ClickFix Shifts to Windows Terminal Evasion

๐กPhishing evades Defender/training via Terminalโprotect Windows AI workstations.
โก 30-Second TL;DR
What Changed
Attackers direct Win+X โ I to launch wt.exe instead of Win+R Run
Why It Matters
This evasion boosts phishing success against Windows users, risking data in AI dev environments. Enterprises must update training beyond Run dialog warnings. Heightens urgency for endpoint detection refinements.
What To Do Next
Update security training to block pasting commands in Windows Terminal on dev machines.
๐ง Deep Insight
Web-grounded analysis with 7 cited sources.
๐ Enhanced Key Takeaways
- โขThe Windows Terminal variant deploys Lumma Stealer via QueueUserAPC() injection into chrome.exe and msedge.exe processes to harvest browser credentials like Web Data and Login Data.[1][2]
- โขA parallel attack chain downloads a batch script to AppData\Local, writes VBScript to %TEMP%, and leverages MSBuild as a LOLBin for execution.[1]
- โขClickFix campaign originated in 2024 as social engineering tricking users into pasting commands via Run dialog, malvertising, and fake CAPTCHAs, evolving to evade multi-line warnings.[5][6]
๐ ๏ธ Technical Deep Dive
- โขHex-encoded, XOR-compressed PowerShell command pasted into wt.exe spawns additional Terminal/PowerShell instances for decoding, ZIP download, and renamed 7-Zip extraction.[1]
- โขFinal payload in C:\ProgramData\app_config\ctjb uses QueueUserAPC() for process injection into browsers, targeting high-value artifacts for exfiltration.[2]
- โขAlternative pathway employs reflective PE loading, API hashing, position-independent shellcode, and PE downloader for memory-only execution to bypass file-based detections.[3]
๐ฎ Future ImplicationsAI analysis grounded in cited sources
โณ Timeline
๐ Sources (7)
Factual claims are grounded in the sources below. Forward-looking analysis is AI-generated interpretation.
- thehackernews.com โ Microsoft Reveals Clickfix Campaign
- securityaffairs.com โ Microsoft Warns of Clickfix Campaign Exploiting Windows Terminal for Lumma Stealer
- radar.offseq.com โ How Clickfix Opens the Door to Stealthy Stealc Inf 765d6586
- Microsoft โ Clickfix Variant Crashfix Deploying Python Rat Trojan
- Microsoft โ Think Before You Clickfix Analyzing the Clickfix Social Engineering Technique
- proofpoint.com โ Security Brief Clickfix Social Engineering Technique Floods Threat Landscape
- sisainfosec.com โ Critical Alerts Covering Clickfix Evolves AI Supply Chain Attacks and Enterprise Zero Days
Weekly AI Recap
Read this week's curated digest of top AI events โ
๐Related Updates
AI-curated news aggregator. All content rights belong to original publishers.
Original source: Computerworld โ