Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Transparent Tribe uses AI to mass produce malware implants in campaign targeting India

Multi-stage VOID#GEIST malware that delivers XWorm, AsyncRAT, and Xeno RAT

Is space weather hiding alien signals?

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Microsoft reveals ClickFix campaign to deploy Lumma Stealer using Windows Terminal
Identity

Microsoft reveals ClickFix campaign to deploy Lumma Stealer using Windows Terminal

userBy userMarch 6, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananMarch 6, 2026Endpoint security/browser security

click fix campaign

Microsoft on Thursday revealed details of a wide-ranging new ClickFix social engineering campaign that leveraged the Windows Terminal app as a way to activate a sophisticated attack chain and deploy the Lumma Stealer malware.

This activity, identified in February 2026, allows users to install Windows[ファイル名を指定して実行]Instead of launching a dialog and instructing you to paste a command into it, a terminal emulator program is utilized.

In a series of posts about X, the Microsoft Threat Intelligence team said, “The campaign instructs targets to directly launch Windows Terminal (wt.exe) using the Windows+X→I shortcut, directing users to a privileged command execution environment that blends into legitimate administrative workflows and appears more trustworthy to users.”

What’s notable about the latest variants is that they leverage the legitimacy of Windows Terminal to evade detections specifically designed to flag run dialog abuse, not to mention trick unsuspecting users into executing malicious commands delivered via fake CAPTCHA pages, troubleshooting prompts, or other forms of validation enticement.

The post-breach attack chain is also unique. When a user pastes a hex-encoded, XOR-compressed command copied from the ClickFix lure page into a Windows Terminal session, it spans additional terminal/PowerShell instances and ultimately calls a PowerShell process responsible for decoding the script.

This downloads a ZIP payload and a legitimate but renamed 7-Zip binary, the latter being saved to disk with a random filename. The utility then begins extracting the contents of the ZIP file, triggering a multi-step attack chain that includes the following steps:

Obtain more payloads Configure persistence through scheduled tasks Configure Microsoft Defender exclusions Extract machine and network data Deploy Lumma Stealer using a technique called QueueUserAPC() by injecting malware into the “chrome.exe” and “msedge.exe” processes

“This stealer targets high-value browser artifacts such as web data and login data, harvesting stored credentials, and exfiltrating them to attacker-controlled infrastructure,” Microsoft said.

The Windows maker said it also detected a second attack vector. As part of this, when the compressed command is pasted into the Windows Terminal, a randomly named batch script is downloaded to the “AppData\Local” folder using “cmd.exe”, and a Visual Basic script is written to the Temp folder (aka %TEMP%).

“The batch script is then executed via cmd.exe with the /launched command line argument. The same batch script is then executed via MSBuild.exe, resulting in LOLBin exploitation,” the report added. “The script connects to a Crypto Blockchain RPC endpoint, demonstrating ether hiding techniques, and performs QueueUserAPC()-based code injection into the chrome.exe and msedge.exe processes to collect web and login data.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleHikvision and Rockwell Automation CVSS 9.8 defects added to CISA KEV catalog
Next Article High-performance large language models for Europe
user
  • Website

Related Posts

Transparent Tribe uses AI to mass produce malware implants in campaign targeting India

March 6, 2026

Multi-stage VOID#GEIST malware that delivers XWorm, AsyncRAT, and Xeno RAT

March 6, 2026

MSP guide to scaling cybersecurity with AI-powered risk management

March 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Transparent Tribe uses AI to mass produce malware implants in campaign targeting India

Multi-stage VOID#GEIST malware that delivers XWorm, AsyncRAT, and Xeno RAT

Is space weather hiding alien signals?

UK begins new vaccine trial for bird flu

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.