Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New ClickFix Variant Exploits Windows Terminal

New ClickFix Variant Exploits Windows Terminal

Posted on March 9, 2026 By CWS

Microsoft has identified a novel variant of the ClickFix attack that cleverly evades detection by directing victims to utilize the Windows Terminal instead of the conventional Run dialog. This shift in strategy marks a significant evolution in the tactics used by cyber attackers.

Innovative Methods to Evade Detection

Traditionally, ClickFix attacks have relied on deceptive tactics including fake CAPTCHA pages, troubleshooting prompts, and verification schemes to entice victims into executing harmful PowerShell commands. This latest iteration, however, distinguishes itself by instructing individuals to access Windows Terminal directly, bypassing the commonly targeted Run dialog.

According to Microsoft, the new campaign instructs users to employ the Windows + X → I shortcut, which launches Windows Terminal (wt.exe). This method seamlessly integrates into legitimate administrative workflows, thereby gaining the trust of users by appearing more credible.

Bypassing Traditional Protections

The attack, observed in February, enables perpetrators to circumvent security measures designed to prevent misuse of the Run dialog. By executing malicious commands in Windows Terminal, attackers initiate a PowerShell process that deciphers embedded hex commands, setting off a multi-stage attack that results in a Lumma Stealer infection.

This infection process is characterized by the use of scheduled tasks for persistence, anti-malware evasion techniques, and the targeting of browser data and other sensitive information for data exfiltration.

Variants and Broader Implications

Another form of this attack involves running malicious commands in Windows Terminal that lead to a batch script executed through command prompt and MSBuild.exe. This script connects to Crypto Blockchain RPC endpoints and utilizes QueueUserAPC()-based code injection into chrome.exe and msedge.exe processes to extract web and login data.

Further complicating the landscape, a recently identified variant called InstallFix uses imitation AI tool websites to deceive users into running harmful commands, which also results in data-stealing infections.

The emergence of these sophisticated ClickFix variants underscores the evolving nature of cyber threats, highlighting the need for continuous attention and adaptation in cybersecurity measures.

Security Week News Tags:anti-malware evasion, ClickFix, Cybersecurity, information theft, Lumma Stealer, Malware, Microsoft, PowerShell, security threat, Windows Terminal

Post navigation

Previous Post: Security Platforms: A Solution for Mid-Market Needs
Next Post: ClipXDaemon: A New C2-Less Threat to Linux Cryptocurrency Users

Related Posts

Palo Alto Networks to Acquire CyberArk for  Billion Palo Alto Networks to Acquire CyberArk for $25 Billion Security Week News
Five Cybersecurity Predictions for 2026: Identity, AI, and the Collapse of Perimeter Thinking Five Cybersecurity Predictions for 2026: Identity, AI, and the Collapse of Perimeter Thinking Security Week News
SystemBC Botnet Survives Takedown, Infects 10,000 Devices SystemBC Botnet Survives Takedown, Infects 10,000 Devices Security Week News
ConnectWise Patches Critical Flaw in Automate RMM Tool ConnectWise Patches Critical Flaw in Automate RMM Tool Security Week News
Secure.com Raises .5 Million for Agentic Security Secure.com Raises $4.5 Million for Agentic Security Security Week News
Marimo Vulnerability Exploited Quickly After Disclosure Marimo Vulnerability Exploited Quickly After Disclosure Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Target Cisco Devices with Known Vulnerabilities
  • ADT Faces Data Breach After ShinyHunters Claim
  • Chinese Hackers Exploit Routers for Hidden Cyber Attacks
  • Ollama Vulnerability Exposes Servers to Data Leaks
  • Udemy Targeted in Alleged Data Breach by Hacker Group

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Target Cisco Devices with Known Vulnerabilities
  • ADT Faces Data Breach After ShinyHunters Claim
  • Chinese Hackers Exploit Routers for Hidden Cyber Attacks
  • Ollama Vulnerability Exposes Servers to Data Leaks
  • Udemy Targeted in Alleged Data Breach by Hacker Group

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark