Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New ClickFix Variant Exploits Network Drives

New ClickFix Variant Exploits Network Drives

Posted on March 13, 2026 By CWS

The cybersecurity landscape has witnessed the emergence of a new variant of the ClickFix technique, which cleverly exploits network drives to execute malicious commands on users’ devices. Researchers at Atos have uncovered this variant that deviates from traditional methods by utilizing the ‘net use’ command to establish a connection with an external server, subsequently executing a batch file. This innovative approach allows attackers to effectively bypass detection mechanisms and compromise systems.

Mechanics of the New ClickFix Variant

This new variant begins with a familiar tactic, where users are tricked into executing commands via the Win+R shortcut. Once activated, a URL is accessed that maps a network drive from an external server, and a batch script is executed from this drive. This script downloads a ZIP archive, extracting and running the WorkFlowy application with malicious modifications embedded within an ‘.asar’ archive. This acts as both a C2 beacon and a malware dropper.

The initial phase involves a phishing web page that mimics a CAPTCHA, prompting users to initiate the Run application using specific key commands. The subsequent command executed includes a sequence that maps a network drive and triggers a script, marking a departure from previous ClickFix attacks that relied on PowerShell or mshta for further execution. This method allows adversaries to remain undetected by standard security measures.

Bypassing Detection and Evading Defenses

The use of network drives in this ClickFix variant is particularly noteworthy due to its ability to avoid traditional detection strategies. By leveraging the ‘net use’ command, attackers can mount a remote WebDAV share as a local drive, execute a batch script, and promptly remove the mapping, leaving minimal traces. This approach contrasts with prior tactics that often left digital footprints that were easier for security tools to detect.

Atos’s internal Threat Hunting service was instrumental in identifying this threat, as traditional security controls like Microsoft Defender for Endpoint failed to detect it. The focus on the behavioral aspect of the ClickFix technique, particularly execution via the RunMRU registry key, proved crucial in uncovering this sophisticated attack.

Implications for Cybersecurity and Future Outlook

This evolution of the ClickFix technique signifies a broader trend in cybersecurity threats, where attackers are increasingly using native tools and trusted applications to carry out malicious activities. The integration of the malicious code within the Electron application, specifically the WorkFlowy app, demonstrates how attackers can exploit legitimate software to evade detection. This development underscores the need for enhanced threat hunting capabilities and more comprehensive defense strategies.

As this ClickFix variant continues to challenge conventional security measures, organizations must adapt by focusing on proactive threat detection and understanding the evolving tactics employed by adversaries. This highlights the importance of continuous monitoring and analysis of execution contexts rather than relying solely on payload indicators.

The Hacker News Tags:adversary research, Atos, C2 beacon, ClickFix, cyber threat, Cybersecurity, defense evasion, Electron app, Malware, network drive, PowerShell, Security, threat intelligence, Win+R, WorkFlowy

Post navigation

Previous Post: Humata Health Enhances Security with AccuKnox Partnership
Next Post: Iran-Affiliated Cyberattack Disrupts Stryker’s Operations

Related Posts

New UEFI Flaw Enables Early-Boot DMA Attacks on ASRock, ASUS, GIGABYTE, MSI Motherboards New UEFI Flaw Enables Early-Boot DMA Attacks on ASRock, ASUS, GIGABYTE, MSI Motherboards The Hacker News
TARmageddon Flaw in Async-Tar Rust Library Could Enable Remote Code Execution TARmageddon Flaw in Async-Tar Rust Library Could Enable Remote Code Execution The Hacker News
Hackers Exploit SharePoint Zero-Day Since July 7 to Steal Keys, Maintain Persistent Access Hackers Exploit SharePoint Zero-Day Since July 7 to Steal Keys, Maintain Persistent Access The Hacker News
How Smart MSSPs Using AI to Boost Margins with Half the Staff How Smart MSSPs Using AI to Boost Margins with Half the Staff The Hacker News
Chinese Hackers Exploit Ivanti CSA Zero-Days in Attacks on French Government, Telecoms Chinese Hackers Exploit Ivanti CSA Zero-Days in Attacks on French Government, Telecoms The Hacker News
SonicWall NetExtender Trojan and ConnectWise Exploits Used in Remote Access Attacks SonicWall NetExtender Trojan and ConnectWise Exploits Used in Remote Access Attacks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • International Effort Shuts Down Harmful Proxy Network
  • Starbucks Employee Data Breach Exposes Sensitive Information
  • INTERPOL’s Major Cybercrime Bust: 45,000 IPs Dismantled
  • Major Security Breach at Loblaw: Customer Data Compromised
  • Critical Cyber Threats: Exploits, Malware, and Global Crackdown

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • International Effort Shuts Down Harmful Proxy Network
  • Starbucks Employee Data Breach Exposes Sensitive Information
  • INTERPOL’s Major Cybercrime Bust: 45,000 IPs Dismantled
  • Major Security Breach at Loblaw: Customer Data Compromised
  • Critical Cyber Threats: Exploits, Malware, and Global Crackdown

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News