Save Your Spot

On-demand Webinar
Analyzing ClickFix: The browser-based technique behind infostealer breaches

ClickFix, FileFix, fake CAPTCHA — whatever you call it, attacks where users interact with malicious scripts in their web browser are a fast-growing source of security breaches.


Most commonly, these attacks are used to deliver remote access software, infostealer malware, and keyloggers, using stolen session cookies and credentials to facilitate attacks on business apps and services. From there, the attacker simply dumps the data and holds the victim to ransom for its deletion — often dropping ransomware afterwards for double the extortion. 

Join Luke Jennings, VP R&D at Push Security, to learn about: 

How malicious copy & paste attacks work
Why they’re evading detection controls during both delivery & execution
Real-world attack examples showcasing the different attack variants
The future of malicious copy & paste techniques and payloads
What security teams can do to improve detection and response

This webinar is now available on-demand! Fill out the form to get access.

Push forward double slash
Luke JenningsVP Research
Complete the form below
Subscribe to mailing list for content updates
Trusted by
Sophos
Gitlab
Thinkst
Cribl
Enter some text...