SUBSCRIBE
Tech Journal Now
  • Home
  • News
  • AI
  • Reviews
  • Guides
  • Best Buy
  • Software
  • Games
  • More Articles
Reading: ClickFix attackers using new tactic to evade detection, says Microsoft – Computerworld
Share
Tech Journal NowTech Journal Now
Font ResizerAa
  • News
  • Reviews
  • Guides
  • AI
  • Best Buy
  • Games
  • Software
Search
  • Home
  • News
  • AI
  • Reviews
  • Guides
  • Best Buy
  • Software
  • Games
  • More Articles
Have an existing account? Sign In
Follow US
© Foxiz News Network. Ruby Design Company. All Rights Reserved.
Tech Journal Now > AI > ClickFix attackers using new tactic to evade detection, says Microsoft – Computerworld
AI

ClickFix attackers using new tactic to evade detection, says Microsoft – Computerworld

News Room
Last updated: March 6, 2026 9:25 pm
News Room
Share
2 Min Read
SHARE

“And all Windows computers should already be restricted so that random, unsigned (not signed by the organization), PowerShell commands should not be allowed. Every organization and machine should already have the following PowerShell command setting: ‘Set-ExecutionPolicy Restricted -Force‘ enabled. If not, your organization’s cybersecurity risk is far higher than it needs to be.” 

Payload chain ‘built to last’

Joshua Roback, principal security solution architect at Swimlane, noted the campaign outlined by Microsoft pushes the ClickFix playbook into more trusted, everyday workflows by getting users to run pasted command content inside legitimate Windows tooling that feels routine and safe. That matters, he said, because it slips past the usual mental red flags people associate with sketchy popups, and it can also dodge some of the controls and detections that security teams have tuned to the more obvious ClickFix patterns.

The payload chain is also more built to last than previous variants, he added. Instead of a quick one-and-done retrieval trick, it uses a more layered delivery and persistence approach that helps it blend in, stick around longer, and quietly escalate the damage once it lands. One path adds an additional indirection layer that helps the attacker’s infrastructure blend in and stay reachable, which can make takedowns and straightforward blocking a lot less effective.

Read the full article here

You Might Also Like

The UK may require AI-generated content to be labeled – Computerworld

FBI wiretap system tapped by hackers

Why the axios supply chain attack should have Apple worried – Computerworld

UK lawmakers back licensing‑first approach, adding pressure to global AI copyright standards – Computerworld

Anthropic wins reprieve against US DoD ban, buying time for contractors to assess AI supply chains – Computerworld

Share This Article
Facebook Twitter Email Print
Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Trending Stories

Games

Great work, gamers, we touched digital grass and walked 270,000 more miles than Artemis 2’s historic mission around the moon last week

April 21, 2026
Games

Ubisoft announces that ‘gaming’s worst-kept secret’ will finally be revealed later this week

April 21, 2026
Games

Buck Bumble, the Nintendo 64 shooter starring a cyborg bumblebee, is almost certainly getting a remake

April 21, 2026
Games

Crusader Kings 3’s next major expansions will bring playable Popes and merchant republics

April 21, 2026
Games

After 15 years and 323 hours, I’ve finally beaten Fallout: New Vegas, and this game doesn’t need mods as much as you think it does

April 21, 2026
Games

Windrose factions: Recommendations for improving your reputation with the Smugglers, Buccaneers, Brethren, and People of Tortuga

April 21, 2026

Always Stay Up to Date

Subscribe to our newsletter to get our newest articles instantly!

Follow US on Social Media

Facebook Youtube Steam Twitch Unity

2024 © Prices.com LLC. All Rights Reserved.

Tech Journal Now

Quick Links

  • Privacy Policy
  • Terms of use
  • For Advertisers
  • Contact
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?