Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    I tried 0patch as a last resort for my Windows 10 PC – here’s how it compares to its promises

    January 20, 2026

    A PC Expert Explains Why Don’t Use Your Router’s USB Port When These Options Are Present

    January 20, 2026

    New ‘Remote Labor Index’ shows AI fails 97% of the time in freelancer tasks

    January 19, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»Hackers now test the clickfix attacks against Linux goals
    Security

    Hackers now test the clickfix attacks against Linux goals

    PineapplesUpdateBy PineapplesUpdateMay 13, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Hackers now test the clickfix attacks against Linux goals
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Hackers now test the clickfix attacks against Linux goals

    A new expedition to employ clickfix attacks, using instructions, has been seen targeting both Windows and Linux system that make infections possible on the operating system.

    Clickfix is ​​a social engineering strategy where fake verification systems or application errors are used to run website visitors in console commands that install malware.

    These attacks have traditionally targeted the Windows System, which induces goals to execute the powerrashel script from the Windows Run Command, resulting in information-star malware infection and even ransomware.

    However, the 2024 campaign also targeted MACOS users using Bogus Google Meat Errors.

    Clickfix Linux users target

    Viewed by another recent campaign Hunt.IO Researcher Last week is one of the first people to customize this social engineering technology for the Linux system.

    The attack, which is attributed to Pakistan -related threats APT36 (aka “transparent tribe”), uses a website that allegedly implements India’s Ministry of Defense with a link to the official press release.

    Mulnerable website mimics India's Ministry of Defense
    Mulnerable website mimics India’s Ministry of Defense
    Source: Hunt.io

    When visitors click on this website link, they are profiled by platform to determine their operating system, and then redirected into the flow of the correct attack.

    On Windows, the victims are served a full-screen page, which warns them of limited material use rights. Clicking on ‘release’ leads to JavaScript trigger that copies a malicious MSHTA command on the victim’s clipboard, which is instructed to paste and execute it on the Windows Terminal.

    It launches an .NET-based loader that connects to the attacker’s address, while users see everything valid and a decoy PDF file as expected.

    On Linux, the victims mimic a shell command on their clipboard when clicking on a captcha page that is redirected on a captcha page.

    The victim is then directed to press the Alt+F2 to open a Linux Run Dialog, paste the command in it, and then press enter To execute it.

    Instructions for Linux users
    Instructions for Linux users
    Source: Hunt.io

    The command leaves the ‘Mapeal.sh’ payload on the system of the target, which according to the Hunt.IO, does not perform any malicious action in its current version, limited to bringing JPEG image from the attacker’s server.

    Linux Clickfix Script
    Linux Clickfix Script
    Source: Bleepingcomputer

    “The script directs a jPEG image from the same Trade4Wealth (.) In the directory and opens it in the background,” Hunt.IO describes it.

    “Any additional activity, such as perseverance mechanisms, lateral movement or outbound communication, was seen during execution.”

    However, it is possible that APT36 is currently experimenting to determine the effectiveness of the Linux transition chain, as they will simply need to swap the image for a shell script to install malware or do other malicious activity.

    Clickfix adaptation to carry out attacks on Linux is another will for its effectiveness, as the type of attack is now used against all three major desktop OS platforms.

    As a general policy, users should not copy and paste any command in the run dialogue, without knowing what the command does. Doing this only increases the risk of malware infection and theft of sensitive data.


    Red Report 2025

    Based on the analysis of 14M malicious tasks, search for the top 10 MITERAT & CK techniques behind the 93% attacks and how to defend them against them.

    attacks clickfix goals hackers Linux Test
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleThe ‘The Sexiest Man in Winnipag’ of the Prime Video is a True Crime Traim Wreck – Why it still fascinates me
    Next Article How to pre-order Samsung Galaxy S25 Edge
    PineapplesUpdate
    • Website

    Related Posts

    Startups

    I Found the Best Way to Run an Internet Speed ​​Test (And Use the Results for Better Wi-Fi)

    January 19, 2026
    Startups

    How a simple link allowed hackers to bypass Copilot’s security guardrails – and what Microsoft did about it

    January 19, 2026
    Startups

    These 7 Linux commands are obsolete so don’t use them – here’s why

    January 14, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    Google tests AI-operated audio overview in search results for some questions

    June 16, 20250 Views

    Yes, this was the original voice of the Garat in the trailer for the thief VR

    June 16, 20250 Views

    Best LC10 loadout in call of duty: Warzone

    June 16, 20250 Views
    Our Picks

    I tried 0patch as a last resort for my Windows 10 PC – here’s how it compares to its promises

    January 20, 2026

    A PC Expert Explains Why Don’t Use Your Router’s USB Port When These Options Are Present

    January 20, 2026

    New ‘Remote Labor Index’ shows AI fails 97% of the time in freelancer tasks

    January 19, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2026 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.