Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New ClickFix Variant Exploits Network Drives

New ClickFix Variant Exploits Network Drives

Posted on March 13, 2026 By CWS

The cybersecurity landscape has witnessed the emergence of a new variant of the ClickFix technique, which cleverly exploits network drives to execute malicious commands on users’ devices. Researchers at Atos have uncovered this variant that deviates from traditional methods by utilizing the ‘net use’ command to establish a connection with an external server, subsequently executing a batch file. This innovative approach allows attackers to effectively bypass detection mechanisms and compromise systems.

Mechanics of the New ClickFix Variant

This new variant begins with a familiar tactic, where users are tricked into executing commands via the Win+R shortcut. Once activated, a URL is accessed that maps a network drive from an external server, and a batch script is executed from this drive. This script downloads a ZIP archive, extracting and running the WorkFlowy application with malicious modifications embedded within an ‘.asar’ archive. This acts as both a C2 beacon and a malware dropper.

The initial phase involves a phishing web page that mimics a CAPTCHA, prompting users to initiate the Run application using specific key commands. The subsequent command executed includes a sequence that maps a network drive and triggers a script, marking a departure from previous ClickFix attacks that relied on PowerShell or mshta for further execution. This method allows adversaries to remain undetected by standard security measures.

Bypassing Detection and Evading Defenses

The use of network drives in this ClickFix variant is particularly noteworthy due to its ability to avoid traditional detection strategies. By leveraging the ‘net use’ command, attackers can mount a remote WebDAV share as a local drive, execute a batch script, and promptly remove the mapping, leaving minimal traces. This approach contrasts with prior tactics that often left digital footprints that were easier for security tools to detect.

Atos’s internal Threat Hunting service was instrumental in identifying this threat, as traditional security controls like Microsoft Defender for Endpoint failed to detect it. The focus on the behavioral aspect of the ClickFix technique, particularly execution via the RunMRU registry key, proved crucial in uncovering this sophisticated attack.

Implications for Cybersecurity and Future Outlook

This evolution of the ClickFix technique signifies a broader trend in cybersecurity threats, where attackers are increasingly using native tools and trusted applications to carry out malicious activities. The integration of the malicious code within the Electron application, specifically the WorkFlowy app, demonstrates how attackers can exploit legitimate software to evade detection. This development underscores the need for enhanced threat hunting capabilities and more comprehensive defense strategies.

As this ClickFix variant continues to challenge conventional security measures, organizations must adapt by focusing on proactive threat detection and understanding the evolving tactics employed by adversaries. This highlights the importance of continuous monitoring and analysis of execution contexts rather than relying solely on payload indicators.

The Hacker News Tags:adversary research, Atos, C2 beacon, ClickFix, cyber threat, Cybersecurity, defense evasion, Electron app, Malware, network drive, PowerShell, Security, threat intelligence, Win+R, WorkFlowy

Post navigation

Previous Post: Humata Health Enhances Security with AccuKnox Partnership
Next Post: Iran-Affiliated Cyberattack Disrupts Stryker’s Operations

Related Posts

Tsundere Botnet Expands Using Game Lures and Ethereum-Based C2 on Windows Tsundere Botnet Expands Using Game Lures and Ethereum-Based C2 on Windows The Hacker News
China-Linked Cyber Threats Target Southeast Asian Government China-Linked Cyber Threats Target Southeast Asian Government The Hacker News
Google Launches ‘Private AI Compute’ — Secure AI Processing with On-Device-Level Privacy Google Launches ‘Private AI Compute’ — Secure AI Processing with On-Device-Level Privacy The Hacker News
Five New Exploited Bugs Land in CISA’s Catalog — Oracle and Microsoft Among Targets Five New Exploited Bugs Land in CISA’s Catalog — Oracle and Microsoft Among Targets The Hacker News
Fake VPN and Spam Blocker Apps Tied to VexTrio Used in Ad Fraud, Subscription Scams Fake VPN and Spam Blocker Apps Tied to VexTrio Used in Ad Fraud, Subscription Scams The Hacker News
CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • North Korean Hackers Target Pharma Firms with Malware
  • EU Pushes Google to Share Anonymized User Data
  • Google Patches Critical Gemini CLI Vulnerability
  • ClickUp’s API Key Leak Exposes Fortune 500 Emails
  • New Fast16 Malware Uncovered: Cybersecurity Concerns Rise

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • North Korean Hackers Target Pharma Firms with Malware
  • EU Pushes Google to Share Anonymized User Data
  • Google Patches Critical Gemini CLI Vulnerability
  • ClickUp’s API Key Leak Exposes Fortune 500 Emails
  • New Fast16 Malware Uncovered: Cybersecurity Concerns Rise

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark