Beware: Fake Google Meet Pages Deliver Infostealers in Ongoing ClickFix Campaign
Briefly

Threat actors are utilizing fake Google Meet web pages to conduct the ClickFix malware campaign, tricking users into executing malicious PowerShell code for system infection.
Sekoia reports that the latest ClickFix campaign employs techniques that involve fake web page error messages, compelling victims to run harmful code that evades security measures.
These schemes have been successfully redirecting users to fraudulent pages masquerading as well-known websites, culminating in the deployment of infamous stealers like StealC and Atomic.
The overarching strategy of the ClickFix campaign is remarkable for its social engineering aspect, manually coaxing users to trigger malware execution, sidestepping traditional defenses.
Read at The Hacker News
[
|
]