ClickFix Steganographic Malware Masquerades as Windows Update
Category:Threat Alerts / Threat Intelligence
The ClickFix campaign now delivers steganography-based malware through fake Windows Update screens that trick users into running mshta commands copied from their clipboard. On Windows systems, the lure imitates the native update UI in full-screen mode and instructs victims to open the Run dialog and execute a preloaded command, mapping to MITRE ATT&CK T1204 (User Execution), T1059 (Command and Scripting Interpreter), and T1105 (Ingress Tool Transfer). The mshta payload fetches a script that eventually loads shellcode embedded in PNG images, often dropping LummaC2 or Rhadamanthys infostealers into trusted processes like explorer.exe. The infection chain involves multiple stages: mshta.exe first retrieves an obfuscated JScript file from attacker infrastructure, which then runs PowerShell code laced with junk instructions to evade static analysis. PowerShell decrypts and loads a .NET assembly acting as a loader, which parses seemingly benign PNG images to extract hidden shellcode encoded in specific pixel color channels, especially the red channel. This custom steganography keeps malicious content off disk and concealed inside normal-looking images, significantly reducing detection rates by traditional scanners. For organizations, the impact is the silent compromise of endpoints used for banking, SaaS access, and remote work, enabling keylogging, credential theft, and lateral movement from unmanaged or under-monitored devices. Because ClickFix relies on urgent prompts and familiar UI patterns, it can bypass user awareness training that focuses only on phishing emails. Compromise may undermine MFA by stealing session tokens or cookies and can lead to data theft affecting GDPR, HIPAA, or PCI-DSS scope when infected endpoints handle regulated data. The campaign also highlights growing abuse of clipboard actions and browser-based prompts as a vector to coerce users into running commands. Mitigation requires blocking mshta.exe where possible, enforcing application control, and inspecting outbound traffic for suspicious script and image retrieval patterns from unknown domains. Security teams should educate users specifically about fake "security checks" and "update" pages that ask them to copy and paste commands, reinforce policies against running unverified scripts, and deploy EDR capable of detecting in-memory shellcode injections into explorer.exe and similar processes. Browser extensions or endpoint controls that block clipboard write attempts from websites can further reduce the success rate of ClickFix-style attacks.
CORTEX Protocol Intelligence Assessment
Business Impact: ClickFix blends social engineering with steganography to deliver infostealers that can exfiltrate credentials, financial data, and access tokens from corporate endpoints. Successful infections may provide attackers with persistent footholds in hybrid environments, leading to fraud, account takeover, and regulatory exposure where stolen data falls under GDPR or PCI-DSS. Technical Context: The campaign chains mshta, obfuscated JScript, and PowerShell to load .NET-based loaders that extract shellcode hidden in PNG pixel channels, mapped to T1204, T1059, and T1105. Malware is injected into trusted Windows processes, making the activity harder to detect and enabling fileless-style execution.
Strategic Intelligence Guidance
- Disable or tightly restrict mshta.exe via group policy or application control on Windows endpoints and review EDR detections related to mshta and PowerShell spawning .NET assemblies.
- Deploy network controls and DNS filtering to block known ClickFix infrastructure, and monitor for anomalous downloads of scripts and PNG files from untrusted domains.
- Update user awareness programs to explicitly warn about fake Windows Update web pages and any instruction to copy-paste commands from browsers into local run dialogs or terminals.
- Longer term, adopt hardened browser profiles, clipboard protection, and default-deny execution policies on user endpoints to reduce the success of similar steganographic and script-based campaigns.
Vendors
Threats
Targets
Intelligence Source: ClickFix Steganographic Malware Masquerades as Windows Update | Nov 26, 2025