Skip to content

ESET Threat Report: ClickFix fake error surges, spreads ransomware and other malware

 
  • A deceptive fake error attack vector, ClickFix, surged by over 500%, becoming the second most common attack method after phishing, and responsible for nearly 8% of all blocked attacks.
  • SnakeStealer overtook Agent Tesla as the most detected infostealer, while ESET helped disrupt two major malware-as-a-service operations – Lumma Stealer and Danabot.
  • Rivalries among ransomware gangs, including RansomHub, caused internal chaos. Despite more attacks, ransom payments dropped due to takedowns and trust issues.
  • Android adware detections jumped 160% due to the Kaleidoscope malware, while NFC-based fraud spiked by more than thirty-five-fold ,with tools like GhostTap and SuperCard X enabling more digital wallet theft.

BRATISLAVAJune 26, 2025 — ESET has released its latest Threat Report, which summarizes threat landscape trends seen in ESET telemetry and from the perspective of both ESET threat detection and research experts, from December 2024 through May 2025. One of the most striking developments this period was the emergence of ClickFix, a new, deceptive attack vector that skyrocketed by over 500% compared to H2 2024 in ESET telemetry.  This makes it one of the most rapidly rising threats, accounting for nearly 8% of all blocked attacks in H1 2025 and is now the second most common attack vector after phishing.

ClickFix attacks display a fake error that manipulates the victim into copying, pasting, and executing malicious commands on their devices. The attack vector affects all major operating systems including Windows, Linux, and macOS.  “The list of threats that ClickFix attacks lead to is growing by the day, including infostealers, ransomware, remote access trojans, cryptominers, post-exploitation tools, and even custom malware from nation-state-aligned threat actors,” says Jiří Kropáč, Director of Threat Prevention Labs at ESET.

The infostealer landscape also saw significant shifts. With Agent Tesla fading into obsolescence, SnakeStealer (also known as Snake Keylogger) surged ahead, becoming the most detected infostealer in our telemetry. SnakeStealer’s capabilities include logging keystrokes, stealing saved credentials, capturing screenshots, and collecting clipboard data. Meanwhile, ESET contributed to major disruption operations targeting Lumma Stealer and Danabot, two prolific malware-as-a-service threats.  Before the disruption, Lumma Stealer activity in H1 2025 was higher than in H2 2024 (+21%) and Danabot was up even more, by +52%.  This shows that both were prolific threats, making their disruption that much more important.

The ransomware scene further descended into chaos, with fights between rival ransomware gangs impacting several players, including the top ransomware as a service – RansomHub. Yearly data from 2024 shows that while ransomware attacks and the number of active gangs have grown, ransom payments saw a significant drop. This discrepancy may be the result of takedowns and exit scams that reshuffled the ransomware scene in 2024, but may also be partially due to diminished confidence in the gangs’ ability to keep their side of the bargain.

On the Android front, adware detections soared by 160%, driven largely by a sophisticated new threat dubbed Kaleidoscope. This malware uses a deceptive “evil twin” strategy to distribute malicious apps that bombard users with intrusive ads, degrading device performance. At the same time, NFC-based fraud shot up more than thirty-five-fold, fueled by phishing campaigns and inventive relay techniques. While the overall numbers remain modest, this jump highlights the rapid evolution of the criminals’ methods and their continued focus on exploiting NFC technology.

Our research into GhostTap shows how it steals card details so attackers can load victims’ cards into their own digital wallets and tap phones for fraudulent contactless payments worldwide. Organized fraud farms use multiple phones to scale these scams. SuperCard X packages NFC theft as a simple, minimalistic malware-as-a-service tool. It presents itself as a harmless NFC-related app, once installed on a victim’s device, it quietly captures and relays card data in real time for quick payouts.

“From novel social engineering techniques to sophisticated mobile threats and major infostealer disruptions, the threat landscape in the first half of 2025 was anything but boring,” summarizes Kropáč about the contents of the latest ESET Threat Report.

For more information, check out the ESET Threat Report H1 2025 on WeLiveSecurity.com. Make sure to follow ESET Research on Twitter (today known as X), BlueSky, and Mastodon for the latest news from ESET Research.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

ESET Named a Notable Provider in latest European MDR Landscape Report

BRATISLAVAJune 3, 2025ESET, a global leader in cybersecurity solutions, is proud to announce its recognition as a “Notable Provider” in Forrester’s recently released The Managed Detection and Response Services in Europe Landscape, Q2 2025 report. The report provides an overview of 26 MDR providers and serves as a strategic guide for security and risk (S&R) professionals seeking to navigate the evolving European MDR landscape.

As outlined in the report*, Forrester defines MDR services as: “Services that augment extended detection and response (XDR) tools with telemetry from network, identity, cloud, APIs, applications, and other log sources to produce high-fidelity detections, conduct investigations, support remote incident response, enable security automation, initiate threat hunts to identify adversaries that circumvent security controls, and help improve their clients’ overall security posture.

In our view, ESET´s inclusion in the report underscores its growing influence in the European cybersecurity market and reaffirms the company’s commitment to delivering high-quality, proactive threat detection and response capabilities.

“We are proud to be recognized by Forrester as a Notable Provider in the European MDR landscape,” said Michal Jankech, Vice President, Enterprise & SMB/MSP, at ESET. “For us, this acknowledgment is a testament to the relentless dedication of our global teams and our unwavering commitment to protecting organizations across Europe with cutting-edge, resilient cybersecurity solutions. As the threat landscape becomes increasingly complex and adversaries more sophisticated, we believe that MDR must evolve beyond traditional detection and response. At ESET, we are focused on delivering intelligent and cost-effective services that not only detect threats but also empower organizations to respond with speed, precision, and confidence.”

The European MDR market is becoming increasingly competitive and mature, leading customers to demand better services at lower costs. To stay competitive, providers are innovating with their offerings and pricing. As a consequence, S&R professionals will have a wide range of provider options to consider. The Forrester report identifies three major dynamics shaping the MDR market in Europe, all of which align closely with ESET’s MDR offerings:

  • European firms consider XDR an essential capability: ESET’s XDR-enabling solution delivers comprehensive, transparent threat visibility and response across endpoints, networks, and applications. Backed by over 30 years of cybersecurity innovation, it combines multilayered protection, intelligent automation, and expert-level customization.
  • AI helps fill talent gaps in detection, but not response: Complemented by expert insights, ESET effectively integrates AI into its MDR offerings through ESET AI Advisor. This tool delivers real-time, personalized threat insights, simplifies complex data for all skill levels, and boosts efficiency by automating routine tasks—empowering faster, smarter threat response.
  • Niche regional providers leverage localization and specialization to compete with dominant players: Leveraging its Central European roots, ESET delivers highly localized, regulation-aligned cybersecurity solutions across EMEA.

*Forrester: The Managed Detection And Response Services In Europe Landscape, Q2 2025. Tope Olufon with Jinan Budge, Min Say, Angela Lozada, Bill Nagel. May 1, 2025

Discover more about ESET MDR services and XDR solutions. The full report is available to Forrester clients with a valid subscription or for purchase.

Forrester does not endorse any company, product, brand, or service included in its research publications and does not advise any person to select the products or services of any company or brand based on the ratings included in such publications. Information is based on the best available resources. Opinions reflect judgment at the time and are subject to change. For more information, read about Forrester’s objectivity here.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

ESET will discontinue ESET Parental Control for Android

Keeping families safe in cyberspace has been one of the top priorities for ESET since its start in 1992. Throughout all these years, ESET has been improving its protection and bringing new features to make people’s digital lives as safe as possible.

The latest testament to this commitment is the AV-Comparatives’ Product of the Year 2024 Award for ESET HOME Security Essential, a welcomed accolade for our all-in-one household cybersecurity solution.

However, sometimes this journey ends and we need to say goodbye to some of our well-loved solutions, and currently the time has come for ESET Parental Control for Android.

Why has ESET Parental Control for Android reached its end-of-life?

Usually, IT products reach their End-of-Life (EOL) due to obsolescence. They are no longer desired, or better solutions replace them.

However, parental control apps are not out of favor. For example, approximately four in five parents living in the U.K. use at least one online safety tool, such as broadband parental control, screentime management apps, gaming console parental controls, or streaming and search safety settings, according to a 2023 study conducted by Internet Matters, a nonprofit organization.

Another reason for EOL is that, over time, maintenance and necessary upgrades to old products becomes increasingly difficult until companies decide to replace their functionality with entirely new software that is not limited by older code structure.

But that’s also not the case with ESET Parental Control, which is still available as a feature of ESET HOME Security.

So, what is the reason behind this move?

It’s quite simple. ESET Parental Control for Android is no longer needed. Built-in parental control features have reached such a high quality that users naturally utilize this option instead of stand-alone solutions.    

For ESET developers, this means that, from now on, they can focus on other tasks, bringing even more advancements to the ESET technology protecting households.   

What does it mean for users?

The End of Sales date for ESET Parental Control for Android date is June 30, 2025. After this date, customers cannot purchase a new subscription or renew their existing one.  

The End-of-Life date for ESET Parental Control for Android is June 30, 2026. After this date, users can no longer install, activate, or use the application and web portal. The app will no longer be active on their devices and unavailable on either the Google Play Store or the ESET HOME platform.

Monthly auto-renewals via Google Play will be active until May 2026, and monthly auto-renewals purchased through the ESET e-Store will stop after June 2025.  

ESET Parental Control features will continue to be available in ESET’s Windows products, including ESET HOME Security.

For more information, please visit ESET EOL website.

Worried about family? Opt for full protection

If you have enjoyed ESET Parental Control, consider ESET HOME Security, which protects households from various kinds of attacks, including malware, phishing, or identity theft, and covers commonly used smart devices such as smartphones, tablets, webcams, and more.

The purpose of ESET HOME Security is to secure families with an all-in-one solution that is effortless to use, easy to manage, and brings peace of mind with multilayered protection. And, yes, this means that users of ESET HOME Security for Windows still have ESET Parental Control available, so they don’t have to search for multiple cybersecurity products to protect their digital lives.   

So, let’s bid farewell to ESET Parental Control for Android knowing that this is not the end, but rather the next step in ESET’s devotion to protecting households and families with robust cybersecurity. 

 

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

ESET participates in operation to disrupt the infrastructure of Danabot infostealer

  • ESET Research has been tracking Danabot’s activity since 2018 as part of a global effort that resulted in a major disruption of the malware’s infrastructure.
  • While primarily developed as an infostealer, Danabot also has been used to distribute additional malware, including ransomware.
  • Danabot’s authors promote their toolset through underground forums and offer various rental options to potential affiliates.
  • This ESET Research analysis covers the features used in the latest versions of the malware, the authors’ business model, and an overview of the toolset offered to affiliates.
  • Poland, Italy, Spain and Turkey are historically one of the most targeted countries by Danabot.

BRATISLAVA, PRAGUEMay 22, 2025 — ESET has participated in a major infrastructure disruption of the notorious infostealer, Danabot, by the US Department of Justice, the FBI, and US Department of Defense’s Defense Criminal Investigative Service. U.S. agencies were working closely with Germany’s Bundeskriminalamt, the Netherlands’ National Police, and the Australian Federal Police . ESET took part in the effort alongside Amazon, CrowdStrike, Flashpoint, Google, Intel471, PayPal, Proofpoint, Team Cymru and Zscaler. ESET Research, which has been tracking Danabot since 2018, contributed assistance that included providing technical analysis of the malware and its backend infrastructure, as well as identifying Danabot’s C&C servers. During that period, ESET analyzed various Danabot campaigns all over the world, with Poland, Italy, Spain and Turkey historically being one of the most targeted countries. The joint takedown effort also led to the identification of individuals responsible for Danabot development, sales, administration, and more.

These law enforcement operations were conducted under Operation Endgame — an ongoing global initiative aimed at identifying, dismantling, and prosecuting cybercriminal networks. Coordinated by Europol and Eurojust, the operation successfully took down critical infrastructure used to deploy ransomware through malicious software.

“Since Danabot has been largely disrupted, we are using this opportunity to share our insights into the workings of this malware-as-a-service operation, covering the features used in the latest versions of the malware, the authors’ business model, and an overview of the toolset offered to affiliates. Apart from exfiltrating sensitive data, we have observed that Danabot is also used to deliver further malware, which can include ransomware, to an already compromised system,” says ESET researcher Tomáš Procházka, who investigated Danabot.

The authors of Danabot operate as a single group, offering their tool for rental to potential affiliates, who subsequently employ it for their malicious purposes by establishing and managing their own botnets. Danabot’s authors have developed a vast variety of features to assist customers with their malevolent motives. The most prominent features offered by Danabot include: the ability to steal various data from browsers, mail clients, FTP clients, and other popular software; keylogging and screen recording; real-time remote control of the victims’ systems; file grabbing (commonly used for stealing cryptocurrency wallets); support for Zeus-like webinjects and form grabbing; and arbitrary payload upload and execution. Besides utilizing its stealing capabilities, ESET Research has observed a variety of payloads being distributed via Danabot over the years.  Furthermore, ESET has encountered instances of Danabot being used to download ransomware onto already compromised systems.

In addition to typical cybercrime, Danabot has also been used in less conventional activities such as utilizing compromised machines for launching DDoS attacks… for example, a DDoS attack against Ukraine’s Ministry of Defense soon after the Russian invasion of Ukraine.

Throughout its existence, according to ESET monitoring, Danabot has been a tool of choice for many cybercriminals and each of them has used different means of distribution. Danabot’s developers even partnered with the authors of several malware cryptors and loaders, and offered special pricing for a distribution bundle to their customers, helping them with the process.  Recently, out of all distribution mechanisms ESET observed, the misuse of Google Ads to display seemingly relevant, but actually malicious, websites among the sponsored links in Google search results stands out as one of the most prominent methods to lure victims into downloading Danabot. The most popular ploy is packing the malware with legitimate software and offering such a package through bogus software sites or websites falsely promising users to help them find unclaimed funds. The latest addition to these social engineering techniques are deceptive websites offering solutions for fabricated computer issues, whose only purpose is to lure victims into execution of a malicious command secretly inserted into the user’s clipboard.

The typical toolset provided by Danabot’s authors to their affiliates includes an administration panel application, a backconnect tool for real-time control of bots, and a proxy server application that relays the communications between the bots and the actual C&C server. Affiliates can choose from various options to generate new Danabot builds, and it’s their responsibility to distribute these builds through their own campaigns.

“It remains to be seen whether Danabot can recover from the takedown. The blow will, however, surely be felt, since law enforcement managed to unmask several individuals involved in the malware’s operations,” concludes Procházka.

For technical overview of Danabot and insight into its operation, check out ESET Research blogpost: “Danabot: Analyzing a fallen empire” on WeLiveSecurity.com. Make sure to follow ESET Research on Twitter (today known as X), BlueSky, and Mastodon for the latest news from ESET Research.

Worldwide Danabot detections as seen in ESET telemetry since 2018

Example of typical Danabot infrastructure

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

ESET Cyber Security Pro and ESET Cyber Security merge

Being a cybersecurity leader and a protector of your digital progress, ESET understands that to stay on top of this game requires endless innovation and improvement. This also applies to macOS, which many incorrectly perceive as a broadly secure operating system that doesn’t require additional protection.

To achieve the best possible protection for macOS users, ESET made a strategic decision to revamp its ESET Cyber Security solution protecting macOS devices and merge ESET Cyber Security Pro with the latest version of ESET Cyber Security. 

The importance of macOS security

It’s well known that macOS has held a reputation for having a more secure operating system due to several key factors. First, Apple keeps tight control over both hardware and software as macOS is designed to run exclusively on Apple’s own devices. This closed ecosystem allows Apple to implement stringent security measures.

Additionally, macOS is built on a Unix-based foundation benefiting from its permission-based architecture that restricts unauthorized access to system files. On top of that, Apple provides multiple built-in security features that collectively create a robust security environment.

However, the perception of macOS as a highly secure operating system does not mean that it is immune to malware. Cybercriminals are continually evolving their tactics, and macOS is not exempt from their efforts. Simply, the ever-increasing popularity of Apple devices has made them a more attractive target for attackers.

For example, ESET telemetry coming from macOS devices shows that password-stealing ware (PSW), which often targets credentials related to cryptocurrency wallets, increased by 127% in H2 2024. In a similar manner, ESET telemetry also detected a skyrocketing 320% increase in cryptomining malware targeting macOS users to abuse the computing power of their devices to make money.

What is happening to ESET Cyber Security for macOS?

To face current and upcoming threats to macOS users, ESET has been building an entirely new version of ESET Cyber Security with a completely overhauled architecture for enhanced functionality, stability, and future-proof performance.

Starting from scratch, ESET created a new code base allowing developers to focus on performance improvements and adding new features instead of increasingly demanding maintenance.

The latest version of ESET Cyber Security is included in ESET’s all-in-one protection for households — ESET HOME Security. It offers both higher performance and stability, network profiles, firewall, license-based features, and more.

All these changes mean that users can expect all the capabilities of the legacy ESET Cyber Security Pro and even more features in the near future.

Important dates and information

The end of sales for ESET Cyber Security Pro already took place November 15, 2024. Since then, users have not been able to purchase a new ESET Cyber Security Pro subscription. 

The End-of-Life date for ESET Cyber Security Pro is November 18, 2025. After this date, users can no longer renew, install, activate, or use our ESET Cyber Security Pro product. The application won’t be able to download new modules and will become inactive with a red error status (indicating modules are not up to date).

Users can already see a notification about the new version in the Update section of the application containing a download link to the latest ESET Cyber Security application.

For more information, please visit the ESET EOL website and the Support change for version 6 of ESET endpoint products for macOS.

Enjoy full protection

With improved macOS protection included in ESET HOME Security, you can rest assured that your smart home devices are fully protected from various kinds of attacks thanks to Antivirus & Antispyware, Firewall, Web and Email Scanning, Anti-phishing, and more. Users of the highest tier – ESET HOME Security Ultimate – get additional services, including ESET Identity Protection and ESET VPN.

As ESET developers have breathed new life into ESET Cyber Security, more exciting news is coming soon, so stay tuned for updates.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×