Was this helpful?
Thumbs UP Thumbs Down

SharePoint Under Attack as Havoc Malware Spreads

Microsoft SharePoint mobile app on screen
Hacker tries to enter the system using codes and numbers

Hackers Are Hiding in Plain Sight

Cybercriminals are getting smarter, using a sneaky trick called ClickFix to fool people into downloading malware. They create fake error messages that look real and make you believe something is wrong with your computer.

These fake messages tell you to fix the issue by copying and pasting a command into your system. But instead of fixing anything, you unknowingly give hackers access to your device.

Microsoft SharePoint mobile app on screen

A Surprising Target

Microsoft SharePoint is a widely used platform for sharing and storing documents. But now, hackers have found a way to turn it into a weapon. Instead of sending obvious phishing links, attackers host their malware directly inside SharePoint.

Since SharePoint is a trusted service, most people don’t think twice before clicking links or downloading files. Hackers take advantage of this trust, using SharePoint to store and distribute harmful scripts.

Error problem with connection displayed on phone.

Fake Error Messages Fool Users

Picture this: You open an email and find a document attachment. You click it, and suddenly, an error pops up claiming that your OneDrive connection has failed. It tells you to run a simple command to fix it.

The message looks convincing, so you follow the instructions. But that command does something much worse: it downloads and runs malicious software. These fake error messages are designed to appear real, making even cautious users fall for the trick.

Man working on computer using mouse

The Power of a Single Click

One small action can lead to big problems. ClickFix attacks rely on tricking users into clicking a single button that copies a command to their clipboard. The next step is even sneakier; it asks you to paste and run that command into your terminal.

This might seem harmless, but when you execute it, you give hackers direct access to your computer. They don’t need you to download anything or visit a sketchy website; they only need you to follow their “fix” instructions.

Hands of hacker with mobile phone and laptop in the dark.

Meet Havoc

Hackers aren’t just spreading random viruses; they’re deploying a sophisticated toolkit called Havoc. This open-source post-exploitation framework gives cybercriminals full control over an infected system.

Once installed, Havoc lets attackers run commands, steal sensitive data, and even spread to other devices in a network. It’s similar to Cobalt Strike, a well-known hacking tool criminals and cybersecurity professionals use.

Gmail app icon displayed on a phone screen.

Emails That Look Too Real

Phishing emails have come a long way. Hackers are now crafting messages that look exactly like real alerts from Microsoft. These emails often warn you about a security issue and urge you to open an attached document.

Once you open it, a fake error message appears, instructing you to run a command to fix the issue. These emails use urgent language to create a sense of panic, making people act quickly without thinking.

Copy paste keyboard tool

The Danger of Copy-Paste Commands

Most people don’t realize that copying and pasting a command can be dangerous. ClickFix attacks take advantage of this by tricking users into running malicious scripts. The command looks harmless at first glance, but once executed, it installs malware without further action.

By the time you realize what happened, it’s too late. The malware is already inside your system, collecting data and sending it back to the attacker.

Microsoft Teams logo displayed on a phone

Attackers Use Trusted Services

Hackers exploit users’ inherent trust in platforms like Microsoft SharePoint, OneDrive, and Teams, using these services to spread malware. Instead of hosting their attack on suspicious websites, they hide malicious scripts inside trusted cloud services.

This makes it much harder for antivirus programs to detect the attack. Since everything appears to come from a known and safe source, users don’t suspect a thing.

Programming language PowerShell inscription on the background of computer code

Why Hackers Love PowerShell

PowerShell is one of the most powerful tools in Windows, designed to automate tasks and manage systems. But cybercriminals have found a way to turn it into a dangerous weapon.

Hackers can install malware, steal sensitive information, and disable security protections by tricking users into running PowerShell commands. Since PowerShell is a built-in tool, most security software doesn’t block it, making it the perfect choice for sneaky attacks like ClickFix.

Malware alert on laptop.

What Happens After Infection?

Once the malware is installed, it immediately connects to a hacker-controlled server. This allows the attacker to issue commands, steal data, and even spread to other devices in the same network.

Some malware stays hidden for months, quietly collecting information and sending it back to the attacker. Others act quickly, locking files and demanding ransom. Either way, hackers have complete control once your system is infected, and removing the malware becomes a difficult task.

Software update on a laptop screen

A New Twist on an Old Trick

ClickFix attacks aren’t new, but hackers keep improving their methods. Early versions of this scam used fake software updates, but now attackers hide their malware inside trusted Microsoft services.

Using platforms like SharePoint, they can launch attacks without raising red flags. This new approach makes detecting and stopping these scams even harder before they cause serious damage.

Man suffering from migraine and working on a laptop

Even Tech-Savvy Users Are at Risk

Many people think they’re too smart to fall for phishing scams, but ClickFix differs. It doesn’t rely on poorly written emails or obvious fake websites.

Instead, it uses realistic error messages and convincing instructions. Even security-conscious users can be tricked into running a simple command, unknowingly giving hackers access to their devices.

Closeup of a businessperson looking at laptop screen showing that files have been encrypted

Hackers Target Businesses Too

ClickFix attacks aren’t just aimed at individuals; businesses are major targets. Once hackers access a company network, they can move from one computer to another, stealing data and spreading malware.

This can lead to massive data breaches, financial losses, and even shutdowns. Companies that rely on cloud services are especially at risk, as hackers use trusted platforms to hide their attacks.

Looking at a Microsoft Windows key on a keyboard through a magnifying glass

How to Stay Safe

Stop and think if you ever see an error message telling you to run a command to fix something. Hackers rely on people acting quickly without questioning the instructions.

Instead of following the steps, look up the issue on an official Microsoft website or contact an IT professional. Staying cautious can protect you from falling into these traps.

Credit card phishing attack

Spotting Suspicious Emails

Be wary of emails that create a sense of urgency or ask you to download an attachment. Attackers use emotional triggers to rush you into action.

Always check the sender’s email address and look for signs of phishing, like misspellings or odd formatting. Don’t open the attachment or click links if something feels off.

Want to keep your inbox safe? Check out millions advised to change Gmail settings now for tips on protecting your email.

Alert on phone

Awareness Is Your Best Defense

Cybercriminals count on people being unaware of their tactics. The more you know, the harder it is for them to succeed.

You can protect yourself and your data from cyber threats by staying informed, questioning suspicious messages, and avoiding unnecessary downloads or commands.

Stay one step ahead of hackers. Learn how cyber scammers upgrade tactics with AI and what you can do to stay protected.

Have you ever encountered a fake error message or tech scam? Share your experience in the comments.

Read More From This Brand:

Don’t forget to follow us for more exclusive content right here on MSN.

If you liked this story, you’ll LOVE our FREE emails. Join today and be the first to get stories like this one.

This content is exclusive for our subscribers.

Get instant FREE access to ALL of our articles.

Was this helpful?
Thumbs UP Thumbs Down
Prev Next
Share this post

Lucky you! This thread is empty,
which means you've got dibs on the first comment.
Go for it!

Send feedback to ComputerUser



    We appreciate you taking the time to share your feedback about this page with us.

    Whether it's praise for something good, or ideas to improve something that isn't quite right, we're excited to hear from you.