CrashFix
CrashFix is a ClickFix variant discovered in January 2026 attributed to the KongTuke threat actor. It uses a malicious Chrome extension ("NexShield", impersonating uBlock Origin Lite) to intentionally crash the browser. After the crash, a fake "browser stopped abnormally" error page instructs users to run a recovery command. The command abuses finger.exe (a Windows LOLBin) as a C2 communication channel. Over 250 compromised WordPress sites across 12 countries have been found serving CrashFix payloads, including a US Senate candidate's webpage.
Chrome has stopped abnormally. Your browsing session and open tabs can be recovered. Please run the recovery tool below.
Press Win-R on your keyboard
Press Ctrl-V to paste the recovery tool
Press Enter to recover your session
References:
Mitigations:
Review and restrict Chrome extension installations via enterprise policies
Block sideloading of unverified extensions
Monitor for finger.exe network connections
Audit WordPress sites for injected JavaScript