How Is Velvet Tempest Using ClickFix to Stage Ransomware?

How Is Velvet Tempest Using ClickFix to Stage Ransomware?

Examining the Convergence of ClickFix Tactics and Velvet Tempest Operations

Modern cyber warfare is no longer just about cracking complex codes; it is about convincing the human behind the screen to become an unwitting accomplice in their own digital downfall through high-pressure deception. The core focus of this research centers on how the sophisticated threat actor Velvet Tempest—formerly tracked as DEV-0504—has integrated the “ClickFix” social engineering technique into its ransomware deployment pipeline. The study addresses critical challenges in modern cybersecurity, specifically how high-tier ransomware affiliates bypass traditional perimeter defenses by tricking users into executing obfuscated system commands.

This methodology explores the shift from exploit-driven entry to human-centric deception and the subsequent use of legitimate administrative tools for internal reconnaissance. By pivoting toward social engineering, Velvet Tempest avoids the high cost of zero-day exploits while maintaining a high success rate against organizations with robust technical firewalls but vulnerable human elements. This convergence represents a significant maturation of the ransomware-as-a-service model, where delivery mechanisms are becoming as specialized as the encryption payloads themselves.

Contextualizing the Evolution of Ransomware Delivery

Velvet Tempest is a notorious ransomware affiliate with a lengthy history of deploying devastating strains such as Ryuk, Conti, and LockBit. Traditionally, such groups relied on technical vulnerabilities or leaked credentials; however, this research highlights a tactical shift toward ClickFix lures, which present fake CAPTCHAs or system errors to victims. Understanding this shift is vital for the global security community, as it demonstrates how even well-protected organizations can be compromised through native Windows utilities, making detection significantly more difficult for standard antivirus solutions.

The evolution of these lures suggests that threat actors are closely monitoring user behavior and browser security improvements. As browsers become better at blocking malicious downloads, attackers have moved toward “copy-paste” attacks that leverage the user’s administrative privilege. This transition underscores a broader trend in the 2026 threat landscape, where the barrier to entry for initial access is lowered by exploiting the inherent trust users place in system-level prompts and familiar interface elements.

Research Methodology, Findings, and Implications

Methodology

The research was conducted through a twelve-day intensive observation by threat intelligence firm MalBeacon. Analysts utilized an emulated U.S. non-profit environment to lure and monitor the threat actor’s behavior in real-time. The methodology involved capturing the full execution chain of the ClickFix lure, monitoring the use of built-in Windows binaries like finger.exe and csc.exe, and analyzing the network infrastructure used to host malicious PowerShell scripts and backdoors. This controlled environment allowed for a granular look at how the adversary interacts with a live network.

Findings

The investigation revealed that Velvet Tempest uses malvertising to direct users to fake CAPTCHA pages that instruct them to paste malicious commands into the Windows Run dialog. Key findings include the group’s use of a PowerShell credential harvester targeting Google Chrome and the deployment of DonutLoader and the CastleRAT backdoor. Notably, the research identified that the attack infrastructure overlapped with previous Termite ransomware intrusions. The findings show a methodical progression from initial access to Active Directory profiling and the establishment of persistence via Python-based components.

Implications

These findings have profound implications for enterprise security posture, indicating that technical patching alone is insufficient against Velvet Tempest. Organizations must shift focus toward user education and the monitoring of “living-off-the-land” binaries. The research suggests that the ClickFix technique is becoming a standardized entry vector for multiple ransomware groups, necessitating more robust behavioral analysis and tighter restrictions on administrative tools like the Windows command line and PowerShell for non-technical staff.

Reflection and Future Directions

Reflection

The study successfully mapped the early stages of a Velvet Tempest intrusion, providing a rare look at the staging phase before encryption occurred. A primary challenge was the obfuscated nature of the initial commands, which were designed to appear benign to automated filters. While the research provided deep insight into the persistence and reconnaissance phases, the study was limited by its emulated nature, which concluded before the final “double-extortion” encryption phase was initiated. This prevented a full analysis of the data exfiltration protocols used in the final stages.

Future Directions

Future research should investigate the specific criteria Velvet Tempest uses to select targets for ClickFix lures versus traditional exploitation. There is also a need to explore the broader “CastleLoader” ecosystem to determine if multiple independent ransomware groups are sharing the same delivery infrastructure. Unanswered questions remain regarding the automation level of the initial reconnaissance phase and whether defensive AI can be trained to recognize the specific patterns of human-pasted commands in the Windows Run dialog. Exploring these avenues could lead to more proactive defense mechanisms.

Final Assessment of Velvet Tempest’s Strategic Shift

In conclusion, the research demonstrated that Velvet Tempest remained a highly adaptive adversary by moving away from complex exploits in favor of the ClickFix social engineering model. By leveraging legitimate system processes and administrative utilities, the group maintained a stealthy presence that avoided detection by conventional security software. These findings reaffirmed the importance of holistic defense strategies that combined technical monitoring with aggressive user awareness training. Ultimately, the transition to human-centric triggers provided a vital contribution to the current understanding of modern ransomware staging and the necessity for behavioral detection over signature-based defenses.

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later