Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New ClickFix Variant Exploits Windows Terminal

New ClickFix Variant Exploits Windows Terminal

Posted on March 9, 2026 By CWS

Microsoft has identified a novel variant of the ClickFix attack that cleverly evades detection by directing victims to utilize the Windows Terminal instead of the conventional Run dialog. This shift in strategy marks a significant evolution in the tactics used by cyber attackers.

Innovative Methods to Evade Detection

Traditionally, ClickFix attacks have relied on deceptive tactics including fake CAPTCHA pages, troubleshooting prompts, and verification schemes to entice victims into executing harmful PowerShell commands. This latest iteration, however, distinguishes itself by instructing individuals to access Windows Terminal directly, bypassing the commonly targeted Run dialog.

According to Microsoft, the new campaign instructs users to employ the Windows + X → I shortcut, which launches Windows Terminal (wt.exe). This method seamlessly integrates into legitimate administrative workflows, thereby gaining the trust of users by appearing more credible.

Bypassing Traditional Protections

The attack, observed in February, enables perpetrators to circumvent security measures designed to prevent misuse of the Run dialog. By executing malicious commands in Windows Terminal, attackers initiate a PowerShell process that deciphers embedded hex commands, setting off a multi-stage attack that results in a Lumma Stealer infection.

This infection process is characterized by the use of scheduled tasks for persistence, anti-malware evasion techniques, and the targeting of browser data and other sensitive information for data exfiltration.

Variants and Broader Implications

Another form of this attack involves running malicious commands in Windows Terminal that lead to a batch script executed through command prompt and MSBuild.exe. This script connects to Crypto Blockchain RPC endpoints and utilizes QueueUserAPC()-based code injection into chrome.exe and msedge.exe processes to extract web and login data.

Further complicating the landscape, a recently identified variant called InstallFix uses imitation AI tool websites to deceive users into running harmful commands, which also results in data-stealing infections.

The emergence of these sophisticated ClickFix variants underscores the evolving nature of cyber threats, highlighting the need for continuous attention and adaptation in cybersecurity measures.

Security Week News Tags:anti-malware evasion, ClickFix, Cybersecurity, information theft, Lumma Stealer, Malware, Microsoft, PowerShell, security threat, Windows Terminal

Post navigation

Previous Post: Security Platforms: A Solution for Mid-Market Needs
Next Post: ClipXDaemon: A New C2-Less Threat to Linux Cryptocurrency Users

Related Posts

Ransomware Losses Climb as AI Pushes Phishing to New Heights Ransomware Losses Climb as AI Pushes Phishing to New Heights Security Week News
High-Value NPM Developers Compromised in New Phishing Campaign High-Value NPM Developers Compromised in New Phishing Campaign Security Week News
Google Fortifies Chrome Agentic AI Against Indirect Prompt Injection Attacks Google Fortifies Chrome Agentic AI Against Indirect Prompt Injection Attacks Security Week News
Italy Thwarts Russian Cyberattacks on Olympic Sites Italy Thwarts Russian Cyberattacks on Olympic Sites Security Week News
Pharmaceutical Company Inotiv Confirms Ransomware Attack Pharmaceutical Company Inotiv Confirms Ransomware Attack Security Week News
Microsoft to Lay Off About 3% of Its Workforce Microsoft to Lay Off About 3% of Its Workforce Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Cybersecurity Updates: Qualcomm Flaw and iOS Exploit Chains
  • Microsoft 365 Introduces Copilot Cowork for Task Automation
  • ClipXDaemon: A New C2-Less Threat to Linux Cryptocurrency Users
  • New ClickFix Variant Exploits Windows Terminal
  • Security Platforms: A Solution for Mid-Market Needs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Cybersecurity Updates: Qualcomm Flaw and iOS Exploit Chains
  • Microsoft 365 Introduces Copilot Cowork for Task Automation
  • ClipXDaemon: A New C2-Less Threat to Linux Cryptocurrency Users
  • New ClickFix Variant Exploits Windows Terminal
  • Security Platforms: A Solution for Mid-Market Needs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News