Hello Security-dev,
I reviewed open discussions and didn’t see reference to the following topic, but if it is being discussed somewhere I did not see, please let me know.
I work for a Managed Security Services Provider (MSSP), and we are seeing a heavy abuse of a tactic where a web page instructs the user to open the Windows Run dialog box with the hotkey Win+R, and have them paste in a malicious command with Ctrl+V that the web browser has preemptively copied into their clipboard.
Usually the web page does this under the guise of a problem with the browser or the guise of a CAPTCHA and this attack technique has become extremely popular, so it is within my interest to help identify solutions to help mitigate the effectiveness of the tactic. The malicious command copied to the clipboard generally retrieves and executes a remote script that will execute using PowerShell or mshta. This tactic is talked about as "Click-fix" since it originally had the user click a button to copy the script to fix the problem.
This is an example of the tactic, whereas, at the time of the user's visit, the browser has modified the user's clipboard requiring no action from them to copy it:

One possible solution is notifying the user when their clipboard is modified by a webpage. This type of notification is already done by some browser extensions in similar situations, such as MalwareByte's Browser Guard. The following is an example of a message a user could receive:
.png?part=0.1&view=1)
This is one possible solution, but consideration of multiple possible solutions is recommended.
To understand how the tactic works mechanically, I recommend this GitHub repo from JohnHammond:
https://github.com/JohnHammond/recaptcha-phish .
Please let me know if you have any questions, but it has seemed important to raise this to your awareness due to how much we are seeing this technique used.