  {"id":2,"date":"2020-04-10T00:33:16","date_gmt":"2020-04-10T10:33:16","guid":{"rendered":"https:\/\/www.hawaii.edu\/testinfosec\/?page_id=2"},"modified":"2026-02-13T14:00:58","modified_gmt":"2026-02-14T00:00:58","slug":"home","status":"publish","type":"page","link":"https:\/\/www.hawaii.edu\/infosec\/","title":{"rendered":"index"},"content":{"rendered":"<h2>Get Started By Clicking On A Link Below:<\/h2>\n<div class=\"container pt-3\">\n<div class=\"row\">\n<div class=\"col-sm\" align=\"center\">\n            <a href=\"resources-tips\/personal-security-checklist\/\"><i class=\"fa fa-4x fa-list-ol\" aria-hidden=\"true\"><\/i><br \/>\n\t\t\t<strong>Start Here! Personal Security Checklist<\/strong><\/a>\n        <\/div>\n<div class=\"col-sm-4\" align=\"center\">\n           <a href=\"working-remotely\/\"><i class=\"fa fa-4x fa-home\" aria-hidden=\"true\"><\/i><br \/>\n\t\t\t<strong>Working Remotely<\/strong><\/a>\n        <\/div>\n<div class=\"col-sm-4\" align=\"center\">\n           <a href=\"https:\/\/www.hawaii.edu\/askus\/1758\"><i class=\"fa fa-4x fa-lock\" aria-hidden=\"true\"><\/i><br \/>\n\t\t\t<strong>Setup MFA<\/strong> <i class=\"fa fa-external-link\" aria-hidden=\"true\"><\/i><\/a>\n        <\/div>\n<\/p><\/div>\n<div class=\"row\">\n<div class=\"col-sm-4\" align=\"center\">\n            <a href=\"https:\/\/www.hawaii.edu\/username\/\"><i class=\"fa fa-4x fa-cogs\" aria-hidden=\"true\"><\/i><br \/>\n\t\t\t<strong>Reset Your Âé¶¹´«Ã½Account Password<\/strong> <i class=\"fa fa-external-link\" aria-hidden=\"true\"><\/i><\/a>\n        <\/div>\n<div class=\"col-sm\" align=\"center\">\n            <a href=\"resources-tips\/mobile-device-security\/\"><i class=\"fa fa-4x fa-mobile\" aria-hidden=\"true\"><\/i><br \/>\n\t\t\t<strong>Protect Your Mobile Device<\/strong><\/a>\n        <\/div>\n<div class=\"col-sm\" align=\"center\">\n            <a href=\"phishing\/\"><i class=\"fa fa-4x fa-envelope-o\" aria-hidden=\"true\"><\/i><br \/>\n\t\t\t<strong>Learn About Phishing<\/strong><\/a>\n        <\/div>\n<\/p><\/div>\n<div class=\"row\">\n<div class=\"col-sm-4\" align=\"center\">\n            <a href=\"https:\/\/www.hawaii.edu\/infosec\/assets\/sentinelone\/\"><i class=\"fa fa-4x fa-laptop\" aria-hidden=\"true\"><\/i><br \/>\n\t\t\t<strong>Secure Your Computer: SentinelOne<\/strong> <i class=\"fa fa-external-link\" aria-hidden=\"true\"><\/i><\/a>\n        <\/div>\n<div class=\"col-sm\" align=\"center\">\n           <a href=\"https:\/\/www.hawaii.edu\/askus\/892\"><i class=\"fa fa-4x fa-shield\" aria-hidden=\"true\"><\/i><br \/>\n\t\t\t<strong>If Your Account is Compromised&#8230;<\/strong> <i class=\"fa fa-external-link\" aria-hidden=\"true\"><\/i><\/a>\n        <\/div>\n<div class=\"col-sm\" align=\"center\">\n            <a href=\"https:\/\/www.hawaii.edu\/filedrop\/\"><i class=\"fa fa-4x fa-folder-open\" aria-hidden=\"true\"><\/i><br \/>\n\t\t\t<strong>Âé¶¹´«Ã½Filedrop<\/strong> <i class=\"fa fa-external-link\" aria-hidden=\"true\"><\/i><\/a>\n        <\/div>\n<\/p><\/div>\n<\/div>\n<p><!--INSERT NEW HOME PAGE TOPIC HERE--><\/p>\n<h2>Think Before You Click! Beware of New ClickFix Attacks<\/h2>\n<h3>What is ClickFix?<\/h3>\n<p>ClickFix is a new technique used by cyber criminals that uses dialogue boxes containing messages that attempt to trick you into copy, pasting, and running malicious commands on your device. ClickFix typically involves giving instructions to fix technical issues, solve CAPTCHAs, or provide \u201cverification\u201d that involve clicking prompts and copying, pasting, and running commands directly on your system. ClickFix is often delivered via malicious websites, pop-up advertisements, or even through real websites that have been compromised by a cyber criminal. In some cases, ClickFix can also be delivered through targeted email \/ attachments. The goal of this article is to help you recognize a ClickFix attack and prevent yourself from falling victim to cyber criminals.<\/p>\n<h3>How to identify a ClickFix attack?<\/h3>\n<p>ClickFix attacks typically begin with the display of a message that requires a &#8220;quick fix&#8221; to common computer issues such as performance issues, missing drivers, updates, or other pop-up errors. The image below shows an example of a Windows Update related ClickFix. In this example, note that the messaging requires you to take action on your computer by opening up the Windows run prompt (denoted by the Windows icon + R) and pasting with Ctrl + V. Once the content is pasted, the cyber criminal has successfully compromised your system!<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.hawaii.edu\/infosec\/wp-content\/uploads\/sites\/24\/2026\/01\/click_fix_update-1024x598.png\" alt=\"\" width=\"640\" height=\"374\" class=\"aligncenter size-large wp-image-2555\" srcset=\"https:\/\/www.hawaii.edu\/infosec\/wp-content\/uploads\/sites\/24\/2026\/01\/click_fix_update-1024x598.png 1024w, https:\/\/www.hawaii.edu\/infosec\/wp-content\/uploads\/sites\/24\/2026\/01\/click_fix_update-300x175.png 300w, https:\/\/www.hawaii.edu\/infosec\/wp-content\/uploads\/sites\/24\/2026\/01\/click_fix_update-768x448.png 768w, https:\/\/www.hawaii.edu\/infosec\/wp-content\/uploads\/sites\/24\/2026\/01\/click_fix_update.png 1257w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/p>\n<p>Another common way that a ClickFix attack is delivered is through a fake verification such as a CAPTCHA (i.e. verify you are human prompt). Instead of clicking on matching images or typing obscured text, the website will ask you to open the Windows run prompt and paste content with Ctrl + v.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.hawaii.edu\/infosec\/wp-content\/uploads\/sites\/24\/2026\/01\/click_fix_captcha.png\" alt=\"\" width=\"936\" height=\"480\" class=\"aligncenter size-full wp-image-2554\" srcset=\"https:\/\/www.hawaii.edu\/infosec\/wp-content\/uploads\/sites\/24\/2026\/01\/click_fix_captcha.png 936w, https:\/\/www.hawaii.edu\/infosec\/wp-content\/uploads\/sites\/24\/2026\/01\/click_fix_captcha-300x154.png 300w, https:\/\/www.hawaii.edu\/infosec\/wp-content\/uploads\/sites\/24\/2026\/01\/click_fix_captcha-768x394.png 768w\" sizes=\"auto, (max-width: 936px) 100vw, 936px\" \/><\/p>\n<p>With both delivery methods, the ClickFix attack requires you to paste content from the internet on your computer. In the example below, the pasted content directly leads to a computer compromise<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.hawaii.edu\/infosec\/wp-content\/uploads\/sites\/24\/2026\/01\/click_fix_compromise-1024x337.png\" alt=\"\" width=\"640\" height=\"211\" class=\"aligncenter size-large wp-image-2556\" srcset=\"https:\/\/www.hawaii.edu\/infosec\/wp-content\/uploads\/sites\/24\/2026\/01\/click_fix_compromise-1024x337.png 1024w, https:\/\/www.hawaii.edu\/infosec\/wp-content\/uploads\/sites\/24\/2026\/01\/click_fix_compromise-300x99.png 300w, https:\/\/www.hawaii.edu\/infosec\/wp-content\/uploads\/sites\/24\/2026\/01\/click_fix_compromise-768x253.png 768w, https:\/\/www.hawaii.edu\/infosec\/wp-content\/uploads\/sites\/24\/2026\/01\/click_fix_compromise.png 1113w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/p>\n<p><strong>Always be aware of the content that you copy and paste and never paste content in your command line, terminal, Windows PowerShell, or Windows Run dialogue (Win + R)!<\/strong><\/p>\n<h3>Are there other forms of ClickFix?<\/h3>\n<p>Cyber criminals are constantly coming up with new ways to trick you into granting them access to your computer and your personal data. With the increased use of anti-malware software, cyber criminals often rely on you to bypass your own security measures. By pasting content directly into your system, cyber criminals take advantage of your authorization to gain access. Aside from using the Windows run dialogue, cyber criminals may also trick you into pasting content into the command line directly. For Mac users, ClickFix attacks may mention the Mac Terminal. A newer technique uses Windows file explorer as a way to deliver the malicious scripts as shown below, also known as &#8220;FileFix&#8221;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.hawaii.edu\/infosec\/wp-content\/uploads\/sites\/24\/2026\/01\/file_fix-1024x533.png\" alt=\"Screenshot of FileFix variation of ClickFix attack.\" width=\"640\" height=\"333\" class=\"aligncenter size-large wp-image-2557\" srcset=\"https:\/\/www.hawaii.edu\/infosec\/wp-content\/uploads\/sites\/24\/2026\/01\/file_fix-1024x533.png 1024w, https:\/\/www.hawaii.edu\/infosec\/wp-content\/uploads\/sites\/24\/2026\/01\/file_fix-300x156.png 300w, https:\/\/www.hawaii.edu\/infosec\/wp-content\/uploads\/sites\/24\/2026\/01\/file_fix-768x400.png 768w, https:\/\/www.hawaii.edu\/infosec\/wp-content\/uploads\/sites\/24\/2026\/01\/file_fix-1536x799.png 1536w, https:\/\/www.hawaii.edu\/infosec\/wp-content\/uploads\/sites\/24\/2026\/01\/file_fix.png 1620w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/p>\n<p>In all cases, the cyber criminals will trick you into pasting content into your computer, so it is important to recognize this threat and never paste any un-trusted content anywhere on your system!<\/p>\n<p><strong>For more resources and tips, visit <a href=\"https:\/\/www.hawaii.edu\/infosec\/resources-tips\/\">https:\/\/www.hawaii.edu\/infosec\/resources-tips\/<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Get Started By Clicking On A Link Below: Start Here! Personal Security Checklist Working Remotely Setup MFA Reset Your Âé¶¹´«Ã½Account Password Protect Your Mobile Device Learn About Phishing Secure Your Computer: SentinelOne If Your Account is Compromised&#8230; Âé¶¹´«Ã½Filedrop &hellip; <\/p>\n","protected":false},"author":82,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.hawaii.edu\/infosec\/wp-json\/wp\/v2\/pages\/2","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hawaii.edu\/infosec\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.hawaii.edu\/infosec\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.hawaii.edu\/infosec\/wp-json\/wp\/v2\/users\/82"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hawaii.edu\/infosec\/wp-json\/wp\/v2\/comments?post=2"}],"version-history":[{"count":132,"href":"https:\/\/www.hawaii.edu\/infosec\/wp-json\/wp\/v2\/pages\/2\/revisions"}],"predecessor-version":[{"id":2624,"href":"https:\/\/www.hawaii.edu\/infosec\/wp-json\/wp\/v2\/pages\/2\/revisions\/2624"}],"wp:attachment":[{"href":"https:\/\/www.hawaii.edu\/infosec\/wp-json\/wp\/v2\/media?parent=2"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}