ANAVEM
Languagefr
Dark computer terminal window with green text displayed on monitor screen

ClickFix Campaign Exploits Windows Terminal for Lumma Stealer

Microsoft reveals new ClickFix social engineering attack using Windows Terminal to deploy Lumma Stealer malware in February 2026.

Emanuel DE ALMEIDAEmanuel DE ALMEIDA
6 March 2026, 07:44 2 min read 7

Last updated 17 March 2026, 05:32

SEVERITYMedium
EXPLOITActive Exploit
PATCH STATUSUnavailable
VENDORMicrosoft
AFFECTEDWindows Terminal, Windows 10, ...
CATEGORYCyber Attacks

Key Takeaways

Microsoft Exposes ClickFix Terminal Attack Chain

Microsoft disclosed on March 6 a sophisticated social engineering campaign that weaponizes the Windows Terminal application to distribute Lumma Stealer malware. The attack, designated as ClickFix, was actively observed throughout February 2026.

Unlike previous campaigns that relied on the Windows Run dialog, this variant specifically targets the terminal emulator program. Attackers trick users into executing malicious commands directly through the Windows Terminal interface.

Windows Terminal Users at Risk

The campaign affects Windows systems running the Windows Terminal application. All versions of Windows 10 and Windows 11 with the terminal emulator installed are potentially vulnerable to this social engineering technique.

Organizations and individual users who regularly use command-line interfaces face elevated risk. The attack doesn't exploit a software vulnerability but relies on user interaction to succeed.

Related: PhantomRaven Campaign Hits npm with 88 Malicious Packages

Related: Teams Phishing Campaign Deploys A0Backdoor Malware

Related: Security Executive Hit by Multi-Vector Phishing Campaign

Related: PayPal Amazon Phishing Campaign Targets Customer Support

Related: ClickFix Malware Campaign Targets AI Coding Assistants

ClickFix Attack Mechanics and Response

The ClickFix campaign instructs victims to open Windows Terminal and paste malicious commands that download and execute Lumma Stealer. This information-stealing malware targets credentials, cryptocurrency wallets, and browser data.

Microsoft recommends user education and endpoint protection to counter these attacks. Organizations should implement application control policies and monitor terminal usage for suspicious command execution patterns. The Microsoft Security Response Center continues tracking this threat activity.

Frequently Asked Questions

How does the ClickFix Windows Terminal attack work?+
The ClickFix campaign tricks users into opening Windows Terminal and pasting malicious commands that download Lumma Stealer malware. Attackers use social engineering instead of exploiting software vulnerabilities.
What is Lumma Stealer malware?+
Lumma Stealer is information-stealing malware that targets user credentials, cryptocurrency wallets, and browser data. It's deployed through the ClickFix social engineering campaign using Windows Terminal.
How can I protect against ClickFix terminal attacks?+
Protect against ClickFix by implementing user education programs, endpoint protection software, and application control policies. Monitor terminal usage for suspicious command execution patterns.
Emanuel DE ALMEIDA
About the Author

Emanuel DE ALMEIDA

Senior IT Journalist & Cloud Architect

Microsoft MCSA-certified Cloud Architect | Fortinet-focused. I modernize cloud, hybrid & on-prem infrastructure for reliability, security, performance and cost control - sharing field-tested ops & troubleshooting.

Discussion

Share your thoughts and insights

You must be logged in to comment.

Loading comments...