CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

FileFix Attack Evolves with Cache Smuggling Technique

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

A new variant of the FileFix social engineering attack uses cache smuggling to evade security software. This technique involves hiding a malicious ZIP archive within a browser's cache to bypass detection. The attack impersonates a Fortinet VPN Compliance Checker and tricks users into executing a PowerShell script through the Windows File Explorer address bar. The script extracts the malicious payload from the cache and executes it. This new variant was first observed by cybersecurity researcher P4nd3m1cb0y and detailed by Marcus Hutchins of Expel. The attack has been adopted by various threat actors, including ransomware groups. Additionally, a new ClickFix kit called the IUAM ClickFix Generator has been discovered, which automates the creation of ClickFix-style lures.

Timeline

  1. 08.10.2025 22:49 1 articles · 7h ago

    New FileFix variant uses cache smuggling to evade security software

    A new variant of the FileFix social engineering attack uses cache smuggling to hide a malicious ZIP archive within a browser's cache. The attack impersonates a Fortinet VPN Compliance Checker and tricks users into executing a PowerShell script through the Windows File Explorer address bar. The script extracts the malicious payload from the cache and executes it. This technique has been adopted by various threat actors, including ransomware groups.

    Show sources

Information Snippets