{"id":16292,"date":"2025-10-14T08:36:56","date_gmt":"2025-10-14T08:36:56","guid":{"rendered":"\/cybersecurity-blog\/?p=16292"},"modified":"2025-10-29T10:02:38","modified_gmt":"2025-10-29T10:02:38","slug":"new-malware-tactics","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/new-malware-tactics\/","title":{"rendered":"New Malware Tactics: Cases &amp; Detection Tips for SOCs and MSSPs"},"content":{"rendered":"\n<p>Recently, we have hosted a webinar exploring some of the latest malware and phishing techniques to show how interactive analysis and fresh threat intelligence can help SOC teams stay ahead.<\/p>\n\n\n\n<p><a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=webinar_new_tactics&amp;utm_term=141025&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a>\u2019s experts depicted the evolving landscape of malware tactics, highlighted real-world examples of sophisticated attacks, and provided practical detection tips for analysts. &nbsp;<br>&nbsp;<br>You can <a href=\"https:\/\/youtu.be\/Ze27bW8v5MU\" target=\"_blank\" rel=\"noreferrer noopener\">watch the session on ANY.RUN\u2019s YouTube channel<\/a> or read our quick recap below.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Join us on social media not to miss new event announcements: <a href=\"https:\/\/www.linkedin.com\/company\/any-run\/\" target=\"_blank\" rel=\"noreferrer noopener\">LinkedIn<\/a>; <a href=\"https:\/\/x.com\/anyrun_app\" target=\"_blank\" rel=\"noreferrer noopener\">X.com<\/a>, <a href=\"https:\/\/discord.gg\/anyrun\" target=\"_blank\" rel=\"noreferrer noopener\">Discord<\/a>.&nbsp;&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Key Takeaways&nbsp;<\/h3>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li><strong>QR Code Threats are Evolving<\/strong>: Phishkit attacks increasingly use QR codes to evade detection, as many security solutions still cannot adequately scan and analyze QR code content.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol start=\"2\" class=\"wp-block-list\">\n<li><strong>Interactive Analysis is Critical<\/strong>: Traditional automated tools fail against sophisticated attacks like ClickFix that require human interaction to fully execute. SOC teams need sandbox environments capable of manual navigation through CAPTCHAs and multi-stage social engineering attacks.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol start=\"3\" class=\"wp-block-list\">\n<li><strong>System Binaries are Attack Vectors<\/strong>: Living Off the Land Binary (LOLBin) abuse allows attackers to hide malicious activities within trusted system processes like PowerShell and mshta.exe, making detection extremely challenging without advanced behavioral analysis.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol start=\"4\" class=\"wp-block-list\">\n<li><strong>Real-Time Threat Intelligence is Essential<\/strong>: Access to current, actionable intelligence from global SOC investigations can reduce mean time to response by up to 21 minutes per case and provide crucial context for suspicious activities.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol start=\"5\" class=\"wp-block-list\">\n<li><strong>Automation Reduces Analyst Burden<\/strong>: Strategic automation can decrease Tier 1 case loads by up to 20% and reduce escalations to senior analysts by 30%, allowing teams to focus on high-value threat hunting and response activities.&nbsp;<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">The Growing Challenge: New Techniques, Low Detection Rates&nbsp;<\/h2>\n\n\n\n<p>Low detection rates remain a critical issue for <a href=\"https:\/\/any.run\/cybersecurity-blog\/soc-expertise-growth\/\" target=\"_blank\" rel=\"noreferrer noopener\">SOC teams<\/a>. As attackers employ new evasion techniques, missed threats can lead to severe infrastructure damage, asset compromise, and reputational harm.&nbsp;&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"653\" height=\"491\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image-3.png\" alt=\"\" class=\"wp-image-16296\" style=\"width:442px;height:auto\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image-3.png 653w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image-3-300x226.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image-3-370x278.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image-3-270x203.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image-3-80x60.png 80w\" sizes=\"(max-width: 653px) 100vw, 653px\" \/><figcaption class=\"wp-element-caption\"><em>Why detection rates can be disappointing<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>The webinar covered three key tactics: ClickFix attacks using steganography payloads, phishing kits with <a href=\"https:\/\/any.run\/cybersecurity-blog\/tycoon2fa-evasion-analysis\/\" target=\"_blank\" rel=\"noreferrer noopener\">Tycoon2FA<\/a>&#8216;s new evasion chain, and Living Off the Land Binaries (LOLBins) in <a href=\"https:\/\/any.run\/malware-trends\/deerstealer\/\" target=\"_blank\" rel=\"noreferrer noopener\">DeerStealer<\/a> attacks.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Establishing Fast Detection and Proactive Defense with ANY.RUN&nbsp;<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"580\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image2-5-1024x580.png\" alt=\"\" class=\"wp-image-15867\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image2-5-1024x580.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image2-5-300x170.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image2-5-768x435.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image2-5-1536x869.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image2-5-370x209.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image2-5-270x153.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image2-5-740x419.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/image2-5.png 1848w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Interactive Sandbox streamlines detection of malware and phishing with live analysis<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>Attackers are relentless in refining their malware and phishing tactics, but SOC teams can fight back effectively with the right solutions. By combining hands-on interactive analysis, automation, and shared threat intelligence, ANY.RUN helps SOCs cut through alert noise, accelerate detection, and strengthen proactive defense.&nbsp;<\/p>\n\n\n\n<p>Organizations implementing advanced detection strategies should track several key metrics to measure success:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Detection Rate Improvement:<\/strong> 88% of threats become visible within 60 seconds of analysis.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Mean Time to Response Reduction<\/strong>: Advanced detection reduces MTTR by up to 21 minutes per case.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Escalation Reduction<\/strong>: Effective training and services can reduce escalations from Tier 1 to Tier 2 analysts by 30%.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Overall Performance Multiplier<\/strong>: Some organizations report up to 3x better performance.&nbsp;<\/li>\n<\/ul>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\n<span class=\"highlight\">Reduce MTTR <\/span>and<span class=\"highlight\"> minimize risks<\/span> with ANY.RUN\u2019s solutions<br>Request a quote or trial for your SOC &nbsp;  \n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/any.run\/enterprise\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=webinar_new_tactics&#038;utm_term=141025&#038;utm_content=linktoenterpriseform#contact-sales\" target=\"_blank\" rel=\"noopener\">\nContact us\n<\/a>\n<!-- CTA Link -->\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n.regular-banner__link:hover {\nbackground-color: #FFFFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h2 class=\"wp-block-heading\">Three Critical Attack Vectors Demanding Attention&nbsp;<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">1. ClickFix Attacks: The Steganography Challenge&nbsp;<\/h3>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"727\" height=\"635\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image2-4.png\" alt=\"\" class=\"wp-image-16298\" style=\"width:382px;height:auto\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image2-4.png 727w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image2-4-300x262.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image2-4-370x323.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image2-4-270x236.png 270w\" sizes=\"(max-width: 727px) 100vw, 727px\" \/><figcaption class=\"wp-element-caption\"><em>Key TTPs of ClickFix attacks<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>ClickFix represents one of the most insidious social engineering attacks currently targeting organizations. This technique leverages fake error messages and CAPTCHA challenges to trick users into manually executing malicious PowerShell commands through clipboard hijacking.&nbsp;<\/p>\n\n\n\n<p>The attack typically begins with phishing emails or compromised websites that present users with seemingly legitimate verification processes. The sophisticated nature of these attacks lies in their multi-layered deception:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Double Spoofing<\/strong>: Attackers create fake versions of trusted websites (such as booking platforms) and combine them with convincing CAPTCHA challenges.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Manual Execution Requirement<\/strong>: The attack only proceeds when users manually follow instructions, making it extremely difficult for automated systems to detect.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Clipboard Manipulation<\/strong>: Malicious commands are silently copied to the user&#8217;s clipboard without notification.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Social Engineering<\/strong>: Users are instructed to paste and execute clipboard contents through system dialog boxes.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>We can see these TTPs in action by <a href=\"https:\/\/app.any.run\/tasks\/1d274110-4351-43c2-a6e7-21d326221efd\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=webinar_new_tactics&amp;utm_term=141025&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">analyzing a ClickFix sample in the Sandbox<\/a>.&nbsp;&nbsp;<\/p>\n\n\n\n<p>A user is required to click through a (fake) CAPTCHA \u2014 this is where most automated tools will stumble thus missing the threat, but ANY.RUN\u2019s Sandbox interactivity allows to solve the task.&nbsp;&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"517\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image3-4-1024x517.png\" alt=\"\" class=\"wp-image-16301\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image3-4-1024x517.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image3-4-300x152.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image3-4-768x388.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image3-4-1536x776.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image3-4-370x187.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image3-4-270x136.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image3-4-740x374.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image3-4.png 1770w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Forged Booking.com page with a fake CAPTCHA<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>Upon the click on the CAPTCHA, a malicious command is copied to the user\u2019s clipboard without any notification. It is a <a href=\"https:\/\/any.run\/cybersecurity-blog\/powershell-script-tracer\/\" target=\"_blank\" rel=\"noreferrer noopener\">PowerShell script<\/a>:&nbsp;&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"723\" height=\"327\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image4-1.png\" alt=\"\" class=\"wp-image-16303\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image4-1.png 723w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image4-1-300x136.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image4-1-370x167.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image4-1-270x122.png 270w\" sizes=\"(max-width: 723px) 100vw, 723px\" \/><figcaption class=\"wp-element-caption\"><em>Malicious command captured by the Sandbox<\/em><\/figcaption><\/figure><\/div>\n\n\n<p><em>&nbsp;<\/em>&nbsp;<\/p>\n\n\n\n<p>A popup appears next, directing the user to run the command. &nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"515\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image5-3-1024x515.png\" alt=\"\" class=\"wp-image-16306\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image5-3-1024x515.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image5-3-300x151.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image5-3-768x386.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image5-3-1536x773.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image5-3-370x186.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image5-3-270x136.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image5-3-740x372.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image5-3.png 1771w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Sandbox running the PowerShell command for a user<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>The process tree in the Sandbox allows us to view the entire event chain from the initial command execution to the final payload.&nbsp;<br>&nbsp;<br>Once executed, ClickFix attacks can deploy various malware types, including <a href=\"https:\/\/any.run\/malware-trends\/lumma\/\" target=\"_blank\" rel=\"noreferrer noopener\">Lumma<\/a> Stealer, <a href=\"https:\/\/any.run\/malware-trends\/asyncrat\/\" target=\"_blank\" rel=\"noreferrer noopener\">AsyncRAT<\/a>, and ransomware. The technique&#8217;s effectiveness stems from its ability to bypass traditional detection mechanisms that cannot simulate human interaction or navigate through interactive elements like CAPTCHAs.&nbsp;<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nDetect threats faster with ANY.RUN\u2019s <span class=\"highlight\">Interactive Sandbox<\/span><br> See full attack chain in seconds for immediate response&nbsp;  \n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/app.any.run\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=webinar_new_tactics&#038;utm_term=141025&#038;utm_content=linktoregistration#register\" target=\"_blank\" rel=\"noopener\">\nGet started with business email\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<p>In our case, the attack has delivered not only AsyncRAT, but also DCRAT. The Sandbox tells us that it has created files in the startup directory. This is a standard persistence mechanism that allows the malware to continue working even after a system reboot.&nbsp;<\/p>\n\n\n\n<p>The sandbox tells us that it has created files in the startup directory.&nbsp;&nbsp;<\/p>\n\n\n\n<p>This is a standard <a href=\"https:\/\/any.run\/cybersecurity-blog\/6-persistence-mechanisms-in-malware\/\" target=\"_blank\" rel=\"noreferrer noopener\">persistence<\/a> mechanism that allows the malware to continue working even after a system reboot.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"628\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image6-3-1024x628.png\" alt=\"\" class=\"wp-image-16309\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image6-3-1024x628.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image6-3-300x184.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image6-3-768x471.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image6-3-370x227.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image6-3-270x166.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image6-3-740x454.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image6-3.png 1032w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>DCRAT deployment in the process tree<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>Detection of ClickFix attacks requires interactive analysis capabilities that can replicate human behavior in a controlled environment. Traditional automated scanning tools will typically fail at the CAPTCHA stage, leaving the threat undetected and potentially allowing it to reach end users.&nbsp;<\/p>\n\n\n\n<p>To see variants of ClickFix attacks with varying scenarios and payloads and gather IOCs for detection rules, query the technique in ANY.RUN\u2019s Threat Intelligence Lookup. The data comes from sandbox analyses of over 15,000 SOC teams around the world who investigate real-world recent incidents.&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/intelligence.any.run\/analysis\/lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=webinar_new_tactics&amp;utm_term=141025&amp;utm_content=linktotilookup#%7B%2522query%2522:%2522threatName:%255C%2522ClickFix%255C%2522%2522,%2522dateRange%2522:60%7D\" target=\"_blank\" rel=\"noreferrer noopener\">threatName:&#8221;ClickFix&#8221;<\/a>&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"547\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image7-3-1024x547.png\" alt=\"\" class=\"wp-image-16312\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image7-3-1024x547.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image7-3-300x160.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image7-3-768x411.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image7-3-370x198.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image7-3-270x144.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image7-3-740x396.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image7-3.png 1487w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>ClickFix sandbox analyses found via TI Lookup<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<h3 class=\"wp-block-heading\">2. PhishKit Attacks: Advanced Evasion Through QR Code Obfuscation&nbsp;<\/h3>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"459\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image8-2-1024x459.png\" alt=\"\" class=\"wp-image-16315\" style=\"width:586px;height:auto\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image8-2-1024x459.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image8-2-300x134.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image8-2-768x344.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image8-2-370x166.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image8-2-270x121.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image8-2-740x332.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image8-2.png 1290w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Why phishkits are dangerous<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p><a href=\"https:\/\/any.run\/malware-trends\/phishingkit\/\" target=\"_blank\" rel=\"noreferrer noopener\">Phishkit<\/a> attacks represent a significant evolution in phishing campaign sophistication. These pre-packaged toolkits, often sold on dark web marketplaces, enable even unskilled attackers to create highly convincing phishing campaigns that mimic trusted brands like Microsoft, Google, and other major service providers.&nbsp;<\/p>\n\n\n\n<p>The latest iterations of phishkit attacks incorporate several advanced evasion techniques:&nbsp;&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>QR Code Integration<\/strong>: Malicious links are embedded within QR codes in PDF attachments, often styled to appear as legitimate DocuSign documents.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Mobile Device Targeting<\/strong>: QR codes naturally direct victims to mobile devices, where phishing indicators may be less visible on smaller screens.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Multi-Stage Human Interaction Checks<\/strong>: Attacks include various verification steps designed to evade automated analysis.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>AI-Generated Content<\/strong>: Some variants use artificial intelligence to create more convincing phishing content.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>In spite of the anti-evasion techniques, ANY.RUN\u2019s Sandbox can automatically detonate these attacks. Automated Interactivity handles this without analysts\u2019 manual effort: <a href=\"https:\/\/app.any.run\/tasks\/650ae35c-e319-4779-81f2-e6490038a382\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=webinar_new_tactics&amp;utm_term=141025&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">view an analysis<\/a>.&nbsp;&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"453\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image9-2-1024x453.png\" alt=\"\" class=\"wp-image-16320\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image9-2-1024x453.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image9-2-300x133.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image9-2-768x339.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image9-2-1536x679.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image9-2-370x164.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image9-2-270x119.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image9-2-740x327.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image9-2.png 1941w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Phishing email with a malicious attachment: the Sandbox clicks the links<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>In the Actions section, we can see the steps the Sandbox performed to detonate each attack stage. The attack begins with an email that has a pdf attachment styled to appear as a legitimate DocuSign document.&nbsp; &nbsp;<br>&nbsp;<br>The document contains a QR code: a common trick in phishing attacks these days that can be very effective. First, it lets attackers avoid detection because many security solutions still cannot scan QR codes. Second, most people use mobile devices to scan codes, so the attack further unfolds on a smaller screen making it harder to spot signs of phishing.&nbsp; &nbsp;<br>&nbsp;<br>The Sandbox extracts the link from the QR code, follows it to a page with a Cloudflare Turnstile CAPTCHA, and solves the CAPTCHA. The final stage of the kill chain is a very convincing fake Microsoft 365 login page designed to steal credentials.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Popular phishkits like Tycoon2FA and Mamba2FA have been linked to sophisticated threat groups, including Storm-1747, demonstrating the organized nature of these campaigns. The QR code obfuscation technique is particularly effective because many security solutions still cannot adequately scan and analyze QR codes for malicious content.&nbsp;<\/p>\n\n\n\n<p>To find more samples of phishkit attacks employing QR codes and targeting companies in your location, use the following TI Lookup request (replace Spain\u2019s country code by your own):&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/intelligence.any.run\/analysis\/lookup?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=webinar_new_tactics&amp;utm_term=141025&amp;utm_content=linktotilookup#%7B%2522query%2522:%2522threatName:%255C%2522qrcode%255C%2522%2520and%2520threatName:%255C%2522phishing%255C%2522%2520AND%2520submissionCountry:%255C%2522es%255C%2522%2522,%2522dateRange%2522:180%7D\" target=\"_blank\" rel=\"noreferrer noopener\">threatName:&#8221;qrcode&#8221; and threatName:&#8221;phishing&#8221; AND submissionCountry:&#8221;es&#8221;<\/a>&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"586\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/imagea-2-1024x586.png\" alt=\"\" class=\"wp-image-16323\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/imagea-2-1024x586.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/imagea-2-300x172.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/imagea-2-768x440.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/imagea-2-370x212.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/imagea-2-270x155.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/imagea-2-740x424.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/imagea-2.png 1478w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Phishing campaigns targeting Spanish users and containing a QR code<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p><strong>Effective detection requires systems capable of:<\/strong>&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Automatically extracting and analyzing URLs from QR codes.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Solving various CAPTCHA challenges without human intervention.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Following multi-stage attack chains to their ultimate payload.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Identifying sophisticated phishing page designs that closely mimic legitimate services.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>ANY.RUN\u2019s customers report that the autonomous interactive analysis in the Sandbox brings the total case load for L1s down by up to 20%.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Living Off the Land Binaries (LOLBins): Exploiting System Trust&nbsp;&nbsp;<\/h3>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/soc-brief-table-1024x1024.jpg\" alt=\"\" class=\"wp-image-16594\" style=\"width:498px;height:auto\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/soc-brief-table-1024x1024.jpg 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/soc-brief-table-300x300.jpg 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/soc-brief-table-150x150.jpg 150w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/soc-brief-table-768x768.jpg 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/soc-brief-table-1536x1536.jpg 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/soc-brief-table-70x70.jpg 70w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/soc-brief-table-370x370.jpg 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/soc-brief-table-270x270.jpg 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/soc-brief-table-740x740.jpg 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/soc-brief-table.jpg 1800w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>LOLBin attacks: key tactics<\/em>\u00a0<\/figcaption><\/figure><\/div>\n\n\n<p>The abuse of Living Off the Land Binaries represents one of the most challenging detection scenarios for SOC teams. This technique involves hijacking legitimate Windows system utilities such as PowerShell, mshta.exe, and cmd.exe to execute malicious activities while blending with normal system processes. LOLBin abuse is particularly effective due to:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Legitimate Process Masquerading<\/strong>: Malicious activities appear to originate from trusted system binaries.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Antivirus Evasion<\/strong>: Many security solutions whitelist system utilities, allowing malicious commands to execute undetected.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Environmental Consistency<\/strong>: Attacks use tools that exist in every Windows environment, ensuring compatibility.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Reduced Forensic Footprint<\/strong>: Activities may be harder to distinguish from legitimate administrative tasks.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Let\u2019s observe an <a href=\"https:\/\/app.any.run\/tasks\/02dd6096-b621-49a0-a7ef-4758cc957c0f\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=webinar_new_tactics&amp;utm_term=141025&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">example of a typical LOLBin attack.<\/a>&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"489\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/imagec-1-1024x489.png\" alt=\"\" class=\"wp-image-16328\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/imagec-1-1024x489.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/imagec-1-300x143.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/imagec-1-768x367.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/imagec-1-1536x734.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/imagec-1-370x177.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/imagec-1-270x129.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/imagec-1-740x353.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/imagec-1.png 1765w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>LOLBin phishing attack with a fake .link<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>It might begin with a malicious .lnk file that executes mshta.exe through PowerShell to download executable files from remote servers. The attack chain often includes decoy actions (such as downloading legitimate PDF files) to distract from the real malicious payload delivery.&nbsp;&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"785\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/imaged-1-1024x785.png\" alt=\"\" class=\"wp-image-16331\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/imaged-1-1024x785.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/imaged-1-300x230.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/imaged-1-768x589.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/imaged-1-370x284.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/imaged-1-270x207.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/imaged-1-740x567.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/imaged-1-80x60.png 80w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/imaged-1.png 1277w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>ANY.RUN\u2019s script tracer shows a .pdf and a malware file downloads<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>We can see how the malware first downloads a .pdf file as a way to distract analysts, a moment later it downloads the final payload and executes it.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"974\" height=\"321\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/imagee.png\" alt=\"\" class=\"wp-image-16333\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/imagee.png 974w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/imagee-300x99.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/imagee-768x253.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/imagee-370x122.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/imagee-270x89.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/imagee-740x244.png 740w\" sizes=\"(max-width: 974px) 100vw, 974px\" \/><figcaption class=\"wp-element-caption\"><em>A stealer is delivered at the final stage of killchain<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>In this attack, the payload is DeerStealer, which can steal sensitive information and establish persistent access to compromised systems. The challenge for SOC teams lies in distinguishing between legitimate system administration activities and malicious abuse of the same tools.&nbsp;<br>&nbsp;<br>The biggest problem with LOLBin abuse is that it\u2019s hard to spot once the infection takes place. In the example above, the script connects to an external server to download the payload, and this activity would be spotted by detection systems.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>But an analyst might see it as a false positive because there&#8217;s no context for what happened after the connection. The context linking indicators to real incidents for fast, free of false-positives threat detection, SOC teams can leverage ANY.RUN\u2019s <a href=\"https:\/\/any.run\/threat-intelligence-feeds\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=webinar_new_tactics&amp;utm_term=141025&amp;utm_content=landing-feeds\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Intelligence Feeds<\/a>.&nbsp;&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"404\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image10-1-1024x404.png\" alt=\"\" class=\"wp-image-16336\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image10-1-1024x404.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image10-1-300x118.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image10-1-768x303.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image10-1-370x146.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image10-1-270x107.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image10-1-740x292.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/10\/image10-1.png 1026w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Threat Intelligence Feeds: data source, integration options<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>TI Feeds is a continuous stream of actionable network IOCs straight to SIEM, XDR, or SOAR systems, and helps SOC teams detect and block threats as soon as they emerge in malware samples. Just like TI Lookup, TI Feeds derives data from the latest sandbox investigations of 15,000 SOC teams around the world.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>This approach provides malicious IPs, domains, and URLs that have been active for no more than several hours and can still be used to detect attacks that are happening right now.&nbsp; All IOCs are linked to sandbox analysis sessions with all the telemetry and behavior data.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion&nbsp;<\/h2>\n\n\n\n<p>ClickFix attacks, advanced PhishKits, and LOLBin abuse represent just a few examples of the challenges facing modern SOC teams.&nbsp;<\/p>\n\n\n\n<p>Success in this environment requires a comprehensive approach that combines interactive analysis capabilities, current threat intelligence, and strategic automation. Organizations that invest in these capabilities see measurable improvements in detection rates, response times, and overall security posture.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">About ANY.RUN&nbsp;&nbsp;<\/h2>\n\n\n\n<p><a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=webinar_new_tactics&amp;utm_term=141025&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a> supports over 15,000 organizations across industries such as banking, manufacturing, telecommunications, healthcare, retail, and technology, helping them build stronger and more resilient cybersecurity operations.&nbsp; &nbsp;<br>&nbsp;<br>With our cloud-based <a href=\"https:\/\/any.run\/features\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=webinar_new_tactics&amp;utm_term=141025&amp;utm_content=linksandboxlanding\" target=\"_blank\" rel=\"noreferrer noopener\">Interactive Sandbox<\/a>, security teams can safely analyze and understand threats targeting Windows, Linux, and Android environments in less than 40 seconds and without the need for complex on-premise systems. Combined with <a href=\"https:\/\/any.run\/threat-intelligence-lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=webinar_new_tactics&amp;utm_term=141025&amp;utm_content=linktolookup\" target=\"_blank\" rel=\"noreferrer noopener\">TI Lookup<\/a>, YARA Search, and <a href=\"https:\/\/any.run\/threat-intelligence-feeds\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=webinar_new_tactics&amp;utm_term=141025&amp;utm_content=landing-feeds\" target=\"_blank\" rel=\"noreferrer noopener\">TI Feeds<\/a>, we equip businesses to speed up investigations, reduce security risks, and improve teams\u2019 efficiency.&nbsp;<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Recently, we have hosted a webinar exploring some of the latest malware and phishing techniques to show how interactive analysis and fresh threat intelligence can help SOC teams stay ahead. ANY.RUN\u2019s experts depicted the evolving landscape of malware tactics, highlighted real-world examples of sophisticated attacks, and provided practical detection tips for analysts. &nbsp;&nbsp;You can watch [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":16339,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[57,10,34,40],"class_list":["post-16292","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware-analysis","tag-anyrun","tag-cybersecurity","tag-malware-analysis","tag-malware-behavior"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>New Malware Tactics: Cases &amp; Detection Tips for SOCs and MSSPs - ANY.RUN&#039;s Cybersecurity Blog<\/title>\n<meta name=\"description\" content=\"Discover how modern SOC teams can detect advanced threats like ClickFix, PhishKits, and LOLBins faster using ANY.RUN.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/new-malware-tactics\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/new-malware-tactics\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/new-malware-tactics\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"New Malware Tactics: Cases &amp; Detection Tips for SOCs and MSSPs\",\"datePublished\":\"2025-10-14T08:36:56+00:00\",\"dateModified\":\"2025-10-29T10:02:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/new-malware-tactics\/\"},\"wordCount\":2192,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"cybersecurity\",\"malware analysis\",\"malware behavior\"],\"articleSection\":[\"Malware Analysis\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/new-malware-tactics\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/new-malware-tactics\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/new-malware-tactics\/\",\"name\":\"New Malware Tactics: Cases &amp; Detection Tips for SOCs and MSSPs - ANY.RUN&#039;s Cybersecurity Blog\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2025-10-14T08:36:56+00:00\",\"dateModified\":\"2025-10-29T10:02:38+00:00\",\"description\":\"Discover how modern SOC teams can detect advanced threats like ClickFix, PhishKits, and LOLBins faster using ANY.RUN.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/new-malware-tactics\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/new-malware-tactics\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/new-malware-tactics\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Malware Analysis\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/malware-analysis\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"New Malware Tactics: Cases &amp; Detection Tips for SOCs and MSSPs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"New Malware Tactics: Cases &amp; Detection Tips for SOCs and MSSPs - ANY.RUN&#039;s Cybersecurity Blog","description":"Discover how modern SOC teams can detect advanced threats like ClickFix, PhishKits, and LOLBins faster using ANY.RUN.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/new-malware-tactics\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/new-malware-tactics\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/new-malware-tactics\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"New Malware Tactics: Cases &amp; Detection Tips for SOCs and MSSPs","datePublished":"2025-10-14T08:36:56+00:00","dateModified":"2025-10-29T10:02:38+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/new-malware-tactics\/"},"wordCount":2192,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","cybersecurity","malware analysis","malware behavior"],"articleSection":["Malware Analysis"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/new-malware-tactics\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/new-malware-tactics\/","url":"https:\/\/any.run\/cybersecurity-blog\/new-malware-tactics\/","name":"New Malware Tactics: Cases &amp; Detection Tips for SOCs and MSSPs - ANY.RUN&#039;s Cybersecurity Blog","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2025-10-14T08:36:56+00:00","dateModified":"2025-10-29T10:02:38+00:00","description":"Discover how modern SOC teams can detect advanced threats like ClickFix, PhishKits, and LOLBins faster using ANY.RUN.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/new-malware-tactics\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/new-malware-tactics\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/new-malware-tactics\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Malware Analysis","item":"https:\/\/any.run\/cybersecurity-blog\/category\/malware-analysis\/"},{"@type":"ListItem","position":3,"name":"New Malware Tactics: Cases &amp; Detection Tips for SOCs and MSSPs"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/16292"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=16292"}],"version-history":[{"count":38,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/16292\/revisions"}],"predecessor-version":[{"id":16595,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/16292\/revisions\/16595"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/16339"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=16292"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=16292"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=16292"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}