Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Microsoft Unveils Windows Terminal Exploit in ClickFix Campaign

Microsoft Unveils Windows Terminal Exploit in ClickFix Campaign

Posted on March 6, 2026 By CWS

Microsoft has recently unveiled a new and extensive social engineering campaign known as ClickFix, which leverages the Windows Terminal application to initiate a sophisticated attack vector aimed at deploying the Lumma Stealer malware. The Redmond-based tech giant shared these insights on Thursday, shedding light on how this campaign has been actively exploiting the built-in terminal emulator to trick users into executing malicious commands under the guise of legitimate administrative activities.

Exploiting Windows Terminal for Cyber Attacks

This campaign, observed in February 2026, creatively utilizes Windows Terminal by instructing users to employ the Windows + X → I shortcut. This shortcut directly opens Windows Terminal (wt.exe), guiding users into an environment that appears credible and trustworthy, thereby increasing the likelihood of successful command execution. According to the Microsoft Threat Intelligence team, this method circumvents traditional detection systems that are designed to identify abuses of the Run dialog, thereby enhancing the campaign’s effectiveness.

The attackers exploit the inherent trust users place in Windows Terminal to manipulate them into executing commands sourced from deceptive prompts like erroneous CAPTCHA verifications or troubleshooting requests. This tactic marks a significant evolution in the attackers’ techniques, blending legitimate tools with malicious intent.

Intricate Attack Chain Mechanisms

Once a user engages with the ClickFix lure page and pastes a hex-encoded, XOR-compressed command into Windows Terminal, a series of automated processes are triggered. The command initiates additional instances of Terminal and PowerShell, culminating in the launch of a PowerShell process that decodes a script leading to further actions. This includes downloading a ZIP file and a disguised 7-Zip binary, which is then extracted to execute a multi-stage attack sequence.

The subsequent stages of the attack involve retrieving additional payloads, establishing persistence through scheduled tasks, configuring Microsoft Defender to ignore certain activities, and exfiltrating data from the compromised machine. A notable technique within this sequence is the use of QueueUserAPC() to inject the Lumma Stealer malware into the ‘chrome.exe’ and ‘msedge.exe’ processes, targeting high-value browser data such as stored credentials and login information.

Alternative Attack Pathways and Techniques

In addition to the primary attack chain, Microsoft identified a secondary pathway where the compressed command, when executed in Windows Terminal, results in the download of a batch script to the AppDataLocal directory. This batch script, executed via cmd.exe, writes a Visual Basic Script to the Temp folder and is subsequently run with specific command-line arguments. This leads to abuse of legitimate Windows tools, known as LOLBins, and establishes connections to Crypto Blockchain RPC endpoints, a process referred to as etherhiding.

The attackers employ similar QueueUserAPC()-based injection techniques in this pathway to access browser data, further emphasizing the campaign’s sophistication and the need for heightened awareness and protective measures against such evolving threats.

Microsoft’s disclosure of this complex attack highlights the continuous evolution of cyber threat tactics, underscoring the importance of robust cybersecurity measures and user vigilance in identifying and mitigating such sophisticated schemes.

The Hacker News Tags:browser security, ClickFix, Cybersecurity, endpoint security, Lumma Stealer, Malware, Microsoft, security threats, social engineering, Windows Terminal

Post navigation

Previous Post: Indirect Prompt Injection Threatens AI Security
Next Post: Evervault Secures $25M in Series B to Enhance Encryption Tech

Related Posts

Post-Quantum Cryptography and AI Vulnerabilities: A Security Update Post-Quantum Cryptography and AI Vulnerabilities: A Security Update The Hacker News
Policy, Isolation, and Data Controls That Actually Work Policy, Isolation, and Data Controls That Actually Work The Hacker News
Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China The Hacker News
SolarWinds WHD Exploited in Complex Multi-Stage Cyber Attacks SolarWinds WHD Exploited in Complex Multi-Stage Cyber Attacks The Hacker News
Adobe Releases Patch Fixing 254 Vulnerabilities, Closing High-Severity Security Gaps Adobe Releases Patch Fixing 254 Vulnerabilities, Closing High-Severity Security Gaps The Hacker News
Cisco Fixes Actively Exploited Zero-Day CVE-2026-20045 in Unified CM and Webex Cisco Fixes Actively Exploited Zero-Day CVE-2026-20045 in Unified CM and Webex The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • AI Identity Visibility Lacking in Enterprises, Study Finds
  • BreachLock Recognized in 2026 Gartner AEV Guide
  • Healthcare Data Breaches Impact 600,000 Individuals
  • New Vulnerabilities in Lantronix and Silex Serial-to-IP Converters
  • Enhancing SOC Maturity with Integrated Threat Intelligence

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • AI Identity Visibility Lacking in Enterprises, Study Finds
  • BreachLock Recognized in 2026 Gartner AEV Guide
  • Healthcare Data Breaches Impact 600,000 Individuals
  • New Vulnerabilities in Lantronix and Silex Serial-to-IP Converters
  • Enhancing SOC Maturity with Integrated Threat Intelligence

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark