Social engineering keeps evolving, and cybercriminals have found a new way to hide malware in your browser cache, bypassing even the most advanced antivirus tools. This attack, known as FileFix, was recently uncovered by researchers at Expel and is raising concern in the cybersecurity community due to its stealth and sophistication.
At TecnetOne, we break down how this attack works, why it’s dangerous, and what you can do to protect your organization.
FileFix is a next-gen evolution of the social engineering technique ClickFix, originally developed by researcher “Mr.d0x”.
Instead of asking users to run malicious scripts directly from their operating system, FileFix leverages Windows File Explorer as the delivery method.
In short, the attacker tricks the victim into copying and pasting a seemingly harmless network path that secretly contains a hidden PowerShell command.
The latest variant, discovered by researcher Marcus Hutchins from Expel, adds a dangerous twist: cache smuggling, a method that stores malicious files in the browser cache — making the attack nearly invisible to both the user and traditional security tools.
Read more: What is the difference between an antivirus vs EDR?
Fortinet VPN Compliance Check FileFix lure (Source: Expel)
How a copied command appears in File Explorer address bar (Source: Expel)
Cache smuggling is the most innovative part of this attack. It works like this:
“The malware introduces a full ZIP file into the system without PowerShell ever making a web request. That’s what makes this attack undetectable.”
— Marcus Hutchins
Since nothing suspicious is downloaded explicitly, most antivirus and firewall tools won’t raise any red flags.
IUAM ClickFix Generator interface (Source: Unit 42)
The FileFix attack relies entirely on human interaction. Fake websites are professionally designed, imitating brands like:
They use formal language and fake IT instructions to lower the user’s guard. Victims are told they need to run a verification step to remain compliant with internal security policies, tricking them into executing the malicious path.
Researchers from Palo Alto’s Unit 42 also discovered a ClickFix Generator toolkit, allowing attackers to automate this type of attack.
It lets cybercriminals:
Campaigns using this toolkit have already delivered DeerStealer, Odyssey, and other info-stealers targeting both Windows and macOS.
Microsoft ClickFix lure (Source: BleepingComputer)
At TecnetOne, we emphasize proactive prevention and user awareness. Here’s what you can do:
You might also be interested in: LunaSpy: The Fake Antivirus Spying on Your Phone
The FileFix attack proves that cybercriminals no longer need to breach firewalls or exploit zero-days. All it takes is a browser, a cache, and a human who follows instructions.
With cache smuggling, we’re entering a new era of invisible threats that bypass traditional antivirus tools and rely on normal user behavior to deploy malware.
At TecnetOne, we urge all organizations to strengthen endpoint controls, monitor system behaviors, and, above all, educate users to think before they click.