Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New “JackFix” Attack Leverages Windows Updates into Executing Malicious Commands

New “JackFix” Attack Leverages Windows Updates into Executing Malicious Commands

Posted on November 26, 2025November 27, 2025 By CWS

A complicated ClickFix marketing campaign dubbed “JackFix” that makes use of faux grownup web sites to hijack screens with life like Home windows Replace prompts, tricking customers into operating multistage malware payloads.

Attackers mimic in style grownup websites like xHamster clones to lure victims, doubtless by way of malvertising on shady platforms. Interplay with the phishing web page triggers a full-screen overlay resembling a crucial Home windows safety replace, full with animations, progress bars, and blue-screen styling.

faux Home windows replace display screen

This “display screen hijacking” combines urgency from the replace theme with embarrassment from grownup content material, pressuring hasty compliance.

The assault’s entry level typically entails faux grownup web sites, equivalent to clones of in style platforms like xHamster and PornHub, that are doubtless promoted by malvertising.

As soon as a consumer interacts with certainly one of these websites, the “JackFix” assault is triggered. The browser is pressured into full-screen mode, displaying a convincing “Essential Home windows Safety Updates” display screen, full with animations and progress counters.

Faux Jakefix Assault

JackFix Assault Leverages Home windows Updates

This screen-locking approach, harking back to older screen-locker malware, pressures the sufferer into following on-screen directions to resolve a fabricated safety subject.

The faux interface disables customary escape keys like Escape and F11, although not totally successfully in examined browsers. This methodology preys on a consumer’s sense of urgency and familiarity to compromise their techniques.

The menace actors have applied a number of superior strategies to evade detection. The marketing campaign not solely obfuscates its malware payloads but in addition the very instructions used to provoke the ClickFix assault, permitting it to bypass many present prevention instruments.

Moreover, the malicious URLs used within the assault make use of a intelligent redirection technique. If accessed instantly, they redirect to benign websites like Google or Steam, however they ship the malicious payload solely when accessed by way of particular PowerShell instructions.

powers

This tactic helps the attacker’s infrastructure keep away from being flagged as malicious by safety evaluation instruments like VirusTotal.

As soon as the sufferer is tricked into operating the preliminary instructions, a multistage assault chain is initiated. The method begins with mshta, which ends up in a PowerShell downloader.

This second-stage script bombards the consumer with Person Account Management (UAC) prompts, successfully rendering the machine unusable till administrative privileges are granted. After gaining elevated entry, the script proceeds to deploy a staggering variety of malware samples concurrently.

In what researchers describe as a “spray and prey” technique, a single an infection can execute eight totally different malware variants. The deployed malware contains the most recent variations of potent info-stealers like Rhadamanthys, Vidar 2.0, and RedLine, in addition to the Amadey botnet shopper and varied loaders and Distant Entry Trojans (RATs).

This large deployment ensures that even when some payloads are blocked, others are prone to succeed, posing a extreme threat of knowledge theft, together with passwords and cryptocurrency wallets.

The researchers famous that this distinctive mixture of psychological manipulation, superior obfuscation, and multi-payload supply makes the “JackFix” marketing campaign a big and evolving menace.

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Attack, Commands, Executing, JackFix, Leverages, Malicious, Updates, Windows

Post navigation

Previous Post: Thousands of Secrets Leaked on Code Formatting Platforms
Next Post: Account Takeover Fraud Caused $262 Million in Losses in 2025: FBI

Related Posts

Hackers Registered 2,000+ Fake Holiday-Themed Online Stores to Steal User Payments Hackers Registered 2,000+ Fake Holiday-Themed Online Stores to Steal User Payments Cyber Security News
Leak Zone Dark Web Forum Database Exposes 22 Million Users’ IP Addresses and Locations Leak Zone Dark Web Forum Database Exposes 22 Million Users’ IP Addresses and Locations Cyber Security News
New Malware Uses Fake CAPTCHAs to Steal Information New Malware Uses Fake CAPTCHAs to Steal Information Cyber Security News
Cisco AnyConnect VPN Server Vulnerability Let Attackers Trigger DoS Attack Cisco AnyConnect VPN Server Vulnerability Let Attackers Trigger DoS Attack Cyber Security News
Google Announces 10 New AI Features for Google Chrome Powered by Gemini Google Announces 10 New AI Features for Google Chrome Powered by Gemini Cyber Security News
Seraphic Security Unveils BrowserTotal™ – Free AI-Powered Browser Security Assessment For Enterprises Seraphic Security Unveils BrowserTotal™ – Free AI-Powered Browser Security Assessment For Enterprises Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark