Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
ClickFix Attack Evolves: New Tactics Bypass Detection

ClickFix Attack Evolves: New Tactics Bypass Detection

Posted on April 27, 2026 By CWS

A novel variant of the ClickFix attack has recently emerged, introducing a new mechanism that refrains from utilizing PowerShell. This updated approach employs cmdkey and regsvr32, two native Windows utilities, to deliver a remote payload seamlessly, leaving no files on the system.

New Approach in Attack Execution

The ClickFix attack has been a persistent threat in the cybersecurity landscape, leveraging social engineering to manipulate users into executing malicious commands. Previously, attackers used deceptive CAPTCHA pages to trick users into running commands via the Windows Run dialog, typically invoking PowerShell. However, this latest iteration completely bypasses PowerShell, complicating detection by traditional security tools.

Researchers from CyberProof, led by Deepak Nayak, Kithu Shajil, and Veena Sagar, have documented this new ClickFix variant, revealing their findings on April 22, 2026. The attack uses a streamlined command sequence that stores credentials, retrieves a remote DLL, and executes it silently using trusted Windows components. This approach allows attackers to mask their activities within normal system operations, significantly impeding detection efforts.

Implications for Security Measures

The shift away from PowerShell to native Windows tools, known as Living off the Land Binaries (LOLBins), presents a challenge for organizations dependent on behavioral detection methods. Traditional security systems searching for unusual software installations or processes might overlook this attack, as it relies on built-in Windows functionalities.

Initiating the attack requires only a single command entered into the Windows Run dialog, which triggers a multi-stage process that can persist on a system and establish connections to attacker-controlled infrastructures. This ease of execution makes the threat accessible to a wide range of users, from individuals to corporate environments.

Understanding the Attack Chain

The attack commences when a user navigates to a fraudulent phishing site resembling a CAPTCHA verification page. Users are instructed to open the Windows Run dialog with Win + R, paste a pre-loaded command, and hit Enter. This command involves cmd.exe, executing two primary actions: storing credentials with cmdkey for a remote IP address under the username ‘guest,’ and using regsvr32 to silently load a DLL from the attacker’s SMB share.

A deceptive REM comment within the command, stating ‘I am not a robot,’ aims to obscure the malicious nature of the action, making it appear as a legitimate verification step. Once the DLL is executed by regsvr32, it triggers a hidden CreateProcessA call, creating a scheduled task via Windows Task Scheduler. This task, defined remotely, can be updated by attackers without needing to redeploy the initial DLL, ensuring persistent access with minimal traces.

Countermeasures and Recommendations

Security teams are advised to scrutinize cmdkey activity involving external IPs and monitor regsvr32 for loading remote DLLs via UNC paths. Alerts for chained command execution through cmd.exe and Task Scheduler activities referencing remote XML files should be established. Restricting or closely monitoring outbound SMB and UNC access at the network level is crucial. Educating users about recognizing ClickFix-style social engineering tactics is also essential to prevent unwitting participation in such attacks.

Cyber Security News Tags:ClickFix, Cmdkey, Cybersecurity, LOLBins, Malware, Payload, Persistence, Phishing, Regsvr32, Security, social engineering, Windows tools

Post navigation

Previous Post: UNC6692 Deploys Snow Malware via Email Scams and Social Tactics
Next Post: Google Warns of Rising Malicious AI Prompt Injection Attacks

Related Posts

Europol Dismantles Fraud Crypto Investment Ring That Tricked 5000+ Victims Worldwide Europol Dismantles Fraud Crypto Investment Ring That Tricked 5000+ Victims Worldwide Cyber Security News
Insecure GitHub Actions in Open Source Projects MITRE and Splunk Exposes Critical Vulnerabilities Insecure GitHub Actions in Open Source Projects MITRE and Splunk Exposes Critical Vulnerabilities Cyber Security News
Essential E-Signature Solutions for Cybersecurity in 2026 Essential E-Signature Solutions for Cybersecurity in 2026 Cyber Security News
India Continues to Be the Top Target for Mobile Attacks with 38% Increase in Threats India Continues to Be the Top Target for Mobile Attacks with 38% Increase in Threats Cyber Security News
Chinese Hackers Actively Attacking Taiwan Critical Infrastructure Chinese Hackers Actively Attacking Taiwan Critical Infrastructure Cyber Security News
New Quishing Attack With Weaponized QR Code Targeting Microsoft Users New Quishing Attack With Weaponized QR Code Targeting Microsoft Users Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Windows Patch Flaw Enables Zero-Click Attacks
  • AI Advances in Cybersecurity Pose New Challenges
  • Fake Tax Notices Lure Indian Taxpayers into Malware Trap
  • Google Warns of Rising Malicious AI Prompt Injection Attacks
  • ClickFix Attack Evolves: New Tactics Bypass Detection

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Windows Patch Flaw Enables Zero-Click Attacks
  • AI Advances in Cybersecurity Pose New Challenges
  • Fake Tax Notices Lure Indian Taxpayers into Malware Trap
  • Google Warns of Rising Malicious AI Prompt Injection Attacks
  • ClickFix Attack Evolves: New Tactics Bypass Detection

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark