The Copy Button Lied: A ClickFix Attack Hid an Infostealer Behind a Fake Cloudflare Check on the Based Apparel Site

The Based Apparel merchandise site was pulled offline on May 22 after reports it served a ClickFix attack: a fake Cloudflare check whose 'copy' button placed a hidden shell command on the clipboard, then asked visitors to paste it into their own terminal.

Share
Line-art browser window with a checkbox and a button, linked through a clipboard icon to a terminal window; the button holds a red dot.

ClickFix is the fast-spreading 2026 social-engineering pattern where a website tricks the visitor into running the attacker's command themselves. On May 22, 2026, the merchandise site Based Apparel was pulled offline after reports it had been compromised to serve exactly such an attack: a spoofed Cloudflare verification page whose 'copy' button silently placed a base64-encoded shell command on the clipboard, then prompted visitors to paste the 'verification' string into their own terminal. ClickFix defeats most web-malware defenses because the malicious code never executes in the browser — the victim runs it. A compromised brand website is simply the delivery vehicle; the technique is the threat.

WASHINGTON, D.C. — On May 22, 2026, the merchandise website Based Apparel (basedapparel[.]com) was taken offline after reports that it had been compromised to distribute malware to visitors using a social-engineering technique known as ClickFix. According to reporting led by TechCrunch, visitors to the site were shown a fake Cloudflare verification page displaying innocuous-looking text — "I am not a robot: Cloudflare Verification ID: 801470" — alongside a "copy" button. Clicking the button did not copy the visible text; it silently placed a base64-encoded shell command on the visitor's clipboard, and the page then prompted the user to paste the "verification" string into their computer's terminal, which executed the hidden command. On macOS, the documented payload downloaded an infostealer that harvested stored credentials from Chromium-based browsers and data from cryptocurrency wallets, bundled them into a zip archive, and sent them to an attacker-controlled domain; the payload was flagged as malicious by 27 antivirus engines. Based Apparel is the clothing brand of FBI Director Kash Patel, but the news value here is the technique, not the brand — a compromised brand website is one delivery vehicle for ClickFix among many.

Disclosure Overview
FieldDetails
IncidentThe merchandise site Based Apparel (basedapparel[.]com) was reported compromised to serve a ClickFix social-engineering attack and was pulled offline
Date ReportedMay 22, 2026 — first surfaced by site visitors on social media before the site was taken down
TechniqueClickFix — visitors shown a fake/spoofed Cloudflare verification page; a "copy" button placed a hidden base64-encoded shell command on the clipboard; visitors were prompted to paste it into their own terminal
Documented PayloadOn macOS, the path downloaded an infostealer that harvested stored credentials from Chromium-based browsers and cryptocurrency-wallet data, zipped them, and sent them to an attacker-controlled domain
DetectionThe payload was flagged as malicious by 27 antivirus engines and classified as a Trojan and infostealer
Delivery VehicleA compromised brand/merchandise website — Based Apparel is the clothing brand of FBI Director Kash Patel; the website is the delivery vehicle, ClickFix is the threat
AttributionNone — no threat actor has been identified or attributed, and how the site was initially compromised is unknown
CoverageReported by TechCrunch (primary reporting), IBTimes UK, San.com, and Yahoo Tech across the May 22, 2026 cycle

What Happened

What ClickFix Is and Why It Works

ClickFix is a social-engineering technique, not a software exploit, and that distinction is the whole story. In a ClickFix attack, a website does not try to run malicious code inside the visitor's browser — the place where browser sandboxes, web filters, and email-gateway defenses are designed to catch it. Instead, it persuades the visitor to copy a string and run it themselves, in their own terminal, PowerShell, or Run dialog. The attacker's code therefore never executes in the browser at all; it executes as a command the user typed, with the user's own permissions. Because the malicious step happens outside the browser and outside email, most web-malware and phishing defenses simply never see it. That is why ClickFix has become one of the fastest-growing social-engineering patterns of 2026: it sidesteps the defenses organizations have spent years building.

How the Fake Cloudflare Check Worked

On the compromised Based Apparel site, the ClickFix lure took the form of a fake, spoofed Cloudflare verification page — a page designed to imitate the routine "checking your browser" or "verify you are human" screens that real content-delivery networks sometimes show. This was not a genuine Cloudflare page and Cloudflare's systems were not involved; it was attacker-controlled content built to borrow Cloudflare's familiar look. The page displayed harmless-looking text — "I am not a robot: Cloudflare Verification ID: 801470" — next to a "copy" button. The deception is in what the button actually did. Clicking "copy" did not place the visible verification text on the clipboard; it silently placed a different string entirely — a base64-encoded shell command. The page then instructed the visitor to paste that "verification" string into their computer's terminal, presenting the act of executing a command as a normal final step of proving they were human.

What the Documented Payload Did

Reporting documents the macOS path of the attack in detail. Once a visitor pasted and ran the hidden command in a macOS terminal, it downloaded an infostealer — a class of malware built to collect and exfiltrate data. The documented payload harvested stored credentials from Chromium-based browsers, the family that includes Chrome, Edge, Brave, and others, and collected data from cryptocurrency wallets installed on the machine. It then bundled what it had gathered into a single zip archive and sent that archive to a domain controlled by the operator. The payload was submitted to multi-engine antivirus scanning and flagged as malicious by 27 separate engines, which classified it as a Trojan and an infostealer. Reporting notes the site presented operating-system-specific instructions; the malicious path is documented for macOS, and the Windows-path payload, if any, has not been detailed.

ClickFix Attack Chain — Step By Step
FieldDetails
Step 1 — DeliveryA visitor lands on a compromised website — here, the Based Apparel merchandise site — that has been altered to serve the ClickFix content
Step 2 — The LureA fake/spoofed Cloudflare verification page is displayed, imitating a routine "verify you are human" check; Cloudflare itself is not involved
Step 3 — The Decoy TextThe page shows innocuous text — "I am not a robot: Cloudflare Verification ID: 801470" — next to a "copy" button
Step 4 — The Clipboard SwapClicking "copy" does not copy the visible text; it silently places a different string — a base64-encoded shell command — on the clipboard
Step 5 — The Hand-OffThe page instructs the visitor to paste the "verification" string into their own terminal, framing running a command as a normal verification step
Step 6 — ExecutionThe visitor pastes and runs the command themselves; the hidden command executes with the user's permissions, outside the browser's defenses
Step 7 — The Payload (macOS)The command downloads an infostealer that harvests Chromium-browser credentials and cryptocurrency-wallet data, zips them, and sends the archive to an attacker-controlled domain
Detection OutcomeThe macOS payload was flagged as malicious by 27 antivirus engines and classified as a Trojan and infostealer

Scope and Impact

The most useful way to read this incident is to separate the vehicle from the technique. The vehicle — a compromised brand merchandise site — is interchangeable; the technique, ClickFix, is the part that generalizes and the part defenders should focus on. ClickFix has been a recurring thread in 2026 threat activity, and The CyberSignal has tracked it across very different operators and platforms: North Korean actors deploying AppleScript-based ClickFix chains against macOS users, and Australia's national cyber agency warning that fake Cloudflare CAPTCHA pages were being used to push the Vidar infostealer — a pattern that closely mirrors the lure described on the Based Apparel site. It also sits alongside the broader wave of fake-CAPTCHA and verification scams documented across global fraud campaigns. Across all of these, the constant is not the brand, the country, or the malware family — it is the trick of getting the human to run the command.

What the technique sidesteps is significant. ClickFix bypasses browser sandboxing, web content filtering, and email security because the malicious code is never delivered as an attachment, a drive-by browser exploit, or a script the browser runs — it is delivered as plain text the user copies and a command the user voluntarily executes. That places it squarely in the category of human-layer attacks that have proven hardest to defend with technology alone. Verizon's 2026 Data Breach Investigations Report underscored how durable social-engineering and credential-driven intrusion paths remain, and ClickFix is a clean example of why: it converts a routine, trusted interface — a verification check — into a delivery mechanism, much as fake software-update prompts have been abused to push mobile spyware in cases like the Morpheus Android campaign.

Several things about this specific incident are not confirmed, and this account should not imply otherwise. No threat actor has been identified or attributed. How the Based Apparel website was initially compromised — whether through a content-management-system vulnerability, stolen credentials, a malicious plugin, or a hosting compromise — is unknown. The specific infostealer family has not been named, the attacker-controlled exfiltration domain has not been published, and the number of visitors affected or whose credentials were taken has not been established. One outlet, IBTimes UK, framed the incident as a repeat targeting of the site owner's online presence; that "again" characterization is that outlet's framing and is not independently established here. When the site will return, and whether it has been fully remediated, also remain open.

Response and Attribution

The single most important defender lesson from this incident is behavioral and it applies to every computer user: never paste anything into your terminal, PowerShell, or a Run dialog because a website told you to. No legitimate "verify you are human" check — from Cloudflare or anyone else — ever requires you to run a command on your own machine. That one rule defeats every ClickFix attack, regardless of which website delivers it or which malware sits at the end of the chain. A practical companion habit: be aware that a "copy" button can place text on your clipboard that differs from what is shown on screen. Before pasting anything consequential, paste it first into a visible text editor and read it. A long base64-encoded blob where you expected a short verification code is an immediate red flag, and seeing it is the moment to stop.

For security teams, ClickFix belongs in security-awareness training now, because it works by getting the user to execute the payload and therefore bypasses browser and email defenses. Threat hunters can look for the technique's execution signature: a terminal or PowerShell process spawned shortly after browser activity, decoding base64 and fetching a remote payload — and clipboard-monitoring DLP or EDR rules that flag base64-decoded shell execution following a paste are worth considering. Organizations that run brand, merchandise, or marketing websites should treat those properties as high-trust malware-delivery surfaces: keep content-management systems and plugins patched, enforce multi-factor authentication on every admin and hosting account, monitor for unauthorized content or script injection, and keep a takedown-and-incident-response runbook ready — pulling the site offline, as Based Apparel did, was the correct immediate move. When a site is found serving ClickFix content, scope the incident to its visitors during the exposure window, not just the web server: affected users should rotate every credential stored in Chromium-based browsers and move cryptocurrency-wallet assets, treating the device as compromised. Attribution is not established, and none should be assumed.


The CyberSignal Analysis

Signal 01 — The Threat Is the Technique, Not the Website

It would be easy to file this story under the brand whose site was compromised, but that framing misses the actual risk. The compromised website is a delivery vehicle, and delivery vehicles are interchangeable — the next ClickFix campaign will run on a different site, possibly one with no notable owner at all. The durable, transferable lesson is the technique. ClickFix succeeds because it relocates the malicious step out of the browser and into the user's own command line, where the defenses an organization has invested in simply do not operate. Coverage that leads with the brand teaches readers nothing they can use; coverage that leads with the technique teaches them the one rule that protects them on every site they will ever visit.

Signal 02 — A Copy Button Is Not a Safe Surface

The mechanical heart of this attack is a quiet assumption almost everyone makes: that a "copy" button copies what you see. It does not have to. The clipboard is programmable, and a page can place any string it wants there when a button is clicked — including a string entirely different from the visible text. ClickFix weaponizes that gap between what is displayed and what is copied. The practical defense is to close the gap manually: treat the clipboard as untrusted after interacting with any unfamiliar page, and paste consequential content into a plain text editor to inspect it before it goes anywhere else. The habit is small; the failure it prevents — running an attacker's command with your own hands — is not.

Signal 03 — ClickFix Defeats Tools, So the Defense Is Behavioral

ClickFix is, in a real sense, a verdict on the limits of purely technical security. Browser sandboxes, web filters, and email gateways are all bypassed not because they failed, but because the attack never passes through them. The decisive control is the user's judgment at the moment a website asks them to run a command. That makes the defense a behavioral and awareness investment, not a product purchase — and it means brand, marketing, and merchandise web properties, often managed outside the core security program, need to be brought inside it, because a high-trust website is exactly the kind of place a ClickFix lure wants to live. For CISOs, the takeaway is uncomfortable but clear: against a technique designed to bypass tools, sustained training is not a soft control. It is the control.


Sources

TypeSource
PrimaryTechCrunch — Kash Patel's clothing brand website shut down after reports it was hacked
ReportingIBTimes UK — FBI Director merch site hacked to spread malware
ReportingSan.com — Kash Patel's personal merch site hacked to trick users into installing malware
ReportingYahoo Tech — Kash Patel's apparel site trying to trick visitors into installing malware
RelatedThe CyberSignal — North Korean Hackers Use AppleScript and ClickFix on macOS
RelatedThe CyberSignal — Australia Warns Fake Cloudflare CAPTCHAs Push Vidar Stealer
RelatedThe CyberSignal — Fake CAPTCHA, the IRSF Scam, and 120 Keitaro Campaigns Drive Global SMS Crypto Fraud
RelatedThe CyberSignal — Verizon DBIR 2026: Vulnerability Exploitation Just Overtook Credential Theft
RelatedThe CyberSignal — Morpheus Android Spyware, Fake Updates, and WhatsApp Hijacking