• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
microsoft reveals clickfix campaign using windows terminal to deploy lumma

Microsoft Reveals ClickFix Campaign Using Windows Terminal to Deploy Lumma Stealer

You are here: Home / General Cyber Security News / Microsoft Reveals ClickFix Campaign Using Windows Terminal to Deploy Lumma Stealer
March 6, 2026

Microsoft on Thursday disclosed details of a new widespread ClickFix social engineering campaign that has leveraged the Windows Terminal app as a way to activate a sophisticated attack chain and deploy the Lumma Stealer malware.

The activity, observed in February 2026, makes use of the terminal emulator program instead of instructing users to launch the Windows Run dialog and paste a command into it.

“This campaign instructs targets to use the Windows + X → I shortcut to launch Windows Terminal (wt.exe) directly, guiding users into a privileged command execution environment that blends into legitimate administrative workflows and appears more trustworthy to users,” the Microsoft Threat Intelligence team said in a series of posts on X.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Cybersecurity

What makes the latest variant notable is that it bypasses detections specifically designed to flag Run dialog abuse, not to mention take advantage of the legitimacy of Windows Terminal to trick unsuspecting users into running malicious commands delivered via bogus CAPTCHA pages, troubleshooting prompts, or other verification-style lures.

The post-compromise attack chain is also unique: when the user pastes a hex-encoded, XOR-compressed command copied from the ClickFix lure page into a Windows Terminal session, it spans additional Terminal/PowerShell instances to ultimately invoke a PowerShell process responsible for decoding the script.

This, in turn, leads to the download of a ZIP payload and a legitimate but renamed 7-Zip binary, the latter of which is saved to disk with a randomized file name. The utility then proceeds to extract the contents of the ZIP file, triggering a multi-stage attack chain that involves the following steps –

  • Retrieving more payloads
  • Setting up persistence via scheduled tasks
  • Configuring Microsoft Defender exclusions
  • Exfiltrating machine and network data
  • Deploying Lumma Stealer using a technique called QueueUserAPC() by injecting the malware into “chrome.exe” and “msedge.exe” processes

Cybersecurity

“The stealer targets high-value browser artifacts, including Web Data and Login Data, harvesting stored credentials and exfiltrating them to attacker-controlled infrastructure,” Microsoft said.

The Windows maker said it also detected a second attack pathway, as part of which, when the compressed command is pasted into Windows Terminal, it downloads a randomly named batch script to the “AppData\Local” folder by means of “cmd.exe” in order to write a Visual Basic Script to the Temp folder (aka %TEMP%).

“The batch script is then executed via cmd.exe with the /launched command-line argument. The same batch script is then executed through MSBuild.exe, resulting in LOLBin abuse,” it added. “The script connects to Crypto Blockchain RPC endpoints, indicating an etherhiding technique. It also performs QueueUserAPC()-based code injection into chrome.exe and msedge.exe processes to harvest Web Data and Login Data.”

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «hikvision and rockwell automation cvss 9.8 flaws added to cisa Hikvision and Rockwell Automation CVSS 9.8 Flaws Added to CISA KEV Catalog

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Microsoft Reveals ClickFix Campaign Using Windows Terminal to Deploy Lumma Stealer
  • Hikvision and Rockwell Automation CVSS 9.8 Flaws Added to CISA KEV Catalog
  • Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities
  • ThreatsDay Bulletin: DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine & More
  • Preparing for the Quantum Era: Post-Quantum Cryptography Webinar for Security Leaders
  • Dust Specter Targets Iraqi Officials with New SPLITDROP and GHOSTFORM Malware
  • Where Multi-Factor Authentication Stops and Credential Abuse Starts
  • APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine
  • Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks
  • FBI and Europol Seize LeakBase Forum Used to Trade Stolen Credentials

Copyright © TheCyberSecurity.News, All Rights Reserved.