Categories: Cyber Security News

Threat Actors Advertising New ‘ClickFix’ Payload That Stores Malware within Browser Cache

Cybersecurity researchers have uncovered a new iteration of the ‘ClickFix’ social engineering campaign, which now employs a sophisticated technique to evade detection by storing malware directly within a victim’s browser cache.

This evolution represents a significant and dangerous shift in how threat actors bypass traditional endpoint security measures.

By leveraging legitimate browser functionality, attackers can deliver malicious payloads without triggering standard download alerts or network-based blocks that typically flag suspicious file transfers.

The attack utilizes the widespread ‘ClickFix’ lure, presenting users with fake error messages displayed on compromised websites.

These prompts masquerade as technical issues with Google Chrome or Microsoft Word, urging unsuspecting victims to copy and paste a ‘fix’ into a PowerShell terminal or Windows Run dialog.

Unlike previous versions that downloaded payloads upon execution, this new variant stealthily pre-loads the malicious code during the initial page visit to ensure persistence.

Dark Web Informer analysts identified this novel malware strain being advertised on underground forums on February 17, 2026.

The threat actor orchestrating this campaign claims the method specifically targets the browser’s cache storage to hide the payload before execution.

By disguising the malware as a standard cached file, such as a PNG or JPG, the attack avoids creating suspicious web requests at the moment of infection, effectively blinding many Endpoint Detection and Response (EDR) systems that monitor real-time download activities.

The advertisement highlights the toolkit’s alarming accessibility, offering the builder, source code, and setup instructions for a price of $300.

https://twitter.com/DarkWebInformer/status/2023469095635632330?ref_src=twsrc%5Etfw

An additional service for custom template rewrites is available for $200, allowing attackers to tailor lures to specific targets.

This low barrier to entry raises concerns that the technique could see rapid adoption among threat actors looking to deploy ransomware or infostealers.

Cache-Based Persistence and Execution

The core innovation lies in using the browser cache as a staging ground.

When a victim visits the malicious landing page, the payload is silently fetched as a seemingly benign resource—such as an image—and stored locally in the browser’s cache.

The PowerShell command pasted by the victim locates this cached file and executes it.

Since the file is already present on the disk, the execution phase requires no fresh network connection, bypassing firewalls and heuristics that flag shell-initiated downloads.

Security experts recommend monitoring PowerShell processes accessing cache directories to detect this activity and blocking known ClickFix domains.

Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

The post Threat Actors Advertising New ‘ClickFix’ Payload That Stores Malware within Browser Cache appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Niantic Says Pokémon Go Data Now Being Used to Train Delivery Robots, as ‘Getting Pikachu to Realistically Run Around’ Is ‘Actually the Same Problem’

Pokémon Go creator Niantic is using players' augmented reality data to help train delivery robots.…

1 minute ago

Niantic Says Pokémon Go Data Now Being Used to Train Delivery Robots, as ‘Getting Pikachu to Realistically Run Around’ Is ‘Actually the Same Problem’

Pokémon Go creator Niantic is using players' augmented reality data to help train delivery robots.…

2 minutes ago

Former Overwatch Boss Jeff Kaplan Has Some Advice For Gamers Who Complain About Games They’ll Never Play: ‘Shut the F*** Up. No One Cares’

Jeff Kaplan, the former boss of the Overwatch team, has some short and candid advice…

2 minutes ago

A Look Back, March 16

50 Years Ago Tape decks and other electronic equipment valued at more than $2,000 were…

12 minutes ago

Lawmakers urge GIC to reconsider ending coverage of weight-loss drugs

Forty state legislators have sent a letter to the Group Insurance Commission board warning about…

12 minutes ago

Voters to weigh in on $36.5M SHELD facility

SOUTH HADLEY — Voters will decide whether to support construction of a $36.5 million South…

12 minutes ago

This website uses cookies.