Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    This $30 Gadget Keeps My Office and Workspace Organized at All Times – How It Works

    November 7, 2025

    I tried the only agentive browser that runs native AI – and found only one downside

    November 7, 2025

    Get 4 Free iPhone 17 or Galaxy S25 Phones from T-Mobile Right Now – Here’s How

    November 7, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»New FileFix attack uses cache smuggling to evade security software
    Security

    New FileFix attack uses cache smuggling to evade security software

    PineapplesUpdateBy PineapplesUpdateOctober 8, 2025No Comments5 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    New FileFix attack uses cache smuggling to evade security software
    Share
    Facebook Twitter LinkedIn Pinterest Email

    New FileFix attack uses cache smuggling to evade security software

    A new variant of the FileFix social engineering attack uses cache smuggling to secretly download a malicious ZIP archive onto a victim’s system and bypass security software.

    The new phishing and social engineering attack impersonates the “Fortinet VPN Compliance Checker” and was first spotted by a cybersecurity researcher. P4nd3m1cb0yWho shared information about it on X.

    In a new report from a cyber security firm expelledCybersecurity researcher Marcus Hutchins has shared more details about how this attack works.

    For those who are not familiar with FileFix attacks, it is a variant of the ClickFix social engineering attack developed by Mr.d0x. Instead of tricking users into pasting malicious commands into operating system dialogs, it uses the Windows File Explorer address bar to secretly execute PowerShell scripts.

    FileFix attack evolves with cache smuggling

    In the new phishing attack, a website displays a dialog that poses as the Fortinet VPN “Compliance Checker,” instructing users to paste what looks like a valid network path to the Fortinet program on a network share.

    Fortinet VPN Compliance Check FileFix Lure
    Fortinet VPN Compliance Check FileFix Lure
    Source: Expelled

    While the lure path displays “\Public\Support\VPN\ForticlientCompliance.exe” when copied to the clipboard, it is actually much longer, as it contains 139 spaces to hide the malicious PowerShell command.

    Because of this padding, when a visitor follows the instructions to open File Explorer and paste a command into the address bar, only the path is displayed, as seen below.

    How the copied command appears in the File Explorer address bar
    How the copied command appears in the File Explorer address bar
    Source: Expelled

    However, when a person presses Enter on the keyboard, Windows runs the following hidden PowerShell command through conhost.exe in headless mode, so it is not visible to the user.

    malicious powershell command
    malicious powershell command
    Source: Expelled

    The PowerShell command first creates the %LOCALAPPDATA%\FortiClient\compliance folder, then copies Chrome’s cache files from %LOCALAPPDATA%\Google\Chrome\User Data\Default\Cache\Cache_Data\ to that folder.

    The script then scans each cache file using regular expressions to find the content between “bTgQcBpv” and “mX6o0lBw”. This content is actually a zip file stored in the fake image file, which is extracted and unzipped to ComplianceChecker.zip.

    The script then launches the FortiClientComplianceChecker.exe executable from the extracted archive to execute the malicious code.

    You might be wondering how the malicious file was stored in Chrome’s cache files in the first place, and this is where a cache smuggling attack comes into play.

    When a visitor accessed a phishing page containing the FileFix lure, the website executed JavaScript that instructed the browser to retrieve an image file.

    As the HTTP response states that the image received is of type “image/jpeg”, the browser automatically caches it on the file system, treating it as a valid image file, even though it is not.

    As this was done before the Powershell command was executed through File Explorer, the file was already present in the cache, and the zip file could be extracted from it.

    “This technique, known as cash smugglingEnables malware to bypass many different types of security products,” Hutchins explains.

    “Neither the webpage nor the Powershell script explicitly downloads any files. By simply allowing the browser to cache the fake “image”, the malware is able to get an entire zip file onto the local system without any web requests or powershell commands.”

    “As a result, any tool scanning downloaded files or looking for PowerShell scripts executing web requests will not detect this behavior.”

    The new FileFix technology has seen rapid adoption by threat actors soon after it was disclosed, with ransomware gangs and other threat actors using it in their campaigns.

    ClickFix expands generator ecosystem

    In addition to the new cache-smuggling FileFix variant, researchers palo alto unit 42 A new clickfix kit called “IUAM Clickfix Generator” was discovered, which automates the creation of clickfix-style lures.

    ClickFix Generator’s interface allows attackers to design fake verification pages, customize page titles and text, select color schemes, and configure clipboard payloads.

    IUAM ClickFix Generator Interface
    IUAM ClickFix Generator Interface
    Source: Unit 42

    The kit also supports OS detection, generating PowerShell commands for Windows or Base64-encoded shell commands for macOS, while sometimes also providing harmless decoys for other operating systems.

    All lures appear to include some type of fake Cloudflare CAPTCHA, with researchers creating several websites that use generated lures.

    These websites claim to be affiliated with Cloudflare, Speedtest, Microsoft Teams, Cloud, TradingView, Microsoft, and Microsoft 365, among others.

    Microsoft ClickFix Lure
    Microsoft ClickFix Lure
    Source: BleepingComputer

    While each lure is customized to the attacker’s campaign, the behavior remains the same, displaying a fake Cloudflare CAPTCHA that prompts users to run a hidden command in a command prompt, Run dialog, or terminal.

    In the campaign observed by Unit 42, social engineering attacks were used to infect devices with the Deerstealer (Windows) and Odyssey (Mac) InfoStealer malware, as well as another unknown payload for Windows.

    As these types of social engineering attacks have become increasingly popular among threat actors, it is essential to educate employees on the importance of not copying text from a website and running it in an operating system dialog box.


    PICS BAS Summit

    attend Breach and Attack Simulation Summit and experience future of security verificationHear from top experts and see how AI-powered BAS Changing breach and attack simulations.

    Don’t miss the event that will shape the future of your security strategy

    Attack cache evade FileFix Security smuggling Software
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleJony Ive and Sam Altman reveal about their secret AI hardware project at OpenAI’s Dave Day
    Next Article Recent grad used ‘income stacking’ to earn $144k: report
    PineapplesUpdate
    • Website

    Related Posts

    Startups

    6 essential rules for incorporating AI into your software development process – and the number 1 risk

    October 29, 2025
    Startups

    Skyline Nav AI’s software can guide you anywhere without GPS – find it at TechCrunch Disrupt 2025

    October 28, 2025
    AI/ML

    Do you log into X with a security key? Renominate it by November 10th – otherwise

    October 27, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    10,000 steps or Japanese walk? We ask experts if you should walk ahead or fast

    June 16, 20250 Views

    FIFA Club World Cup Soccer: Stream Palmirus vs. Porto lives from anywhere

    June 16, 20250 Views

    What do chatbott is careful about punctuation? I tested it with chat, Gemini and Cloud

    June 16, 20250 Views
    Our Picks

    This $30 Gadget Keeps My Office and Workspace Organized at All Times – How It Works

    November 7, 2025

    I tried the only agentive browser that runs native AI – and found only one downside

    November 7, 2025

    Get 4 Free iPhone 17 or Galaxy S25 Phones from T-Mobile Right Now – Here’s How

    November 7, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2025 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.