Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New “JackFix” Attack Leverages Windows Updates into Executing Malicious Commands

Posted on November 26, 2025November 27, 2025 By CWS

A complicated ClickFix marketing campaign dubbed “JackFix” that makes use of faux grownup web sites to hijack screens with life like Home windows Replace prompts, tricking customers into operating multistage malware payloads.

Attackers mimic in style grownup websites like xHamster clones to lure victims, doubtless by way of malvertising on shady platforms. Interplay with the phishing web page triggers a full-screen overlay resembling a crucial Home windows safety replace, full with animations, progress bars, and blue-screen styling.

faux Home windows replace display screen

This “display screen hijacking” combines urgency from the replace theme with embarrassment from grownup content material, pressuring hasty compliance.

The assault’s entry level typically entails faux grownup web sites, equivalent to clones of in style platforms like xHamster and PornHub, that are doubtless promoted by malvertising.

As soon as a consumer interacts with certainly one of these websites, the “JackFix” assault is triggered. The browser is pressured into full-screen mode, displaying a convincing “Essential Home windows Safety Updates” display screen, full with animations and progress counters.

Faux Jakefix Assault

JackFix Assault Leverages Home windows Updates

This screen-locking approach, harking back to older screen-locker malware, pressures the sufferer into following on-screen directions to resolve a fabricated safety subject.

The faux interface disables customary escape keys like Escape and F11, although not totally successfully in examined browsers. This methodology preys on a consumer’s sense of urgency and familiarity to compromise their techniques.

The menace actors have applied a number of superior strategies to evade detection. The marketing campaign not solely obfuscates its malware payloads but in addition the very instructions used to provoke the ClickFix assault, permitting it to bypass many present prevention instruments.

Moreover, the malicious URLs used within the assault make use of a intelligent redirection technique. If accessed instantly, they redirect to benign websites like Google or Steam, however they ship the malicious payload solely when accessed by way of particular PowerShell instructions.

powers

This tactic helps the attacker’s infrastructure keep away from being flagged as malicious by safety evaluation instruments like VirusTotal.

As soon as the sufferer is tricked into operating the preliminary instructions, a multistage assault chain is initiated. The method begins with mshta, which ends up in a PowerShell downloader.

This second-stage script bombards the consumer with Person Account Management (UAC) prompts, successfully rendering the machine unusable till administrative privileges are granted. After gaining elevated entry, the script proceeds to deploy a staggering variety of malware samples concurrently.

In what researchers describe as a “spray and prey” technique, a single an infection can execute eight totally different malware variants. The deployed malware contains the most recent variations of potent info-stealers like Rhadamanthys, Vidar 2.0, and RedLine, in addition to the Amadey botnet shopper and varied loaders and Distant Entry Trojans (RATs).

This large deployment ensures that even when some payloads are blocked, others are prone to succeed, posing a extreme threat of knowledge theft, together with passwords and cryptocurrency wallets.

The researchers famous that this distinctive mixture of psychological manipulation, superior obfuscation, and multi-payload supply makes the “JackFix” marketing campaign a big and evolving menace.

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Attack, Commands, Executing, JackFix, Leverages, Malicious, Updates, Windows

Post navigation

Previous Post: Thousands of Secrets Leaked on Code Formatting Platforms
Next Post: Account Takeover Fraud Caused $262 Million in Losses in 2025: FBI

Related Posts

Cloud Security Essentials – Protecting Multi-Cloud Environments Cyber Security News
Microsoft Edge Fixes Actively Exploited Chromium Vulnerability Cyber Security News
PoC Exploit Released for Windows Server Update Services Remote Code Execution Vulnerability Cyber Security News
0-Click Zendesk Account Takeover Vulnerability Enables Access to all Zendesk Tickets Cyber Security News
Microsoft Defender for Office 365 to Provide Detail Results for Spam, Phishing or Clean Emails Cyber Security News
Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • OpenAI User Data Exposed in Mixpanel Hack
  • Malicious Chrome Extension Silently Steal and Injects Hidden SOL Fees Into Solana Swaps
  • Angular HTTP Client Vulnerability Exposes XSRF Token to an Attacker-Controlled Domain
  • AI Malware, Voice Bot Flaws, Crypto Laundering, IoT Attacks — and 20 More Stories
  • OpenAI Discloses Mixpanel Data Breach

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • OpenAI User Data Exposed in Mixpanel Hack
  • Malicious Chrome Extension Silently Steal and Injects Hidden SOL Fees Into Solana Swaps
  • Angular HTTP Client Vulnerability Exposes XSRF Token to an Attacker-Controlled Domain
  • AI Malware, Voice Bot Flaws, Crypto Laundering, IoT Attacks — and 20 More Stories
  • OpenAI Discloses Mixpanel Data Breach

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark