Beware of New ClickFix Attacks: Fake Chrome Extensions Crash Browsers to Install Malware

Learn how to protect yourself from the latest ClickFix variant that crashes browsers and installs malware.

Beware of New ClickFix Attacks: Fake Chrome Extensions Crash Browsers to Install Malware
Andrew Wallace

Andrew Wallace

Professional Tech Editor

Focuses on professional-grade hardware, software, and enterprise solutions.

  • New ClickFix variant uses fake NexShield ad blocker to spread malware
  • Attack crashes browsers, then tricks users into installing ModeloRAT via command prompt
  • KongTuke targets enterprises; individuals may face future risks

ClickFix attacks are evolving, creating real issues to resolve rather than merely deceiving victims. Experts warn that these attacks now involve actual browser crashes.

Previously, ClickFix would manifest as pop-ups or misleading documents, prompting users to 'fix' a non-existent problem by executing a command in the Windows Run program. Unfortunately, this would lead to malware installation.

Crashing the Browser

The latest variant involves a counterfeit ad-blocking browser add-on for Chrome and Edge named NexShield. Developed by a threat actor known as KongTuke, this scheme includes fake sites mimicking browser repositories, with malware even appearing in official stores. It falsely claims to be created by Raymond Hill, the developer of uBlock Origin, a legitimate ad blocker with millions of users.

To avoid detection, the malicious activity begins an hour after installation. The malware generates a denial-of-service (DoS) condition that crashes the browser, forcing users to restart it via Task Manager.

Upon restarting, the add-on presents a fake error message and, in typical ClickFix style, offers a 'solution.' This involves copying a command into Windows Command Prompt, which subsequently downloads and installs ModeloRAT, a remote access trojan that provides full access to the compromised device.

Security researchers at Huntress, who identified the attack, report that KongTuke primarily targets enterprise users, but individuals may also be at risk in the future.

Via BleepingComputer

React to this story

Related Posts