×
Clickfix attacks surge 500% as AI powers sophisticated email scams
Written by
Published on
Join our daily newsletter for breaking news, product launches and deals, research breakdowns, and other industry-leading AI coverage
Join Now

Cybercriminals are increasingly targeting the human element in security systems, with Clickfix social engineering attacks surging 500% in early 2025 and AI-powered business email compromise (BEC) scams becoming more sophisticated. This shift represents a fundamental change in cyber attack strategies, moving away from traditional malware-based approaches toward exploiting human psychology and trust, making these threats particularly dangerous for organizations across multiple sectors.

What you should know: Clickfix attacks have become a dominant threat vector, accounting for 8% of all cyberattacks by bypassing traditional security measures entirely.

  • The technique uses fake error messages and technical alerts to trick victims into manually executing malicious PowerShell commands that download ransomware, information stealers, and other malware.
  • Unlike traditional phishing, Clickfix doesn’t rely on malware initially—instead, it manipulates users into providing direct system access through social engineering.
  • “The use of RMM [Remote Monitoring and Management] tools to enable initial access in the same way is also a vector we continue to see an increase in, with campaigns really focusing on the social engineering aspect,” said Hiwot Mendahun, Mimecast Threat Research Engineer.

AI’s dangerous evolution: Artificial intelligence is now being weaponized to create highly convincing multi-person email conversations that impersonate executives, vendors, and third parties.

  • Attackers use AI to generate entire conversation threads between multiple parties, incorporating real financial data, HR information, and payroll details gathered during reconnaissance.
  • These fabricated email chains typically create artificial urgency around fake invoice payments, bank account changes, payroll updates, and wire transfers.
  • “The use of AI in these campaigns specifically gives threat actors the ability to really mass-produce a more targeted thread using automation and potentially altering content to help bypass content-based detection,” Mendahun explained.

Industries at highest risk: Education, IT, telecommunications, legal, and real estate sectors face the greatest exposure to these evolving social engineering attacks.

  • These industries are targeted because they “often have direct access to high-value targets, handle sensitive financial transactions, and manage confidential client information.”
  • Real estate companies are experiencing steadily climbing attack rates, suggesting criminal groups like Scattered Spider and TA2541 are pivoting toward this sector.
  • The shift indicates cybercriminals are moving away from more traditional targets to exploit sectors with less mature security awareness.

The deepfake threat: Security experts warn that AI-generated voice and video content will make BEC scams even more difficult to detect.

  • Deepfake technology is already being integrated into BEC campaigns to enhance success rates for large fraudulent transactions.
  • As AI tools become more accessible, the barrier to entry for cybercriminals continues to lower, potentially expanding the threat landscape significantly.

Essential defense strategies: Organizations must implement multi-layered security approaches that account for these human-focused attack vectors.

  • Increased controls: Implement additional authentication and authorization checks across multiple platforms to catch fraudulent requests before execution.
  • Multi-factor authentication: Deploy 2FA or MFA to reduce account hijacking risks even when phishing succeeds.
  • Continuous training: Provide regular, ongoing security awareness training rather than annual one-time sessions, especially for employees with privileged access.
  • Zero-trust architecture: Limit employee access to only resources essential for their roles, reducing the overall attack surface.
  • Clickfix awareness: Educate staff that traditional anti-phishing methods won’t detect these attacks, emphasizing the danger of executing unknown commands.
How Clickfix and AI are helping hackers break into your systems - at an alarming rate

Recent News

Goldman Sachs: AI data centers need new financing as costs soar

Pension funds and insurers are getting wooed with bond-like structures for tech infrastructure.

AI browsers face “bad website paradox” as competition heats up

AI-powered browsers stumble on poorly designed websites despite impressive capabilities elsewhere.

Reddit sues Perplexity for stealing user content to build $20B AI company

The case tests whether AI companies can sidestep licensing deals by using third-party scrapers.