New ClickFix Campaign Exploits AI Coding Tools
Security researchers discovered a sophisticated malvertising campaign in March 2026 that combines ClickFix social engineering tactics with fake AI coding assistant websites. The attack specifically targets developers and IT professionals who rely on AI-powered coding tools.
The campaign creates convincing replicas of popular AI coding platforms, tricking users into executing malicious commands through what appears to be legitimate command-line interfaces. This represents a new evolution of ClickFix attacks, which traditionally focused on fake error messages and system prompts.
Developers Using AI Coding Assistants at Risk
The campaign primarily targets software developers, DevOps engineers, and IT professionals who regularly interact with AI coding assistants and command-line tools. Users searching for AI coding solutions through search engines or clicking on malicious advertisements face the highest risk of exposure.
The attack exploits the growing trust developers place in AI-generated code suggestions and the common practice of copying and pasting commands from AI assistants without thorough verification.
ClickFix Technique Adapted for Developer Tools
The attackers use malvertising to drive traffic to fake websites that closely mimic legitimate AI coding platforms. Once on these sites, victims encounter what appears to be helpful code suggestions or system commands that actually contain malicious payloads.
The social engineering component relies on developers' familiarity with command-line interfaces and their tendency to quickly execute suggested commands during coding workflows. This makes the attack particularly effective against technical users who might otherwise be suspicious of traditional phishing attempts.







