The scripts deploy malware on these devices, and the “payloads affect Windows and macOS devices,” according to Microsoft, which leads to “information theft and data exfiltration.” The malware, however, can be anything from a type of initial access for ransomware to an entry point for attacking a larger enterprise network.
Initially, ClickFix surfaced as a technical assistance pop-up before moving to Captchas. Fake challenges to use a website are now using a copy, paste, and run command instead of your standard ‘choosing the correct cars and bus’ challenge. The user is instructed to click prompts and copy, paste, and run commands “directly in the Windows Run dialog box, Windows Terminal, or Windows PowerShell,” Microsoft says, and it’s usually blended with “delivery vectors such as phishing, malvertising, and drive-by compromises, most of which even impersonate legitimate brands and organizations to reduce suspicion from their targets further.”
Users should be careful not to run these prompts. You may be lured in various ways that seem innocent, but never copy and paste and run a script in Windows. You can be safe this way. However, as it happens, due to the advancement of these attacks, the awareness part is lacking on the users’ end.
As ClickFix depends on human prompts to start the malicious commands, it can dodge traditional and automated security checks. Organizations can limit the effect of this tactic by “educating users in recognizing its lures and by implementing policies that will harden device configurations,” Microsoft says.
Microsoft’s latest report provides in-depth details about the various baits and attack techniques cybercriminals are using. According to Microsoft, “A typical ClickFix attack begins with threat actors using phishing emails, malvertisements, or compromised websites to lead unsuspecting users to a visual lure — usually a landing page — and trick them into executing a malicious command themselves.”
Cybersecurity has emerged as the biggest threat to modern enterprises, yet most organizations remain far from prepared to handle it. Business leaders are aware of the risks — financial losses, reputational harm, and operational disruptions but awareness has not translated into effective readiness.
A recent global survey conducted in early 2025 across North America, Western Europe, and Asia-Pacific highlights this growing concern. With 600 respondents, including IT and security professionals, the study found that while executives admit to weak points in their defenses, they often lack a unified plan to build true resilience.
Where businesses fall short
Companies tend to focus heavily on protecting their data, ensuring quality, security, and proper governance. While crucial, these efforts alone are not enough. A resilient business must also address application security, identity management, supply chain safeguards, infrastructure defenses, and the ability to continue operations during an attack. Unfortunately, many firms still fall behind in tying all these dimensions into a cohesive strategy.
Why this matters now
Cyberattacks are no longer rare, one-off incidents. Nearly two-thirds of the organizations surveyed experienced at least one damaging cyber event in the past year. About one-third suffered multiple breaches in that period. These attacks caused not just stolen data but also costly downtime, compliance issues, and long-lasting damage to trust.
The survey’s findings revealed that:
• 38% of organizations faced major operational disruption, with outages and downtime hitting productivity hardest.
• 33% reported financial losses linked directly to an attack.
• Around 30% to 31% saw personal or sensitive data exposed or compromised.
• Nearly a quarter of cases involved data corruption or encryption that could not be fully reversed.
• Legal consequences, public backlash, and compliance failures added further damage.
The message is clear: cybersecurity is not just a technical concern, it is a business survival issue.
The study also shows that three once-separate areas are beginning to merge. Backup and recovery systems, once viewed as insurance, are now central to cyber resilience. Cybersecurity tools are extending beyond perimeter defense to include recovery and continuity. At the same time, data governance and compliance pressures have become inseparable from security practices.
As artificial intelligence gains ground in enterprise operations, this convergence is likely to intensify. AI requires clean, reliable data to function, but it also introduces fresh security risks. Companies that cannot safeguard and recover their data risk losing competitiveness in an economy increasingly powered by digital intelligence.
No safe corners in digital infrastructure
Attackers are methodical and opportunistic. They exploit weak points wherever they exist whether in data systems, applications, or even AI workloads. Defenders must therefore strengthen every layer of their infrastructure. Yet, according to the survey, most organizations still leave gaps that skilled adversaries can exploit.
Cybersecurity is now the most significant risk enterprises face. And while business leaders are no longer in denial about the threat, too many remain underprepared. Building resilience requires more than just securing data; it demands a comprehensive, ongoing effort across every layer of the digital ecosystem.