Malware & RansomwareHIGH

ClickFix Campaign Uses Windows Terminal to Deploy Lumma Stealer

THThe Hacker News15h ago2 min read
Windows TerminalLumma StealerClickFix campaignMicrosoft
🎯

Basically, a new scam uses a Windows app to steal your information.

Quick Summary

A new ClickFix campaign is exploiting Windows Terminal to spread Lumma Stealer malware. Windows users are at risk of having their sensitive information stolen. Stay vigilant and ensure your security measures are up to date.

What Happened

Imagine opening a trusted app on your computer, only to find it’s being used against you. Microsoft recently unveiled a widespread ClickFix campaign that exploits the Windows Terminal? app to deploy Lumma Stealer malware?. This campaign, first spotted in February 2026, represents a clever twist in social engineering? tactics.

Instead of the usual method of asking users to open the Windows Run dialog and enter commands, attackers are using the terminal emulator? itself. This makes the attack feel more legitimate and less suspicious, as users might not recognize the danger in using a familiar application. The ClickFix campaign? is a reminder that even trusted tools can be manipulated for malicious purposes.

Why Should You Care

You might think your computer is safe just because you’re using well-known applications. But this campaign shows that even trusted software can become a vehicle for theft. If you use Windows, your personal information, passwords, and sensitive data could be at risk.

Imagine if someone broke into your home not through the front door, but by pretending to be a trusted visitor. This is exactly what the ClickFix campaign? does — it disguises malicious activity within a familiar interface. Your vigilance is key to protecting your digital life.

What's Being Done

Microsoft is actively investigating the ClickFix campaign? and is likely working on patches to secure the Windows Terminal? app. If you are a Windows user, here are some immediate steps you should take:

  • Ensure your antivirus software is up to date.
  • Be cautious about unexpected prompts or requests to run commands.
  • Regularly monitor your accounts for unusual activity.

Experts are keeping an eye on how this campaign evolves and whether similar tactics will be employed in future attacks. Stay informed and protect yourself from these emerging threats.

💡 Tap dotted terms for explanations

🔒 Pro insight: This campaign highlights the evolving tactics of social engineering, leveraging trusted applications to bypass user skepticism.

Original article from

The Hacker News

Read Full Article

Related Pings

HIGHMalware & Ransomware

VOID#GEIST Malware Unleashes Trio of Dangerous RATs

A new malware campaign named VOID#GEIST is delivering dangerous RATs like XWorm and AsyncRAT. This affects anyone using a computer, as hackers can gain control and steal sensitive data. Stay vigilant and update your security measures to protect yourself.

The Hacker News·10h ago·2m
HIGHMalware & Ransomware

AI-Powered Malware: Transparent Tribe Targets India

A hacking group is using AI to create malware targeting India. This mass production of implants could compromise personal data and financial security. Experts recommend updating software and using strong passwords to protect against these threats.

The Hacker News·10h ago·2m
HIGHMalware & Ransomware

InstallFix Attacks Use Fake Guides to Spread Infostealers

Hackers are using fake installation guides to spread infostealers through InstallFix attacks. Anyone following online tutorials could be at risk of having their personal information stolen. Stay vigilant and verify sources before executing commands.

BleepingComputer·11h ago·2m
HIGHMalware & Ransomware

New Mirax Bot Threatens Android Users with Banking Fraud

A new Android banking malware named Mirax Bot is being sold to criminals online. This malware poses a serious risk to your financial security. Experts recommend keeping your device updated and using trusted apps to protect yourself.

Cyber Security News·13h ago·2m
HIGHMalware & Ransomware

Kimwolf Botnet Infects 2 Million Devices: Who's Cashing In?

A new botnet called Kimwolf has infected over two million devices. Unofficial Android TV streaming boxes are the main targets. This widespread infection poses risks for personal data and business operations. Experts are working to mitigate the threat and protect users.

Krebs on Security·15h ago·2m
HIGHMalware & Ransomware

Phishing Kit 'Starkiller' Outsmarts MFA Protections

A new phishing kit named 'Starkiller' can bypass Multi-Factor Authentication. This affects anyone who uses online services. Stay alert, as this tool makes it easier for attackers to steal your credentials.

Dark Reading·17h ago·2m