Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
DeepLoad Malware Exploits ClickFix for Credential Theft

DeepLoad Malware Exploits ClickFix for Credential Theft

Posted on March 30, 2026 By CWS

The cybersecurity landscape has been shaken by the emergence of a new malware campaign utilizing the ClickFix technique to distribute a novel threat known as DeepLoad. According to researchers from ReliaQuest, Thassanai McCabe and Andrew Currie, this malware employs AI-driven obfuscation and process injection to bypass static defenses, initiating credential theft immediately upon deployment.

Malware Distribution via ClickFix Tactics

The attack begins with a ClickFix ploy that deceives users into executing PowerShell commands. This is cleverly disguised as a solution to a fictitious problem, prompting users to paste commands into the Windows Run dialog. Subsequently, a legitimate Windows tool, ‘mshta.exe’, is exploited to download and execute an obfuscated PowerShell loader.

The loader masks its true purpose through irrelevant variable assignments, likely developed using AI tools to evade detection by security systems. The malicious actors behind DeepLoad have designed it to seamlessly integrate with normal Windows operations, utilizing ‘LockAppHost.exe’, a legitimate process, to conceal its payload.

Advanced Evasion Techniques

DeepLoad employs several sophisticated methods to remain undetected. It disables PowerShell command history and directly calls core Windows functions, avoiding typical PowerShell monitoring. Additionally, it dynamically generates a secondary component using PowerShell’s Add-Type feature, compiling a temporary DLL with a randomized name.

Another stealth tactic involves asynchronous procedure call (APC) injection, allowing the malware to execute within trusted Windows processes without leaving a decoded payload on the disk. This method involves launching a target process in a suspended state, injecting shellcode, and resuming execution.

Credential Theft and Persistence

The primary objective of DeepLoad is to extract browser passwords from infected systems. It also deploys a malicious browser extension to intercept credentials entered on login pages, maintaining persistence unless manually removed. Moreover, the malware can detect and infect removable media, disguising itself as popular software installers to propagate.

DeepLoad’s persistence is further enhanced through Windows Management Instrumentation (WMI), enabling reinfection of clean systems without user or attacker intervention. This approach not only disrupts typical detection rules but also sets up a WMI event subscription to silently reinitiate attacks.

The revelation of DeepLoad coincides with reports from G DATA on a separate malware loader, Kiss Loader, which utilizes phishing emails and Internet Shortcut files to distribute its payload. While the prevalence of Kiss Loader remains uncertain, its developer claims origins in Malawi.

As these threats continue to evolve, it is crucial for organizations and individuals to remain vigilant and adopt robust cybersecurity measures to counteract such sophisticated malware campaigns.

The Hacker News Tags:AI obfuscation, browser security, ClickFix, credential theft, Cybersecurity, DeepLoad, Malware, phishing tactics, PowerShell, WMI persistence

Post navigation

Previous Post: Server Leak Uncovers TheGentlemen Ransomware Toolkit
Next Post: North Korean IT Operative’s Elaborate Job Scam Exposed

Related Posts

Two Chrome Extensions Caught Stealing ChatGPT and DeepSeek Chats from 900,000 Users Two Chrome Extensions Caught Stealing ChatGPT and DeepSeek Chats from 900,000 Users The Hacker News
ScarCruft Uses RokRAT Malware in Operation HanKook Phantom Targeting South Korean Academics ScarCruft Uses RokRAT Malware in Operation HanKook Phantom Targeting South Korean Academics The Hacker News
Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation The Hacker News
Google Resolves Critical Security Flaws in Gemini CLI Tools Google Resolves Critical Security Flaws in Gemini CLI Tools The Hacker News
⚡ Weekly Recap — SharePoint Breach, Spyware, IoT Hijacks, DPRK Fraud, Crypto Drains and More ⚡ Weekly Recap — SharePoint Breach, Spyware, IoT Hijacks, DPRK Fraud, Crypto Drains and More The Hacker News
Critical Flaw in Palo Alto PAN-OS Allows Remote Code Execution Critical Flaw in Palo Alto PAN-OS Allows Remote Code Execution The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Exploit OrBit Rootkit to Steal Linux Credentials
  • OpenAI Addresses TanStack Supply Chain Breach
  • OpenAI Faces Supply Chain Cyberattack: macOS Updates Needed
  • Critical Amazon Redshift JDBC Driver Flaw Exposes RCE Risk
  • Urgent Advisory: Exchange Server Zero-Day Exploited

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Exploit OrBit Rootkit to Steal Linux Credentials
  • OpenAI Addresses TanStack Supply Chain Breach
  • OpenAI Faces Supply Chain Cyberattack: macOS Updates Needed
  • Critical Amazon Redshift JDBC Driver Flaw Exposes RCE Risk
  • Urgent Advisory: Exchange Server Zero-Day Exploited

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark