Microsoft Reveals ClickFix Campaign Using Windows Terminal to Deploy Lumma Stealer
嗯,用户让我帮忙总结这篇文章,控制在100字以内。首先,我得通读一下文章内容。这篇文章讲的是微软披露了一个新的网络钓鱼活动,叫做ClickFix,利用Windows终端应用来传播恶意软件Lumma Stealer。 用户的要求是用中文总结,不需要特定的开头,直接写描述。所以我要抓住关键点:攻击者使用Windows Terminal来绕过检测,诱导用户执行恶意命令,最终部署Lumma Stealer窃取浏览器数据。 接下来,我需要确保内容简洁明了,不超过100字。可能的结构是:攻击方式、目标、手段和结果。比如,“微软披露ClickFix钓鱼活动利用Windows Terminal绕过检测,诱导用户执行恶意命令并部署Lumma Stealer窃取浏览器数据。” 检查一下是否涵盖了主要信息:攻击者、工具、手段、目标和结果。看起来都包括了。再看看有没有冗余的信息可以删减,比如技术细节可能不需要详细说明。 最后,确保语言流畅自然,没有语法错误。这样用户的请求就能得到满足了。 </think> 微软披露ClickFix钓鱼活动利用Windows Terminal绕过检测,诱导用户执行恶意命令并部署Lumma Stealer窃取浏览器数据。 2026-3-6 06:44:0 Author: thehackernews.com(查看原文) 阅读量:8 收藏

Endpoint Security / Browser Security

ClickFix Campaign

Microsoft on Thursday disclosed details of a new widespread ClickFix social engineering campaign that has leveraged the Windows Terminal app as a way to activate a sophisticated attack chain and deploy the Lumma Stealer malware.

The activity, observed in February 2026, makes use of the terminal emulator program instead of instructing users to launch the Windows Run dialog and paste a command into it.

"This campaign instructs targets to use the Windows + X → I shortcut to launch Windows Terminal (wt.exe) directly, guiding users into a privileged command execution environment that blends into legitimate administrative workflows and appears more trustworthy to users," the Microsoft Threat Intelligence team said in a series of posts on X.

What makes the latest variant notable is that it bypasses detections specifically designed to flag Run dialog abuse, not to mention take advantage of the legitimacy of Windows Terminal to trick unsuspecting users into running malicious commands delivered via bogus CAPTCHA pages, troubleshooting prompts, or other verification-style lures.

The post-compromise attack chain is also unique: when the user pastes a hex-encoded, XOR-compressed command copied from the ClickFix lure page into a Windows Terminal session, it spans additional Terminal/PowerShell instances to ultimately invoke a PowerShell process responsible for decoding the script.

This, in turn, leads to the download of a ZIP payload and a legitimate but renamed 7-Zip binary, the latter of which is saved to disk with a randomized file name. The utility then proceeds to extract the contents of the ZIP file, triggering a multi-stage attack chain that involves the following steps -

  • Retrieving more payloads
  • Setting up persistence via scheduled tasks
  • Configuring Microsoft Defender exclusions
  • Exfiltrating machine and network data
  • Deploying Lumma Stealer using a technique called QueueUserAPC() by injecting the malware into "chrome.exe" and "msedge.exe" processes

"The stealer targets high-value browser artifacts, including Web Data and Login Data, harvesting stored credentials and exfiltrating them to attacker-controlled infrastructure," Microsoft said.

The Windows maker said it also detected a second attack pathway, as part of which, when the compressed command is pasted into Windows Terminal, it downloads a randomly named batch script to the "AppData\Local" folder by means of "cmd.exe" in order to write a Visual Basic Script to the Temp folder (aka %TEMP%).

"The batch script is then executed via cmd.exe with the /launched command-line argument. The same batch script is then executed through MSBuild.exe, resulting in LOLBin abuse," it added. "The script connects to Crypto Blockchain RPC endpoints, indicating an etherhiding technique. It also performs QueueUserAPC()-based code injection into chrome.exe and msedge.exe processes to harvest Web Data and Login Data."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/03/microsoft-reveals-clickfix-campaign.html
如有侵权请联系:admin#unsafe.sh