BTC $71,807
2026 Bull Run Is Building Start trading with 5% OFF all fees
Sign Up Now
BTC $71,807
Bull Run 2026 | 5% Off Fees Open your Binance account today
Sign Up

ClickFix Malware Spreads Via Windows Terminal Lure

ClickFix attack uses trusted Windows Terminal to deploy Lumma Stealer malware

  • A widespread social engineering scheme, dubbed ClickFix, is now using the legitimate Windows Terminal app to trick users and deploy malware.
  • The campaign bypasses security measures by guiding users to paste malicious commands into Windows Terminal, which appears more trustworthy than the traditional Run dialog.
  • The sophisticated attack chain ultimately deploys the Lumma Stealer malware, which steals valuable browser data like stored credentials, according to posts from the Microsoft Threat Intelligence team.

Microsoft disclosed a sophisticated social engineering campaign in February 2026 that weaponizes the legitimate Windows Terminal app to execute malware. This ClickFix campaign uses bogus CAPTCHA and troubleshooting pages to lure victims into pasting malicious commands, according to the company’s threat intelligence team.

- Advertisement -

This new method bypasses detections designed to flag Run dialog abuse by leveraging the trusted aura of administrative workflows. Consequently, the campaign tricks users into activating a privileged command execution environment within Windows Terminal.

When a user pastes the encoded command, it spawns multiple terminal instances to decode a script and download a payload. The attack chain then retrieves more payloads, sets persistence, configures Microsoft Defender exclusions, and exfiltrates machine data.

It ultimately deploys Lumma Stealer using a QueueUserAPC() injection technique into browser processes. “The stealer targets high-value browser artifacts, including Web Data and Login Data, harvesting stored credentials and exfiltrating them to attacker-controlled infrastructure,” Microsoft said.

Microsoft also observed a second pathway where the command downloads a batch script that abuses LOLBins. Meanwhile, this script connects to Crypto Blockchain RPC endpoints, indicating an etherhiding technique, and also injects code to harvest browser data.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -
Ad
Altseason Is Loading. Don't watch from the sidelines.
SOL $90.51
DOGE $0.0963
LINK $9.02
SUI $1.00
5% off fees when you sign up
Start Trading
Ad
Pay Less on Every Trade. For Life.
$10K/mo volume Save $60/yr
$50K/mo volume Save $300/yr
$100K/mo volume Save $600/yr
5% off all trading fees when you sign up
Claim Your Discount

Latest News

Rosenblatt Raises Nvidia Target to $325, Sees $1T AI Demand

NVIDIA stock outperformed the S&P 500 and its sector, climbing approximately 8% over the...

RaveDAO Denies Manipulation as Exchanges Probe Token Plunge

RaveDAO has denied responsibility for its RAVE token's extreme price volatility following allegations of...

Robinhood Soars 31% on SEC Rule Change and Crypto Rally

Robinhood (HOOD) stock surged 31% this week, making it the top performer in the...

Bitcoin Eyes $82K by April’s End Amid Volatility

Analysts predict a final push for Bitcoin towards the $78,000-$80,000 zone before a potential...

Worldcoin Drops 13% Despite Zoom, Docusign ID Deals

Worldcoin (WLD) dropped 13.4% to roughly $0.28 on Friday, contrasting with a broader crypto...

Must Read

Tutorial: How to Buy a Domain Name Permanently? (Super Easy)

Are you ready to establish a permanent online presence and you want to buy a domain forever?In this tutorial, we'll show you how to...
Ad
Altseason Is Loading. These 4 coins are trending right now.
SOL $92.12
DOGE $0.0950
LINK $9.02
SUI $1.02
5% off spot fees when you sign up
Start Trading