Discussion about this post

User's avatar
Neural Foundry's avatar

Excellent writeup on this ClickFix variant. The abuse of digitally signed App-V scripts to proxy PowerShell is clever since most EDR tools whitelist Microsoft-signed binaries by default. The Google Calendar C2 mechanism is especially interesting becasue it blends into normal enterprise traffic patterns. I've noticed similar LOTL tactics in recent campaigns where attackers leverage WMI or scheduled tasks insteadof dropping new executables, and this App-V approach fits that same evasion playbook.

No posts

Ready for more?