and Financial Services sectors globally, specifically focusing on the Windows platform. The attack culminates in the deployment of MIMICRAT (also known as AstarionRAT), a highly evasive Remote Access Trojan (RAT) that conceals its command-and-control (C2) traffic within normal web analytics data to bypass traditional security monitoring.
The infection begins not with attacker-controlled servers, but by compromising legitimate sites, such as a Bank Identification Number (BIN) validation service and an Indian mutual fund investment platform. These sites are injected with malicious JavaScript that mimics a Cloudflare verification page, tricking users into executing a PowerShell command directly from their clipboard — a technique that bypasses browser security controls as no file is technically downloaded.
The attack follows a rigorous five-stage chain:
amsiInitFailed to true, as these are high-fidelity indicators of advanced malware./intake/organizations/events or /discover/pcversion/metrics.| Tactic | Technique | Sub-technique |
|---|---|---|
| Initial Access | T1189: Drive-by Compromise | T1566.003: Spearphishing via Service |
| Execution | T1204: User Execution | T1204.001: Malicious Link, T1059.001: PowerShell |
| Defense Evasion | T1562: Impair Defenses | T1562.001: Disable or Modify Tools |
| Privilege Escalation | T1134: Access Token Manipulation | T1134.001: Token Impersonation/Theft |
| Command and Control | T1071: Application Layer Protocol | T1071.001: Web Protocols |
SHA256 Hashes:
bcc7a0e53ebc62c77b7b6e3585166bfd7164f65a8115e7c8bda568279ab4f6f15e0a30d8d91d5fd46da73f3e6555936233d870ac789ca7dd64c9d3cc74719f51IPv4 Addresses:
45[.]13[.]212[.]251, 45[.]13[.]212[.]250, 23[.]227[.]202[.]114Domains:
xmri[.]network, wexmri[.]cc, d15mawx0xveem1[.]cloudfront[.]netURLs:
hxxp[:]//www[.]investonline[.]in/js/jq[.]phpGet through updates and upcoming events, and more directly in your inbox