We review vendors based on rigorous testing and research but also take into account your feedback and our affiliate commission with providers. Some providers are owned by our parent company.
Learn more
vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: Holiday.com, ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.
Advertising Disclosure

vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: Holiday.com, ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

ClickFix Phishing Attack Exploits SharePoint to Deliver Havoc

ClickFix Phishing Attack Exploits SharePoint to Deliver Havoc
Anka Markovic Borak First published on 5th March 2025 Writer and Quality Assessor

An emerging ClickFix phishing scam is exploiting Microsoft SharePoint to lure victims into running PowerShell commands that install the Havoc post-exploitation framework. Uncovered by Fortinet’s FortiGuard Labs, the attack uses fraudulent OneDrive errors to deceive users into executing malicious scripts, giving attackers remote access to infected devices.

Hackers distribute phishing emails with a HTML attachment labeled “Documents.html.” When opened, it displays a fake OneDrive error (0x8004de86) and urges users to update their DNS cache. Clicking the “How to fix” button copies a PowerShell command to the clipboard and instructs users to paste it into command prompt.

Executing this command triggers another PowerShell script hosted on an attacker-controlled SharePoint server. To avoid analysis, the script first checks if the device is in a sandboxed environment. If it detects a virtualized environment, it shuts down. Otherwise, it modifies the Windows Registry, installs Python if missing, and retrieves and runs a Python script from the same SharePoint site.

The script then delivers Havoc, an open-source hacking tool used for post-exploitation and network infiltration. The malware injects Havoc as a DLL, allowing attackers to maintain control, spread within networks, and execute further malicious operations.

To avoid detection, the malware communicates with the attacker’s command-and-control (C2) infrastructure using Microsoft’s Graph API, disguising malicious activity as legitimate SharePoint traffic.

ClickFix phishing campaigns are growing in sophistication, helping deploy malware strains like infostealers, remote access trojans, and DarkGate. Cybercriminals are also expanding beyond email, leveraging platforms like Telegram, where they use fake identity verification services to trick users into running malicious PowerShell commands.

In Q3 2023, phishing attacks surged 173%, reaching 493.2 million incidents, a record-breaking rise. With 1.2% of all daily emails containing malicious content — amounting to 3.4 billion phishing emails globally — phishing remains a dominant cyber threat.

To mitigate these risks, organizations should educate employees on phishing tactics, enforce strict access controls, and monitor cloud services for anomalies. Solutions such as NordVPN’s AI-powered phishing prevention tool, Sonar, can help detect and block phishing threats. As attackers continue to exploit trusted platforms like Microsoft SharePoint, security teams must stay vigilant against evolving threats.

About the Author

Anka Markovic-Borak is a writer and quality assessor at vpnMentor, who leverages her expertise to write insightful articles on cybersecurity, driven by her passion for protecting online privacy. She also ensures articles written by others are reaching vpnMentor's high standards.

Please, comment on how to improve this article. Your feedback matters!

Leave a comment

Sorry, links are not allowed in this field!

Name should contain at least 3 letters

The field content should not exceed 80 letters

Sorry, links are not allowed in this field!

Please enter a valid email address