Cybercriminals are impersonating Windows updates to hide info-stealing malware—and millions could fall for it. What looks like a routine system patch turns out to be part of a sophisticated global hacking campaign known as ClickFix. And here's the twist—these fake update screens look so real, even trained IT pros might second-guess themselves.
Between September 29 and October 30, 2025, organizations across the United States, Europe, the Middle East, Africa, and the Asia-Pacific region (including Japan) were hit by this scheme. Researchers at The Register uncovered that the campaign uses fake full-screen images of the familiar blue Windows update interface. Victims encounter these images after visiting compromised or malicious websites. Once there, they’re prompted to install a so-called “critical security update.” But instead of protecting their systems, these steps silently launch PowerShell scripts and deploy steganographic loaders—tools that hide malicious code within image files.
The end result? The installation of Rhadamanthys, a well-known information-stealing malware designed to exfiltrate sensitive data from infected machines. According to a detailed report from Huntress, this isn’t an isolated case—it’s part of a larger trend of attackers blending social engineering with stealthy technical payloads.
Even more alarming, some of the malicious domains hosting these deceptive Windows Update pages remain active today. This is despite recent law enforcement actions that disrupted Rhadamanthys operations earlier this month. Huntress investigators emphasize that these fake update screens still direct users to a consistent pattern of hex-encoded URL structures that have been tied to Rhadamanthys in the past, even though the exact malware payload appears to have been removed for now.
Security experts warn this campaign highlights how attackers are evolving beyond simple phishing emails. By mimicking something as trusted and universal as a Windows system update, they turn a moment of routine compliance into a door for intrusion. But here’s where it gets controversial: should users really be expected to tell the difference between a genuine update and a well-crafted fake? Or should operating systems themselves be designed to make such trickery impossible?
What do you think—does this responsibility fall more on end users, or should Microsoft take stronger measures to safeguard its update process? Share your take in the comments—this divide between user caution and system design could shape the next era of cybersecurity.