Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Microsoft Reveals ClickFix Campaign Using Windows Terminal to Deploy Lumma Stealer
    Cybersecurity

    Microsoft Reveals ClickFix Campaign Using Windows Terminal to Deploy Lumma Stealer

    adminBy adminMarch 6, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    ClickFix Campaign
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Ravie LakshmananMar 06, 2026Endpoint Security / Browser Security

    ClickFix Campaign

    Microsoft on Thursday disclosed details of a new widespread ClickFix social engineering campaign that has leveraged the Windows Terminal app as a way to activate a sophisticated attack chain and deploy the Lumma Stealer malware.

    The activity, observed in February 2026, makes use of the terminal emulator program instead of instructing users to launch the Windows Run dialog and paste a command into it.

    “This campaign instructs targets to use the Windows + X → I shortcut to launch Windows Terminal (wt.exe) directly, guiding users into a privileged command execution environment that blends into legitimate administrative workflows and appears more trustworthy to users,” the Microsoft Threat Intelligence team said in a series of posts on X.

    What makes the latest variant notable is that it bypasses detections specifically designed to flag Run dialog abuse, not to mention take advantage of the legitimacy of Windows Terminal to trick unsuspecting users into running malicious commands delivered via bogus CAPTCHA pages, troubleshooting prompts, or other verification-style lures.

    The post-compromise attack chain is also unique: when the user pastes a hex-encoded, XOR-compressed command copied from the ClickFix lure page into a Windows Terminal session, it spans additional Terminal/PowerShell instances to ultimately invoke a PowerShell process responsible for decoding the script.

    This, in turn, leads to the download of a ZIP payload and a legitimate but renamed 7-Zip binary, the latter of which is saved to disk with a randomized file name. The utility then proceeds to extract the contents of the ZIP file, triggering a multi-stage attack chain that involves the following steps –

    • Retrieving more payloads
    • Setting up persistence via scheduled tasks
    • Configuring Microsoft Defender exclusions
    • Exfiltrating machine and network data
    • Deploying Lumma Stealer using a technique called QueueUserAPC() by injecting the malware into “chrome.exe” and “msedge.exe” processes

    “The stealer targets high-value browser artifacts, including Web Data and Login Data, harvesting stored credentials and exfiltrating them to attacker-controlled infrastructure,” Microsoft said.

    The Windows maker said it also detected a second attack pathway, as part of which, when the compressed command is pasted into Windows Terminal, it downloads a randomly named batch script to the “AppData\Local” folder by means of “cmd.exe” in order to write a Visual Basic Script to the Temp folder (aka %TEMP%).

    “The batch script is then executed via cmd.exe with the /launched command-line argument. The same batch script is then executed through MSBuild.exe, resulting in LOLBin abuse,” it added. “The script connects to Crypto Blockchain RPC endpoints, indicating an etherhiding technique. It also performs QueueUserAPC()-based code injection into chrome.exe and msedge.exe processes to harvest Web Data and Login Data.”

    Campaign ClickFix Deploy Lumma Microsoft Reveals Stealer terminal Windows
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleWhy Google Discover Is No Longer Just For Publishers
    Next Article Microsoft is giving Copilot a screenshotting tool, but this one isn’t as bad as you may think
    admin
    • Website

    Related Posts

    CISA Adds 8 Exploited Flaws to KEV, Sets April-May 2026 Federal Deadlines

    April 21, 2026

    Researchers build an encrypted routing layer for private AI inference

    April 21, 2026

    China’s Apple App Store infiltrated by crypto-stealing wallet apps

    April 21, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Why you should buy a 2025 Razr now

    April 21, 2026

    CISA Adds 8 Exploited Flaws to KEV, Sets April-May 2026 Federal Deadlines

    April 21, 2026

    Authority, Freshness & First-Party Signals

    April 21, 2026

    The ‘Gun God’ Controller Turns One Plus’ New Smartphone Into a Sleek Handheld Gaming Console

    April 21, 2026
    Categories
    • Blogging (66)
    • Cybersecurity (1,424)
    • Privacy & Online Earning (175)
    • SEO & Digital Marketing (864)
    • Tech Tools & Mobile / Apps (1,711)
    • WiFi / Internet & Networking (234)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Why you should buy a 2025 Razr now

    April 21, 2026

    CISA Adds 8 Exploited Flaws to KEV, Sets April-May 2026 Federal Deadlines

    April 21, 2026

    Authority, Freshness & First-Party Signals

    April 21, 2026
    Most Popular
    • Why you should buy a 2025 Razr now
    • CISA Adds 8 Exploited Flaws to KEV, Sets April-May 2026 Federal Deadlines
    • Authority, Freshness & First-Party Signals
    • The ‘Gun God’ Controller Turns One Plus’ New Smartphone Into a Sleek Handheld Gaming Console
    • Researchers build an encrypted routing layer for private AI inference
    • China’s Apple App Store infiltrated by crypto-stealing wallet apps
    • How to win beyond clicks in AI search
    • This headphone feature fixes the most annoying Bluetooth problem I had
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.