Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

469+ Articles
115+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. DeepLoad Malware Uses ClickFix and WMI Persistence to Steal Browser Credentials
DeepLoad Malware Uses ClickFix and WMI Persistence to Steal Browser Credentials
NEWS

DeepLoad Malware Uses ClickFix and WMI Persistence to Steal Browser Credentials

Researchers have identified DeepLoad, a previously undocumented malware loader that combines ClickFix social engineering with WMI-based persistence to deliver a browser credential stealer capable of immediately exfiltrating saved passwords from Chrome, Edge, and Firefox.

Dylan H.

News Desk

March 30, 2026
6 min read

A new campaign has leveraged the ClickFix social engineering tactic to distribute a previously undocumented malware loader called DeepLoad, according to a new report from The Hacker News. The loader employs AI-assisted obfuscation and process injection to evade static security scanning, establishes persistent access via Windows Management Instrumentation (WMI) event subscriptions, and immediately begins stealing saved credentials from major browsers — including Chrome, Edge, and Firefox — upon execution.

What Is DeepLoad

DeepLoad is a multi-stage malware loader whose primary end payload is a browser credential stealer. The loader's design prioritizes two outcomes: survival (persisting across reboots and security tool responses) and speed (credential theft begins immediately upon execution without waiting for secondary stage delivery).

Key characteristics of DeepLoad based on researcher findings:

  • ClickFix delivery: Uses a fake browser verification / CAPTCHA prompt to trick victims into running a malicious PowerShell command
  • AI-assisted obfuscation: The loader's code appears to use AI-generated obfuscation techniques that vary the signature on each build, complicating static detection
  • Process injection: Injects malicious code into legitimate host processes to avoid behavioral detection by security tools monitoring process reputation
  • WMI persistence: Uses Windows Management Instrumentation event subscriptions for persistence — a fileless, registry-light technique that survives reboots
  • Immediate credential theft: Does not wait for a secondary C2 callback — begins extracting browser-stored credentials as soon as the injected code executes

The ClickFix Delivery Chain

ClickFix is a social engineering technique that has become widely adopted by malware distribution campaigns since 2024. The attack flow for DeepLoad follows the established ClickFix pattern:

1. Victim visits a compromised website, phishing page, or malicious ad
   — often themed as a document viewer, software update, or CAPTCHA
 
2. The page displays a fake "verification" or "fix" prompt instructing
   the user to:
     a. Press Win+R to open the Run dialog
     b. Paste a command (pre-loaded to clipboard by the page)
     c. Press Enter to "verify" or "fix the issue"
 
3. The pasted command is a PowerShell one-liner that:
     - Downloads the DeepLoad loader from an attacker-controlled server
     - Executes it in memory or writes it to a temp path
 
4. DeepLoad executes, performs process injection, establishes
   WMI persistence, and immediately begins credential theft

The ClickFix technique is particularly effective because it bypasses browser-level download warnings (no file download occurs in many variants), exploits the user's own elevated context (the command runs as the logged-in user), and requires no exploit — just social engineering.

WMI Persistence: A Fileless Foothold

DeepLoad's use of WMI event subscriptions for persistence is a significant technical detail. WMI-based persistence is a well-known but still effective technique because:

  1. It survives reboots — WMI subscriptions are stored in the WMI repository, not the registry startup keys most defenders monitor
  2. It's semi-fileless — the payload can be stored directly in the WMI repository as a MOF object, leaving minimal file system footprint
  3. It's difficult to remove without tools — standard registry-based persistence cleaners miss WMI subscriptions
  4. It's often overlooked in incident response — many IR processes focus on registry Run keys and startup folders before checking WMI

DeepLoad's WMI persistence is structured as an event subscription that triggers re-execution of the credential stealer payload whenever a specific system event occurs (such as user logon, system startup, or a time-based trigger).

Detecting WMI Persistence

# List all WMI event subscriptions (run in elevated PowerShell)
Get-WMIObject -Namespace root\subscription -Class __EventFilter | Select-Object Name, Query
Get-WMIObject -Namespace root\subscription -Class __EventConsumer | Select-Object Name, CommandLineTemplate
Get-WMIObject -Namespace root\subscription -Class __FilterToConsumerBinding
 
# Remove suspicious subscriptions (replace <NAME> with identified subscription name)
Get-WMIObject -Namespace root\subscription -Class __FilterToConsumerBinding | Where-Object {$_.Filter -match "<NAME>"} | Remove-WmiObject
Get-WMIObject -Namespace root\subscription -Class __EventFilter -Filter "Name='<NAME>'" | Remove-WmiObject
Get-WMIObject -Namespace root\subscription -Class CommandLineEventConsumer -Filter "Name='<NAME>'" | Remove-WmiObject

Browser Credential Theft

DeepLoad's final payload targets the credential stores of major web browsers. Modern browsers encrypt stored passwords using OS-level key derivation tied to the user's session — but this protection is ineffective against malware executing as the logged-in user:

BrowserCredential Store Location
Chrome%LOCALAPPDATA%\Google\Chrome\User Data\Default\Login Data
Edge%LOCALAPPDATA%\Microsoft\Edge\User Data\Default\Login Data
Firefox%APPDATA%\Mozilla\Firefox\Profiles\*.default\logins.json + key4.db

DeepLoad accesses these stores while injected into a legitimate process running in the user's context, bypassing OS-level decryption restrictions. Stolen credentials are exfiltrated to the attacker's C2 server, where they can be used for account takeover, further network access, or sold on criminal marketplaces.

AI-Assisted Obfuscation

The report notes that DeepLoad "likely uses AI-assisted obfuscation" — a technique where machine learning tools are used to generate functionally equivalent but syntactically unique variants of malicious code. This complicates signature-based detection since each build may have a different hash and different string patterns, defeating many static antivirus signatures.

This is part of a broader trend of threat actors incorporating AI tools into their development and operational security workflows to increase the rate of new variant generation and evade static defenses.

Detection and Response

Indicators to Hunt

  • PowerShell processes spawned from Explorer or Run dialog with encoded commands or web downloads
  • Processes writing to or reading from browser Login Data SQLite databases that are not the browser itself
  • WMI event subscriptions added or modified at unusual hours or by non-administrative users
  • Outbound connections from injected processes (particularly to newly registered domains or unusual CDN endpoints)

SIEM / EDR Queries

-- Splunk: Detect PowerShell downloading and executing in single command
index=windows EventCode=4688 ParentProcessName="*explorer*"
  NewProcessName="*powershell*"
  CommandLine IN ("*IEX*", "*DownloadString*", "*WebClient*")
 
-- Detect access to Chrome Login Data by non-Chrome processes
index=windows EventCode=4663 ObjectName="*Login Data*"
  NOT ProcessName IN ("*chrome.exe*", "*msedge.exe*")

Remediation Steps

  1. Identify and remove WMI persistence — use the PowerShell queries above to enumerate and clean WMI event subscriptions
  2. Revoke all browser-stored credentials — assume all saved passwords in Chrome, Edge, and Firefox are compromised; initiate password resets for all accounts
  3. Check for additional persistence — look for registry Run keys, scheduled tasks, and startup folder entries added around the same time as the initial infection
  4. Enable browser on-device encryption — where available, enable device-bound passkey or Windows Hello-backed credential encryption to make future browser credential theft harder
  5. Deploy application control — block PowerShell from executing unsigned or internet-downloaded scripts via AppLocker or WDAC policies

Broader ClickFix Campaign Context

ClickFix has become one of the dominant initial access techniques of 2025-2026. Its effectiveness stems from exploiting user trust and bypassing technical controls simultaneously. Security awareness training that specifically covers:

  • What ClickFix prompts look like
  • The rule: "legitimate websites never ask you to run commands in Run or PowerShell"
  • How to recognize and report suspicious browser verification prompts

...is now a necessary component of any modern security awareness program.


Source: The Hacker News — March 30, 2026

#DeepLoad#Malware#ClickFix#WMI Persistence#Infostealer#Browser Credentials#The Hacker News

Related Articles

Cloudflare-Themed ClickFix Attack Drops Infiniti Stealer on Macs

A newly observed ClickFix campaign impersonates Cloudflare's CAPTCHA verification pages to deliver the Python-based Infiniti Stealer to macOS users via a...

4 min read

Claude AI Artifacts Abused to Distribute macOS Infostealer

Threat actors are abusing publicly shared Claude AI artifacts and Google Ads to deliver the MacSync infostealer to macOS users through ClickFix social...

3 min read

Backdoored Telnyx PyPI Package Pushes Malware Hidden in WAV Audio

Threat actors known as TeamPCP compromised the Telnyx Python package on PyPI, uploading malicious versions that conceal credential-stealing malware inside...

4 min read
Back to all News