SUBSCRIBE
Tech Journal Now
  • Home
  • News
  • AI
  • Reviews
  • Guides
  • Best Buy
  • Software
  • Games
Reading: ClickFix attackers using new tactic to evade detection, says Microsoft – Computerworld
Share
Tech Journal NowTech Journal Now
Font ResizerAa
  • News
  • Reviews
  • Guides
  • AI
  • Best Buy
  • Games
  • Software
Search
  • Home
  • News
  • AI
  • Reviews
  • Guides
  • Best Buy
  • Software
  • Games
Have an existing account? Sign In
Follow US
© Foxiz News Network. Ruby Design Company. All Rights Reserved.
Tech Journal Now > AI > ClickFix attackers using new tactic to evade detection, says Microsoft – Computerworld
AI

ClickFix attackers using new tactic to evade detection, says Microsoft – Computerworld

News Room
Last updated: March 6, 2026 9:25 pm
News Room
Share
2 Min Read
SHARE

“And all Windows computers should already be restricted so that random, unsigned (not signed by the organization), PowerShell commands should not be allowed. Every organization and machine should already have the following PowerShell command setting: ‘Set-ExecutionPolicy Restricted -Force‘ enabled. If not, your organization’s cybersecurity risk is far higher than it needs to be.” 

Payload chain ‘built to last’

Joshua Roback, principal security solution architect at Swimlane, noted the campaign outlined by Microsoft pushes the ClickFix playbook into more trusted, everyday workflows by getting users to run pasted command content inside legitimate Windows tooling that feels routine and safe. That matters, he said, because it slips past the usual mental red flags people associate with sketchy popups, and it can also dodge some of the controls and detections that security teams have tuned to the more obvious ClickFix patterns.

The payload chain is also more built to last than previous variants, he added. Instead of a quick one-and-done retrieval trick, it uses a more layered delivery and persistence approach that helps it blend in, stick around longer, and quietly escalate the damage once it lands. One path adds an additional indirection layer that helps the attacker’s infrastructure blend in and stay reachable, which can make takedowns and straightforward blocking a lot less effective.

Read the full article here

You Might Also Like

Microsoft touts M365 Copilot momentum, claims 15M paid users – Computerworld

Amazon layoffs expected to disproportionately hit AWS and tech talent – Computerworld

You’ll soon be able to block all AI features in Firefox – Computerworld

An instant Android search upgrade – Computerworld

Chinese AI firm trains state-of-the-art model entirely on Huawei chips – Computerworld

Share This Article
Facebook Twitter Email Print
Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Trending Stories

News

Rad Power Bikes’ new owner wants to rehire employees, open stores and return e-bike brand to glory days

March 7, 2026
Games

Marathon day two check-in: Into the Outpost, an overpowered shotgun, and why I love doors

March 7, 2026
Games

All about Sandy: Stardew Valley gift guide, schedule, and events

March 6, 2026
Games

The horse gamers have spoken: This new horse sim has ‘a beautiful sense of realism I haven’t felt since RDR2’

March 6, 2026
Games

Slay the Spire 2 dev celebrates its instant success by reminding players to support ‘small indie passion projects’ like Marathon too

March 6, 2026
Games

I got stuck in a 13-day stalemate with an eldritch god in Bloodletter, and now it’s my new favourite deckbuilder

March 6, 2026

Always Stay Up to Date

Subscribe to our newsletter to get our newest articles instantly!

Follow US on Social Media

Facebook Youtube Steam Twitch Unity

2024 © Prices.com LLC. All Rights Reserved.

Tech Journal Now

Quick Links

  • Privacy Policy
  • Terms of use
  • For Advertisers
  • Contact
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?