We added a feed of IPs/websites with ClickFix/ClearFake injected code in our Compromised Website reporting, tagged as 'clickfix'. Visitors of the website get tricked to install malware when injected JavaScript executes. If you receive an alert review for root cause of compromise!

657 instances shared for 2026-03-14. We expect to increase the volume of the feed in the future!

We would like to thank our Alliance partners and Validin for the collaboration making this possible!

Background on investigating ClickFix/ClearFake: https://www.atea.no/siste-nytt/it-sikkerhet/investigating-a-clearfake-clickfix-etherhide-campaign/

Compromised Website Report: https://www.shadowserver.org/what-we-do/network-reporting/compromised-website-report/

Dashboard World Map view of infected IPs:
https://dashboard.shadowserver.org/statistics/combined/map/?date_range=1&map_type=std&source=compromised_iot&source=compromised_website&source=compromised_website6&tag=clickfix&data_set=count&scale=log&auto_update=on

Dashboard Tree Map view of infected IPs:
https://dashboard.shadowserver.org/statistics/combined/tree/?date_range=1&source=compromised_iot&source=compromised_website&source=compromised_website6&tag=clickfix&data_set=count&scale=log&auto_update=on

#CyberCivilDefense

Hackers don’t just forecast cyber risk, they demonstrate it.

The DEF CON 33 Hackers’ Almanack report is blunt, technical, and long overdue. The Almanack translates real exploits into a policy roadmap leaders can’t afford to ignore. #CyberCivilDefense #Take9

Read here:
https://harris.uchicago.edu/sites/default/files/the_def_con_33_hackers_almanack.pdf

Regarding CVE-2026-24061 in GNU InetUtils telnetd: while we are not scanning for it explicitly (due to current lack of ability to check in a safe way, we share - and have for years - data on exposed instances in our Accessible Telnet Report: https://www.shadowserver.org/what-we-do/network-reporting/accessible-telnet-report/

~800K exposed

We have been tweaking the scan the last few days to better weed out non-telnet protocols. Some honeypots may remain.

Telnet should not be publicly exposed, but often is especially on legacy iot devices.

CVE-2025-24061 info & patch: https://seclists.org/oss-sec/2026/q1/89

Dashboard Tree Map view of telnet exposure (no vulnerability assessment): https://dashboard.shadowserver.org/statistics/combined/tree/?date_range=1&source=scan&source=scan6&tag=telnet&data_set=count&scale=log&auto_update=on

Like others, we also see exploitation attempts in the wild at scale.

#CyberCivilDefense

@shadowserver

So helpful to have a "secure e-mail gateway" /s

#CyberCivilDefense #CyberSecurity