Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New ClickFix Attacks Use Windows Terminal for Malware

New ClickFix Attacks Use Windows Terminal for Malware

Posted on March 6, 2026 By CWS

Cybersecurity experts have identified a fresh wave of ClickFix attacks exploiting Windows Terminal to insert malicious software directly onto computers. This latest method uses social engineering to prompt users into opening a command-line interface, making it more difficult to detect.

Evolution of ClickFix Attacks

Initially observed in early 2024, ClickFix attacks were first identified by Proofpoint researchers. These attacks used fake browser error messages to deceive users into executing harmful commands. The technique rapidly gained traction, and by 2025, ESET reported a 517% increase in such attacks, ranking them just behind phishing as a major cyber threat.

Traditionally, attackers employed fake CAPTCHA pages or security alerts to manipulate users. In February 2026, Microsoft Threat Intelligence noted a major ClickFix campaign that specifically targeted the Windows Terminal, instructing users to open it using keyboard shortcuts. This strategy allowed attackers to bypass security measures that monitor Run dialog misuse.

Impact and Mechanism of Latest Attack

The impact of these attacks is significant. Microsoft’s 2025 Digital Defense Report indicates that ClickFix now accounts for 47% of initial access incidents, surpassing phishing attacks. The final payload, Lumma Stealer, is designed to extract sensitive data like credentials from browsers such as Chrome and Edge.

Victims are led to compromised websites where hidden JavaScript copies an encoded PowerShell command to their clipboard. A fake verification prompt then instructs them to paste this command into Windows Terminal, executing the malware. The payload downloads additional malicious files silently, establishing persistence and stealing browser-stored data.

Defense Strategies and Recommendations

These attacks exploit human behavior rather than software vulnerabilities, making traditional patches ineffective. Security awareness and policy controls are essential defenses. Organizations should educate employees not to paste unknown commands into terminals prompted by websites.

Restricting Windows Terminal and PowerShell to administrative accounts through Group Policy is advised. Regular inspections of registry keys and scheduled tasks can help detect anomalies. Endpoint detection systems should monitor PowerShell activities initiated by wt.exe, and updating antimalware definitions is crucial.

As cyber threats evolve, staying informed and vigilant is critical. Follow CSN for more updates on cybersecurity developments.

Cyber Security News Tags:ClickFix, credential theft, Cybersecurity, endpoint protection, Lumma Stealer, Malware, Microsoft, PowerShell, security awareness, social engineering, Windows Terminal

Post navigation

Previous Post: Critical AWS-LC Vulnerabilities Expose Security Risks
Next Post: RMM Tools: Vital for IT but Increasingly Misused by Hackers

Related Posts

48+ Cisco Firewalls Vulnerable to Actively Exploited 0-Day Vulnerability in the Wild 48+ Cisco Firewalls Vulnerable to Actively Exploited 0-Day Vulnerability in the Wild Cyber Security News
Google Announces Public Preview of Alert Triage and Investigation Agent used in Google Security Operations Google Announces Public Preview of Alert Triage and Investigation Agent used in Google Security Operations Cyber Security News
10 Best Cloud Penetration Testing Companies in 2025 10 Best Cloud Penetration Testing Companies in 2025 Cyber Security News
CISA releases Secure Connectivity Principles Checklist for Operational Technology Networks Connectivity CISA releases Secure Connectivity Principles Checklist for Operational Technology Networks Connectivity Cyber Security News
Zabbix Agent and Agent 2 for Windows Vulnerability Let Attackers Escalate Privileges Zabbix Agent and Agent 2 for Windows Vulnerability Let Attackers Escalate Privileges Cyber Security News
New North Korean IT Worker With Innocent Job Application Get Access to Organization’s Network New North Korean IT Worker With Innocent Job Application Get Access to Organization’s Network Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FBI Probes Cyber Incident on Sensitive Surveillance System
  • Advanced Linux Rootkits Exploit eBPF and io_uring
  • AI Model Identifies Significant Firefox Vulnerabilities
  • FBI Probes Breach in Wiretap and Surveillance Systems
  • RMM Tools: Vital for IT but Increasingly Misused by Hackers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FBI Probes Cyber Incident on Sensitive Surveillance System
  • Advanced Linux Rootkits Exploit eBPF and io_uring
  • AI Model Identifies Significant Firefox Vulnerabilities
  • FBI Probes Breach in Wiretap and Surveillance Systems
  • RMM Tools: Vital for IT but Increasingly Misused by Hackers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News