ClickFix Malware Attack Uses Fake Windows Update Screens to Infect Systems

Jan 6, 2026

Cybercriminals have evolved the ClickFix social-engineering attack vector with a new variant that leverages highly convincing fake Windows Update screens in users’ browsers to coerce them into executing commands that ultimately install malware on their systems.

What’s Happening?

Researchers have identified a surge in ClickFix attack variants that trick victims into believing they are completing a critical Windows update. These malicious pages display a full-screen Windows Update animation and instruct users to perform keyboard shortcuts, which automatically paste attacker-controlled commands into the Windows Run box or Command Prompt. When the user executes these commands, malware is downloaded and run on the victim’s machine.

Unlike simplistic fake update traps seen previously, this iteration employs advanced steganography to conceal portions of its payload inside image files, making detection by traditional defenses more difficult.

How the Attack Works

Below is a simplified overview of the attack chain observed by threat researchers:

Stage

Description

1. Lure

Victim is served a full-screen browser page mimicking the Windows Update interface.

2. Command Trickery

The page uses JavaScript to copy malicious command text into the clipboard and instructs the user to paste it and press Enter.

3. Execution

The pasted command runs via Windows Run or Command Prompt, pulling down malware loaders.

4. Steganographic Payload

Final payloads are encoded within the pixel data of PNG images and extracted in memory using custom loaders.

5. Malware Activation

Infostealers such as LummaC2 and Rhadamanthys are deployed, designed to steal credentials and sensitive user data.

Note: Real Windows updates do not require users to manually paste and execute arbitrary code.

Why This Is Dangerous

This ClickFix variant is particularly concerning for the following reasons:

  • Realistic Visual Deception: The fake update screen convincingly mimics the legitimate Windows update interface, lowering user suspicion.

  • Steganography: Embedding malware code within images that are reconstructed programmatically makes detection harder for signature-based security tools.

  • Living-off-the-land Tools: The attack abuses trusted Windows binaries like mshta.exe and PowerShell, enabling execution without leaving clear traces on disk.

  • Persistent Threat: Even after parts of its infrastructure were taken down by law enforcement, the fake update domains remain active, posing ongoing risk.

What Malware Is Delivered?

In the analyzed campaigns, researchers recovered two primary malware families delivered through this technique:

  • LummaC2 – A credential-stealing malware.

  • Rhadamanthys – Another information stealer known for harvesting sensitive system and user data.

These payloads are reconstructed and executed in memory, helping them evade traditional disk-based detection.

How to Protect Yourself

To reduce the risk of falling victim to ClickFix attacks, security teams should consider the following measures:

1. Disable Windows Run Box (Win+R)
Where possible, prevent users from invoking the Run dialog, since this is often abused in these attacks.

2. Monitor Process Chains
Watch for unusual child processes such as explorer.exe spawning mshta.exe or unexpected PowerShell commands.

3. User Awareness Training
Educate users on why they should never paste commands into system dialogs or run code from unsolicited web pages.

4. Incident Investigation
In the event of a suspected breach, analysts can review the RunMRU registry key for evidence of malicious commands being executed.

Bottom Line

The ClickFix technique continues to evolve, blending social engineering, stealthy payload delivery, and abuse of trusted system functionality to trick users into infecting their own machines. This campaign underscores the critical importance of combining user education, endpoint monitoring, and behavioral threat detection to protect organizations from sophisticated human-centric attacks like this.

Disclaimer: ClearPhish maintains a strict policy of not participating in the theft, distribution, or handling of stolen data or files. The platform does not engage in exfiltration, downloading, hosting, or reposting any illegally obtained information. Any responsibility or legal inquiries regarding the data should be directed solely at the responsible cybercriminals or attackers, as ClearPhish is not involved in these activities. We encourage parties affected by any breach to seek resolution through legal channels directly with the attackers responsible for such incidents.

Latest News

Figure Data Breach Exposes Nearly 1 Million Accounts in Social Engineering Attack
Figure Data Breach Exposes Nearly 1 Million Accounts in Social Engineering Attack
Figure Data Breach Exposes Nearly 1 Million Accounts in Social Engineering Attack
Figure Data Breach Exposes Nearly 1 Million Accounts in Social Engineering Attack

Figure Data Breach Exposes Nearly 1 Million Accounts in Social Engineering Attack

Figure Data Breach Exposes Nearly 1 Million Accounts in Social Engineering Attack

Figure Data Breach Exposes Nearly 1 Million Accounts in Social Engineering Attack

Figure Data Breach Exposes Nearly 1 Million Accounts in Social Engineering Attack

Feb 19, 2026

Google Patches First Chrome Zero-Day of 2026 Actively Exploited in Attacks
Google Patches First Chrome Zero-Day of 2026 Actively Exploited in Attacks
Google Patches First Chrome Zero-Day of 2026 Actively Exploited in Attacks
Google Patches First Chrome Zero-Day of 2026 Actively Exploited in Attacks

Google Patches First Chrome Zero-Day of 2026 Actively Exploited in Attacks

Google Patches First Chrome Zero-Day of 2026 Actively Exploited in Attacks

Google Patches First Chrome Zero-Day of 2026 Actively Exploited in Attacks

Google Patches First Chrome Zero-Day of 2026 Actively Exploited in Attacks

Feb 17, 2026

Russia Moves to Block WhatsApp and Telegram in Expanding Communication Crackdown
Russia Moves to Block WhatsApp and Telegram in Expanding Communication Crackdown
Russia Moves to Block WhatsApp and Telegram in Expanding Communication Crackdown
Russia Moves to Block WhatsApp and Telegram in Expanding Communication Crackdown

Russia Moves to Block WhatsApp and Telegram in Expanding Communication Crackdown

Russia Moves to Block WhatsApp and Telegram in Expanding Communication Crackdown

Russia Moves to Block WhatsApp and Telegram in Expanding Communication Crackdown

Russia Moves to Block WhatsApp and Telegram in Expanding Communication Crackdown

Feb 13, 2026

Fake AI Chrome Extensions With 300K Installs Steal Credentials and Gmail Emails
Fake AI Chrome Extensions With 300K Installs Steal Credentials and Gmail Emails
Fake AI Chrome Extensions With 300K Installs Steal Credentials and Gmail Emails
Fake AI Chrome Extensions With 300K Installs Steal Credentials and Gmail Emails

Fake AI Chrome Extensions With 300K Installs Steal Credentials and Gmail Emails

Fake AI Chrome Extensions With 300K Installs Steal Credentials and Gmail Emails

Fake AI Chrome Extensions With 300K Installs Steal Credentials and Gmail Emails

Fake AI Chrome Extensions With 300K Installs Steal Credentials and Gmail Emails

Feb 13, 2026

China-Linked UNC3886 Breaches Singapore’s Four Largest Telecom Providers
China-Linked UNC3886 Breaches Singapore’s Four Largest Telecom Providers
China-Linked UNC3886 Breaches Singapore’s Four Largest Telecom Providers
China-Linked UNC3886 Breaches Singapore’s Four Largest Telecom Providers

China-Linked UNC3886 Breaches Singapore’s Four Largest Telecom Providers

China-Linked UNC3886 Breaches Singapore’s Four Largest Telecom Providers

China-Linked UNC3886 Breaches Singapore’s Four Largest Telecom Providers

China-Linked UNC3886 Breaches Singapore’s Four Largest Telecom Providers

Feb 11, 2026

Ransomware Gangs Abuse ISPsystem VMs for Stealthy Payload Delivery
Ransomware Gangs Abuse ISPsystem VMs for Stealthy Payload Delivery
Ransomware Gangs Abuse ISPsystem VMs for Stealthy Payload Delivery
Ransomware Gangs Abuse ISPsystem VMs for Stealthy Payload Delivery

Ransomware Gangs Abuse ISPsystem VMs for Stealthy Payload Delivery

Ransomware Gangs Abuse ISPsystem VMs for Stealthy Payload Delivery

Ransomware Gangs Abuse ISPsystem VMs for Stealthy Payload Delivery

Ransomware Gangs Abuse ISPsystem VMs for Stealthy Payload Delivery

Feb 9, 2026

Get updates in your inbox directly

You are now subscribed.

Get updates in your inbox directly

You are now subscribed.

Get updates in your

inbox directly

You are now subscribed.

Get updates in your inbox directly

You are now subscribed.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.