DeepLoad malware campaign leverages AI-generated obfuscation and ClickFix for persistent credential theft
Updated: 30.03.2026 18:47
· First: 30.03.2026 15:00
· 📰 2 src / 2 articles
A malicious campaign named DeepLoad is actively targeting enterprise networks to steal user credentials and maintain persistent access. The malware employs social engineering via ClickFix to trick users into executing PowerShell commands through the Windows Run dialog under false pretenses, often delivered through compromised websites or SEO-poisoned search results. DeepLoad hides its functional payload within layers of AI-generated obfuscation code within meaningless variable assignments, evading file-based detection. It leverages Windows lock screen processes via 'LockAppHost.exe' and abuses Windows Management Instrumentation (WMI) to achieve persistence, automatically re-infecting systems three days after initial removal without additional user or attacker action. The campaign also spreads via USB drives, increasing lateral movement potential, and deploys a malicious browser extension to intercept credentials during login sessions. Impact includes unauthorized access to enterprise accounts, potential data exfiltration, and sustained foothold in compromised networks.