BTC $71,807
2026 Bull Run Is Building Start trading with 5% OFF all fees
Sign Up Now
BTC $71,807
Bull Run 2026 | 5% Off Fees Open your Binance account today
Sign Up

ClickFix Malware Spreads Via Windows Terminal Lure

ClickFix attack uses trusted Windows Terminal to deploy Lumma Stealer malware

  • A widespread social engineering scheme, dubbed ClickFix, is now using the legitimate Windows Terminal app to trick users and deploy malware.
  • The campaign bypasses security measures by guiding users to paste malicious commands into Windows Terminal, which appears more trustworthy than the traditional Run dialog.
  • The sophisticated attack chain ultimately deploys the Lumma Stealer malware, which steals valuable browser data like stored credentials, according to posts from the Microsoft Threat Intelligence team.

Microsoft disclosed a sophisticated social engineering campaign in February 2026 that weaponizes the legitimate Windows Terminal app to execute malware. This ClickFix campaign uses bogus CAPTCHA and troubleshooting pages to lure victims into pasting malicious commands, according to the company’s threat intelligence team.

- Advertisement -

This new method bypasses detections designed to flag Run dialog abuse by leveraging the trusted aura of administrative workflows. Consequently, the campaign tricks users into activating a privileged command execution environment within Windows Terminal.

When a user pastes the encoded command, it spawns multiple terminal instances to decode a script and download a payload. The attack chain then retrieves more payloads, sets persistence, configures Microsoft Defender exclusions, and exfiltrates machine data.

It ultimately deploys Lumma Stealer using a QueueUserAPC() injection technique into browser processes. “The stealer targets high-value browser artifacts, including Web Data and Login Data, harvesting stored credentials and exfiltrating them to attacker-controlled infrastructure,” Microsoft said.

Microsoft also observed a second pathway where the command downloads a batch script that abuses LOLBins. Meanwhile, this script connects to Crypto Blockchain RPC endpoints, indicating an etherhiding technique, and also injects code to harvest browser data.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -
Ad
Altseason Is Loading. Don't watch from the sidelines.
SOL $90.51
DOGE $0.0963
LINK $9.02
SUI $1.00
5% off fees when you sign up
Start Trading
Ad
Pay Less on Every Trade. For Life.
$10K/mo volume Save $60/yr
$50K/mo volume Save $300/yr
$100K/mo volume Save $600/yr
5% off all trading fees when you sign up
Claim Your Discount

Latest News

Newsom bans gov insiders from profiting on prediction markets.

California Governor Gavin Newsom signed an executive order on March 27, 2026, expanding insider...

Apple Alerts Outdated iPhones to Spyware Attack Risk

Apple is sending critical Lock Screen notifications to iPhones and iPads on outdated software,...

Wolfe Sees 60% Upside for Nvidia on AI Pods

NVIDIA maintains strong buy ratings from Wall Street, with Wolfe Research reiterating a $275...

Claude Mythos AI Leak Spooks Cybersecurity Market

A leak this week revealed Anthropic’s most powerful AI model yet, the "Claude Mythos."The...

Machi Big Brother Adds $500K USDC Despite $76M Loss

Jeffrey "Machi Big Brother" Huang recently added $500,000 to his Hyperliquid account despite being...

Must Read

8 Best Bitcoin Offshore Hosting Providers

In this blog post, we'll list the top 8 best bitcoin offshore hosting providers that accept Bitcoin and other cryptocurrencies.As Bitcoin continues to grow...
Ad
Altseason Is Loading. These 4 coins are trending right now.
SOL $92.12
DOGE $0.0950
LINK $9.02
SUI $1.02
5% off spot fees when you sign up
Start Trading