Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Trellix Source Code Breach: Hackers Access Repository
May 2, 2026
Hackers Exploit cPanel Flaw to Breach Government Military
May 2, 2026
Exim Mail Server Vulnerabilities Lead to Crash via DNS Data
May 2, 2026
Home/Threats/ClickFix Campaign Hijacks Facebook Sessions via Fake Pages
Threats

ClickFix Campaign Hijacks Facebook Sessions via Fake Pages

Dubbed ClickFix, a widespread campaign has emerged, designed to steal Facebook account credentials by tricking users into surrendering their session tokens. Rather than using complex malware or...

Jennifer sherman
Jennifer sherman
January 22, 2026 4 Min Read
0 0

Dubbed ClickFix, a widespread campaign has emerged, designed to steal Facebook account credentials by tricking users into surrendering their session tokens.

Rather than using complex malware or software exploits, the attack relies on social engineering to guide victims through a fake verification process.

This campaign has grown significantly since early 2025 and continues to target content creators and business page owners who seek Facebook verification badges.

The ClickFix attack works by combining trust and urgency. Victims receive messages about free verified badges or urgent account reviews. When they click the link, they land on a page that looks exactly like Facebook’s official help center or verification portal.

A novel phishing campaign targeting content creators via manual token theft (Source - Hunt.io)
A novel phishing campaign targeting content creators via manual token theft (Source – Hunt.io)

The page explains that the user has been selected for verification or that their account has been flagged for policy violations. This creates pressure to act quickly.

Once on the fake page, victims are guided through a multi-stage process that appears legitimate but is designed to extract their authentication tokens.

The attackers show instructional videos that teach users how to access their browser’s developer tools and copy their Facebook session tokens, specifically the values labeled c_user and xs. Users are told this is a normal verification step and necessary to confirm their identity.

Hunt.io analysts and researchers identified this campaign after Unit42 Threat Intelligence first reported it in December 2025. The investigation revealed that attackers have created at least 115 distinct phishing pages and eight data collection endpoints.

Initial phishing entry point hosted on Vercel masquerading as a 'Face Verification' page (Source - Hunt.io)
Initial phishing entry point hosted on Vercel masquerading as a ‘Face Verification’ page (Source – Hunt.io)

The campaign has been active since January 2025 and primarily targets content creators, monetized pages, and businesses seeking verification status.

A single stolen session token gives attackers complete account control, enabling them to change passwords, steal payment information, and impersonate the victim.

The infrastructure behind this campaign is deliberately scattered across multiple hosting platforms to avoid detection.

Phishing pages are hosted on Netlify, Vercel, Wasmer, GitHub Pages, Surge, and other abuse-friendly services. When a page gets taken down, the attacker simply deploys a new one within minutes.

The stolen session tokens are sent to separate data collection endpoints backed by services like Formspark and submit-form.com, which are decoupled from the phishing pages themselves.

How the Attack Flow Works

The infection mechanism starts with a redirect chain designed to feel seamless. Users might click a link from social media promising a free blue badge or claiming their page has been flagged.

This initial page displays an animated verification screen with sound effects and timed animations to build credibility.

Once the animation completes, the victim is automatically redirected to a second page that fully impersonates Facebook’s branding, including logos, colors, and official-looking language.

A form to get Facebook Authentication tokens from victims to continue the verification process (Source - Hunt.io)
A form to get Facebook Authentication tokens from victims to continue the verification process (Source – Hunt.io)

At this stage, prominent red warnings and urgent messaging push the user to continue.

The page displays something like “Action Required” buttons and countdown timers to trigger immediate responses.

The victim is presented with an embedded instructional video that explicitly walks through the manual extraction process. The video shows how to open browser developer tools, navigate to the Storage or Application tab, and copy the exact session cookie values.

This is the critical step where victims voluntarily hand over their authentication tokens.

Once the user enters their c_user and xs values into a form field, the JavaScript code validates the tokens in real time to ensure they match legitimate Facebook session patterns.

This filtering reduces noise on the attacker’s backend and ensures only valid, reusable sessions are captured.

The script includes instructions telling victims not to log out for 24 hours, which keeps the harvested cookies valid long enough for immediate account takeover.

If the initial token theft succeeds, the attacker gains instant access to the account and can begin making changes.

However, if the stolen session fails to work later, the attack has fallback options. The fake verification page introduces additional harvesting stages where victims are asked to provide backup or recovery codes.

After these codes are collected, a pop-up appears claiming that additional password verification is needed.

This final request tricks users into surrendering their actual Facebook password, completing a full credential harvesting chain that gives attackers multiple ways to regain access even if the session token becomes invalid.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitMalwarephishingThreat

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

Critical Vivotek Flaw Allows Remote Code Injection Expl

Next Post

r1z Initial Access Broker’s Major OPSEC Researchers Detailed

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
cPanelSniper PoC Exploit for cPanel Vulner Disclosed Vulnerability
May 2, 2026
EtherRAT Targets Enterprise Admins with SEO Poison
May 1, 2026
New Spyware Platform: Rebrand & Resell Android Lets Buyers
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us