29 January, 2026
cybercriminals-deploy-fake-windows-updates-in-clickfix-malware-attack

A new wave of cyberattacks has emerged, with hackers now disguising malware as legitimate Windows updates. Known as the ClickFix campaign, this tactic uses a convincing interface that mimics official update notifications, tricking users into downloading harmful software.

Cybersecurity experts have observed that the ClickFix campaign has evolved from earlier tactics that primarily utilized human verification pages. Attackers now present a full-screen Windows update screen that closely resembles the genuine article, featuring fake progress bars and familiar update messages. According to cybersecurity firm Joe Security, these deceptive prompts encourage users to execute a command that secretly installs malware on their devices.

The malware is cleverly concealed within seemingly innocuous image files through a technique known as steganography, which allows it to bypass traditional security measures. When users follow the fake update’s instructions, they are directed to open the Run box and paste a command, which triggers the download of malicious software. The final payload typically includes an infostealer that gathers passwords, cookies, and other sensitive data from the user’s machine.

Recent ClickFix activities have reportedly deployed infostealers such as LummaC2 and updated versions of Rhadamanthys. These tools are designed to operate quietly, collecting user information with minimal detection. Once the malicious code is executed, it integrates into trusted Windows processes like explorer.exe, making it even harder for security systems to identify.

How the ClickFix Attack Operates

The infection process begins when the user unwittingly pastes the command into their system. This action initiates a series of events where a file named mshta.exe connects to a remote server to download a script designed to evade security measures. The script then executes obfuscated PowerShell code, which is filled with misleading instructions to confuse researchers.

The significant challenge in detecting this attack lies in the use of custom steganography. The malware is embedded within the pixel data of a seemingly normal PNG file, altering color values in specific pixels to hide its presence. As a result, security tools that rely on file scanning are often unable to identify the threat since the malicious code never exists as a standalone file. This stealthy approach allows the malware to extract pixel values, decrypt them, and reconstruct itself directly in memory, outside the reach of conventional detection methods.

Protecting Against ClickFix and Similar Threats

To safeguard against these sophisticated attacks, cybersecurity experts recommend several precautionary measures:

1. **Do Not Run Unsolicited Commands**: Users should be wary of any website instructing them to paste commands into their operating system. Legitimate updates will never require such actions.

2. **Utilize Official Update Channels**: Windows updates should only be accessed through the Windows Settings app or official notifications. Users should dismiss any pop-up or browser tab claiming to be a system update.

3. **Install Reputable Antivirus Software**: A robust security suite can help detect both file-based and in-memory threats. Tools that offer behavioral detection and monitoring capabilities are particularly useful.

4. **Employ a Password Manager**: Password managers can generate strong, unique passwords for various accounts and help identify fake login pages by only autofilling credentials on legitimate sites.

5. **Consider Data Removal Services**: Reducing one’s digital footprint can limit exposure to cybercriminals. Data removal services work to eliminate personal information from online databases.

6. **Verify URLs Before Trusting Sites**: Users should always check the domain name of a website, ensuring it matches the official site and contains no unusual spellings or characters.

7. **Exit Suspicious Full-Screen Pages**: Fake update pages often run in full-screen mode to obscure the browser interface. Users should close these pages immediately if they appear unexpectedly.

As cybercriminals continue to refine their tactics, the ClickFix campaign serves as a stark reminder of the importance of vigilance and caution in digital interactions. By being aware of these threats and following best practices, users can significantly reduce their risk of falling victim to such attacks.

For more insights and updates on cybersecurity, visit Kurt “CyberGuy” Knutsson’s website, where readers can find tips to enhance their digital safety.