A recent phishing campaign targeting Microsoft OneDrive users has been uncovered, utilizing sophisticated social engineering techniques to deceive victims into running harmful PowerShell scripts. The scheme capitalizes on users’ sense of urgency to access files and their confidence in authentic-looking software interfaces.
The attack commences with an email containing an .html file that, when opened, reveals an image designed to create a feeling of urgency regarding access to a document. The image mimics a Microsoft OneDrive page showing a file called “Reports.pdf” and a window labeled “Error 0x8004de86” displaying an error message asserting that the “OneDrive” cloud service necessitates an update.
Within the image, two buttons are featured: “Details” and “How to fix.” Choosing the latter initiates a function call and loads supplementary instructions. This combination of technical terminology and immediate error messages is a classic social engineering tactic intended to manipulate the user’s emotions and induce rapid action.
The attack progresses with the user being directed to click on a button purportedly explaining how to resolve a DNS issue, ultimately compromising their system. Subsequently, the user is prompted to access the Windows PowerShell terminal via the Quick Link menu and paste malicious commands for execution under the guise of implementing an update for the OneDrive cloud service. These commands trigger the download of an archive file, extraction of its contents, and execution of a script utilizing AutoIt3.exe.
Following these steps, a success message is displayed, falsely indicating that the operation has been successfully completed.
This phishing campaign has impacted users globally, with substantial activity identified in countries including the United States, India, and the United Kingdom. For organizations, this attack poses a significant threat as a single compromised employee could potentially result in extensive network infiltration, data breaches, and financial losses.
To combat such threats, businesses are advised to implement comprehensive employee training programs that emphasize the identification of phishing attempts. Additionally, organizations should enforce stringent security protocols, including email filtering and attachment scanning, while also ensuring the regular updating and patching of systems to address vulnerabilities. Cultivating a culture of cybersecurity awareness throughout the organization is also crucial in safeguarding against phishing attacks.
Campaigns of this nature that deceive users into executing malicious PowerShell scripts often contain malware such as remote access Trojans (RATs) and infostealers like DarkGate, Lumma, and Vidar. Security researchers commonly refer to this type of attack as ‘ClickFix’ or ‘ClearFake.’
In conclusion, it is imperative for organizations and individuals to remain vigilant against phishing campaigns and take proactive measures to bolster their cybersecurity defenses in order to mitigate the risk of falling victim to such malicious attacks.

