Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New ClickFix Attacks Use Windows Terminal for Malware

New ClickFix Attacks Use Windows Terminal for Malware

Posted on March 6, 2026 By CWS

Cybersecurity experts have identified a fresh wave of ClickFix attacks exploiting Windows Terminal to insert malicious software directly onto computers. This latest method uses social engineering to prompt users into opening a command-line interface, making it more difficult to detect.

Evolution of ClickFix Attacks

Initially observed in early 2024, ClickFix attacks were first identified by Proofpoint researchers. These attacks used fake browser error messages to deceive users into executing harmful commands. The technique rapidly gained traction, and by 2025, ESET reported a 517% increase in such attacks, ranking them just behind phishing as a major cyber threat.

Traditionally, attackers employed fake CAPTCHA pages or security alerts to manipulate users. In February 2026, Microsoft Threat Intelligence noted a major ClickFix campaign that specifically targeted the Windows Terminal, instructing users to open it using keyboard shortcuts. This strategy allowed attackers to bypass security measures that monitor Run dialog misuse.

Impact and Mechanism of Latest Attack

The impact of these attacks is significant. Microsoft’s 2025 Digital Defense Report indicates that ClickFix now accounts for 47% of initial access incidents, surpassing phishing attacks. The final payload, Lumma Stealer, is designed to extract sensitive data like credentials from browsers such as Chrome and Edge.

Victims are led to compromised websites where hidden JavaScript copies an encoded PowerShell command to their clipboard. A fake verification prompt then instructs them to paste this command into Windows Terminal, executing the malware. The payload downloads additional malicious files silently, establishing persistence and stealing browser-stored data.

Defense Strategies and Recommendations

These attacks exploit human behavior rather than software vulnerabilities, making traditional patches ineffective. Security awareness and policy controls are essential defenses. Organizations should educate employees not to paste unknown commands into terminals prompted by websites.

Restricting Windows Terminal and PowerShell to administrative accounts through Group Policy is advised. Regular inspections of registry keys and scheduled tasks can help detect anomalies. Endpoint detection systems should monitor PowerShell activities initiated by wt.exe, and updating antimalware definitions is crucial.

As cyber threats evolve, staying informed and vigilant is critical. Follow CSN for more updates on cybersecurity developments.

Cyber Security News Tags:ClickFix, credential theft, Cybersecurity, endpoint protection, Lumma Stealer, Malware, Microsoft, PowerShell, security awareness, social engineering, Windows Terminal

Post navigation

Previous Post: Critical AWS-LC Vulnerabilities Expose Security Risks
Next Post: RMM Tools: Vital for IT but Increasingly Misused by Hackers

Related Posts

New SAP NetWeaver Vulnerabilities Allow Attackers to Bypass Authorization and Execute OS Commands New SAP NetWeaver Vulnerabilities Allow Attackers to Bypass Authorization and Execute OS Commands Cyber Security News
Critical Emby Server Vulnerability Let Attackers Gain Admin Access Critical Emby Server Vulnerability Let Attackers Gain Admin Access Cyber Security News
Critical Update Issued for Palo Alto Cortex Vulnerability Critical Update Issued for Palo Alto Cortex Vulnerability Cyber Security News
Threat Actors Leverage Google Apps Script To Host Phishing Websites Threat Actors Leverage Google Apps Script To Host Phishing Websites Cyber Security News
Achieving Continuous Compliance in Dynamic Threat Environments Achieving Continuous Compliance in Dynamic Threat Environments Cyber Security News
Anthropic’s Claude Code Source Leak via npm Registry Anthropic’s Claude Code Source Leak via npm Registry Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Boosting MTTR: Key Strategies of Advanced SOCs
  • Gentlemen RaaS Targets Multiple OS with Advanced Ransomware
  • Security Flaws in Perforce Servers Risk Sensitive Data
  • NGate Malware Exploits HandyPay App in Brazil for NFC Data Theft
  • Hackers Exploit FortiGate VPN with Nightmare-Eclipse Tools

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Boosting MTTR: Key Strategies of Advanced SOCs
  • Gentlemen RaaS Targets Multiple OS with Advanced Ransomware
  • Security Flaws in Perforce Servers Risk Sensitive Data
  • NGate Malware Exploits HandyPay App in Brazil for NFC Data Theft
  • Hackers Exploit FortiGate VPN with Nightmare-Eclipse Tools

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark