CybersecurityNewswireStartupsTechnology

Push Security Stops Malicious Copy-Paste Attacks

Originally published on: December 19, 2025
▼ Summary

– Push Security has released a new feature called malicious copy-and-paste detection to block ClickFix-style attacks by preventing users from copying and running malicious scripts in their web browser.
– ClickFix attacks are a fast-growing cyber threat, with reports showing a 400-517% surge, and they manipulate victims into copying malicious code from fake web challenges to deliver malware or steal data.
– The new detection technology distinguishes between legitimate copying activity and malicious scripts, aiming to provide high-fidelity alerts with minimal disruption to user workflows.
– This approach stops attacks early in the browser, addressing a gap where traditional email, network, and endpoint security tools often fail to detect or prevent ClickFix.
– The feature is part of Push Security’s broader browser defense platform and follows their research, which also recently uncovered a new related attack technique called “ConsentFix.”

A significant new cybersecurity tool has been launched to combat a rapidly escalating threat vector. Push Security has unveiled a malicious copy-and-paste detection feature specifically engineered to disrupt ClickFix-style attacks. This innovation operates by monitoring and blocking the precise user action that enables these schemes, preventing malicious scripts copied in a web browser from ever being executed on a local machine. The approach aims to neutralize attackers at the very first step of their process.

The technology works by intelligently analyzing copy events within the browser. It differentiates between normal, legitimate activities, such as an employee copying code from a trusted development platform, and the suspicious copying of obfuscated scripts from a deceptive webpage. This focus on high-fidelity behavioral analysis is designed to generate minimal false alarms, ensuring security without interrupting daily work.

ClickFix attacks, also known as fake CAPTCHA or FileFix schemes, have seen explosive growth, with some reports indicating a surge of over 500% in just half a year. These attacks trick users into believing they must complete a web-based challenge, like solving a CAPTCHA or fixing a page error. The “solution” involves copying a block of malicious code and pasting it into a browser console, which then executes a harmful script. This method has become a favorite for ransomware groups and has been connected to major breaches across finance, healthcare, and government sectors.

Jacques Louw, Chief Product Officer at Push Security, explained the critical gap this feature addresses. He noted that existing email filters and network security tools often fail to catch these attacks during delivery, while endpoint protections are frequently bypassed during execution. By focusing on the browser itself, the new control stops the attack chain before any malware is delivered or credentials are stolen.

The company emphasizes that its solution is built on a foundation of deep research into attacker behavior. The goal is to create defenses that target actions adversaries cannot easily avoid. This research-led methodology recently led to the discovery of a related technique dubbed “ConsentFix.” This newer attack can compromise user accounts through a similar copy-paste mechanism, potentially bypassing even phishing-resistant authentication like passkeys if the user is already logged into an application.

Key advantages of the new detection capability include its broad applicability and non-disruptive nature. It is designed to be effective against all known ClickFix variants, no matter the lure used or the final payload. Importantly, it does not block legitimate copy-paste actions, avoiding the productivity friction common with some endpoint or data loss prevention tools. This allows for early intervention, aiming to stop threats before they gain a foothold on the network.

This malicious copy-paste detection integrates into Push Security’s existing browser security platform, which also guards against threats like session hijacking, malicious extensions, and fraudulent OAuth integrations. The addition represents a focused effort to stay ahead of techniques that evolve more quickly than traditional defensive measures can adapt.

(Source: HelpNet Security)

Topics

clickfix attacks 95% malicious copy-paste detection 93% browser security 90% cyber threat evolution 85% security innovation 85% research-driven security 85% ransomware threats 80% attack statistics 80% early attack intervention 80% User Experience 75%