Skip to article
Security Alert
Emergent Story mode

Now reading

Overview

1 / 12 3 min 5 sources Multi-Source
Sources

Story mode

Security AlertMulti-Source7 sections

Termite ransomware breaches linked to ClickFix CastleRAT attacks

Hackers exploit AI tools, adopt new tactics, and target vulnerabilities, as the US government emphasizes offensive operations and deregulation in its cybersecurity strategy.

Read
3 min
Sources
5 sources
Domains
2
Sections
7

What Happened In a recent surge of cyberattacks, ransomware threat actors tracked as Velvet Tempest have been using the ClickFix technique and legitimate Windows utilities to deploy malware and backdoors. This group,...

Story state
Deep multi-angle story
Evidence
What Happened
Coverage
7 reporting sections
Next focus
What Comes Next

Story step 1

Multi-Source

What Happened

In a recent surge of cyberattacks, ransomware threat actors tracked as Velvet Tempest have been using the ClickFix technique and legitimate Windows...

Step
1 / 7

In a recent surge of cyberattacks, ransomware threat actors tracked as Velvet Tempest have been using the ClickFix technique and legitimate Windows utilities to deploy malware and backdoors. This group, also known as DEV-0504, has been involved in devastating ransomware attacks for at least five years, including the deployment of Ryuk, REvil, Conti, BlackMatter, and LockBit strains.

Meanwhile, Microsoft has reported that hackers are increasingly abusing artificial intelligence (AI) in their operations to accelerate attacks, scale malicious activity, and lower technical barriers across all aspects of a cyberattack. AI is being used for reconnaissance, phishing, infrastructure development, malware creation, and post-compromise activity.

Continue in the field

Focused storyNearby context

Open the live map from this story.

Carry this article into the map as a focused origin point, then widen into nearby reporting.

Leave the article stream and continue in live map mode with this story pinned as your origin point.

  • Open the map already centered on this story.
  • See what nearby reporting is clustering around the same geography.
  • Jump back to the article whenever you want the original thread.
Open live map mode

Story step 2

Multi-Source

Why It Matters

The escalating use of AI in cyberattacks highlights the need for organizations to adopt more sophisticated security measures. The US government's new...

Step
2 / 7

The escalating use of AI in cyberattacks highlights the need for organizations to adopt more sophisticated security measures. The US government's new cybersecurity strategy, which emphasizes offensive operations and deregulation, has sparked debate among experts. While some argue that this approach will help disrupt adversaries, others raise concerns about the potential risks and unintended consequences.

Story step 3

Multi-Source

What Experts Say

By moving the usual 'deterrence' part to the top and focusing on offense, which is usually only lightly referred to in past unclassified strategies,...

Step
3 / 7
"By moving the usual 'deterrence' part to the top and focusing on offense, which is usually only lightly referred to in past unclassified strategies, the administration has greatly emphasized that pillar, which will clearly get it the most attention in the short term." — Ari Schwartz, managing director of cybersecurity services and policy at Venable LLP

Story step 4

Multi-Source

Key Facts

Who: Velvet Tempest (DEV-0504) ransomware group What: Using ClickFix technique and AI-driven attacks Where: Targeted a non-profit organization in the...

Step
4 / 7
  • Who: Velvet Tempest (DEV-0504) ransomware group
  • What: Using ClickFix technique and AI-driven attacks
  • Where: Targeted a non-profit organization in the US

Story step 5

Multi-Source

New Tactics and Techniques

Threat actors are continuously evolving their tactics to evade detection. In a recent campaign, ClickFix attackers used a new tactic to trick...

Step
5 / 7

Threat actors are continuously evolving their tactics to evade detection. In a recent campaign, ClickFix attackers used a new tactic to trick employees into installing malware. Instead of asking victims to copy and paste a malicious command into the Run dialog, they prompted them to use the Windows + X → I shortcut to launch Windows Terminal (wt.exe) directly. This tactic evades defenses looking for unusual run commands and bypasses security awareness training.

Story step 6

Multi-Source

The Role of AI in Cybersecurity

As AI becomes increasingly prevalent in cyberattacks, organizations must adopt AI-native security solutions to stay ahead of the threats. Cylake's...

Step
6 / 7

As AI becomes increasingly prevalent in cyberattacks, organizations must adopt AI-native security solutions to stay ahead of the threats. Cylake's platform, for example, analyzes security data locally and identifies potential attacks without relying on cloud services.

Story step 7

Multi-Source

What Comes Next

As the cybersecurity landscape continues to evolve, organizations must prioritize advanced security measures, including AI-native solutions, to...

Step
7 / 7

As the cybersecurity landscape continues to evolve, organizations must prioritize advanced security measures, including AI-native solutions, to protect against increasingly sophisticated threats. The US government's new cybersecurity strategy will likely have significant implications for the industry, and experts will be watching closely to see how it plays out.

Source bench

Multi-Source

5 cited references across 2 linked domains.

References
5
Domains
2

5 cited references across 2 linked domains.

  1. Source 1 · Fulqrum Sources

    Termite ransomware breaches linked to ClickFix CastleRAT attacks

  2. Source 2 · Fulqrum Sources

    Microsoft: Hackers abusing AI at every stage of cyberattacks

  3. Source 3 · Fulqrum Sources

    Trump’s cyber strategy emphasizes offensive operations, deregulation, AI

  4. Source 4 · Fulqrum Sources

    ClickFix attackers using new tactic to evade detection, says Microsoft

Open source workbench

Keep reporting

ContradictionsEvent arcNarrative drift

Open the deeper evidence boards.

Take the mobile reel into contradictions, event arcs, narrative drift, and the full source workspace.

  • Scan the cited sources and coverage bench first.
  • Open contradiction and narrative drift checks after the first read.
  • Revisit the core evidence in What Happened.
Open evidence boards

Stay in the reporting trail

Open the evidence boards, source bench, and related analysis.

Jump from the app-style read into the deeper workbench without losing your place in the story.

Open source workbenchBack to Security Alert
🔒 Security Alert

Termite ransomware breaches linked to ClickFix CastleRAT attacks

Hackers exploit AI tools, adopt new tactics, and target vulnerabilities, as the US government emphasizes offensive operations and deregulation in its cybersecurity strategy.

Sunday, March 8, 2026 • 3 min read • 5 source references

  • 3 min read
  • 5 source references

What Happened

In a recent surge of cyberattacks, ransomware threat actors tracked as Velvet Tempest have been using the ClickFix technique and legitimate Windows utilities to deploy malware and backdoors. This group, also known as DEV-0504, has been involved in devastating ransomware attacks for at least five years, including the deployment of Ryuk, REvil, Conti, BlackMatter, and LockBit strains.

Meanwhile, Microsoft has reported that hackers are increasingly abusing artificial intelligence (AI) in their operations to accelerate attacks, scale malicious activity, and lower technical barriers across all aspects of a cyberattack. AI is being used for reconnaissance, phishing, infrastructure development, malware creation, and post-compromise activity.

Why It Matters

The escalating use of AI in cyberattacks highlights the need for organizations to adopt more sophisticated security measures. The US government's new cybersecurity strategy, which emphasizes offensive operations and deregulation, has sparked debate among experts. While some argue that this approach will help disrupt adversaries, others raise concerns about the potential risks and unintended consequences.

What Experts Say

"By moving the usual 'deterrence' part to the top and focusing on offense, which is usually only lightly referred to in past unclassified strategies, the administration has greatly emphasized that pillar, which will clearly get it the most attention in the short term." — Ari Schwartz, managing director of cybersecurity services and policy at Venable LLP

Key Facts

  • Who: Velvet Tempest (DEV-0504) ransomware group
  • What: Using ClickFix technique and AI-driven attacks
  • Where: Targeted a non-profit organization in the US

New Tactics and Techniques

Threat actors are continuously evolving their tactics to evade detection. In a recent campaign, ClickFix attackers used a new tactic to trick employees into installing malware. Instead of asking victims to copy and paste a malicious command into the Run dialog, they prompted them to use the Windows + X → I shortcut to launch Windows Terminal (wt.exe) directly. This tactic evades defenses looking for unusual run commands and bypasses security awareness training.

The Role of AI in Cybersecurity

As AI becomes increasingly prevalent in cyberattacks, organizations must adopt AI-native security solutions to stay ahead of the threats. Cylake's platform, for example, analyzes security data locally and identifies potential attacks without relying on cloud services.

What Comes Next

As the cybersecurity landscape continues to evolve, organizations must prioritize advanced security measures, including AI-native solutions, to protect against increasingly sophisticated threats. The US government's new cybersecurity strategy will likely have significant implications for the industry, and experts will be watching closely to see how it plays out.

Story pulse
Story state
Deep multi-angle story
Evidence
What Happened
Coverage
7 reporting sections
Next focus
What Comes Next

What Happened

In a recent surge of cyberattacks, ransomware threat actors tracked as Velvet Tempest have been using the ClickFix technique and legitimate Windows utilities to deploy malware and backdoors. This group, also known as DEV-0504, has been involved in devastating ransomware attacks for at least five years, including the deployment of Ryuk, REvil, Conti, BlackMatter, and LockBit strains.

Meanwhile, Microsoft has reported that hackers are increasingly abusing artificial intelligence (AI) in their operations to accelerate attacks, scale malicious activity, and lower technical barriers across all aspects of a cyberattack. AI is being used for reconnaissance, phishing, infrastructure development, malware creation, and post-compromise activity.

Why It Matters

The escalating use of AI in cyberattacks highlights the need for organizations to adopt more sophisticated security measures. The US government's new cybersecurity strategy, which emphasizes offensive operations and deregulation, has sparked debate among experts. While some argue that this approach will help disrupt adversaries, others raise concerns about the potential risks and unintended consequences.

What Experts Say

"By moving the usual 'deterrence' part to the top and focusing on offense, which is usually only lightly referred to in past unclassified strategies, the administration has greatly emphasized that pillar, which will clearly get it the most attention in the short term." — Ari Schwartz, managing director of cybersecurity services and policy at Venable LLP

Key Facts

  • Who: Velvet Tempest (DEV-0504) ransomware group
  • What: Using ClickFix technique and AI-driven attacks
  • Where: Targeted a non-profit organization in the US

New Tactics and Techniques

Threat actors are continuously evolving their tactics to evade detection. In a recent campaign, ClickFix attackers used a new tactic to trick employees into installing malware. Instead of asking victims to copy and paste a malicious command into the Run dialog, they prompted them to use the Windows + X → I shortcut to launch Windows Terminal (wt.exe) directly. This tactic evades defenses looking for unusual run commands and bypasses security awareness training.

The Role of AI in Cybersecurity

As AI becomes increasingly prevalent in cyberattacks, organizations must adopt AI-native security solutions to stay ahead of the threats. Cylake's platform, for example, analyzes security data locally and identifies potential attacks without relying on cloud services.

What Comes Next

As the cybersecurity landscape continues to evolve, organizations must prioritize advanced security measures, including AI-native solutions, to protect against increasingly sophisticated threats. The US government's new cybersecurity strategy will likely have significant implications for the industry, and experts will be watching closely to see how it plays out.

Coverage tools

Sources, context, and related analysis

Visual reasoning

How this briefing, its evidence bench, and the next verification path fit together

A server-rendered QWIKR board that keeps the article legible while showing the logic of the current read, the attached source bench, and the next high-value reporting move.

Cited sources

0

Reasoning nodes

3

Routed paths

2

Next checks

1

Reasoning map

From briefing to evidence to next verification move

SSR · qwikr-flow

Story geography

Where this reporting sits on the map

Use the map-native view to understand what is happening near this story and what adjacent reporting is clustering around the same geography.

Geo context
0.00° N · 0.00° E Mapped story

This story is geotagged, but the nearby reporting bench is still warming up.

Continue in live map mode

Coverage at a Glance

5 sources

Compare coverage, inspect perspective spread, and open primary references side by side.

Linked Sources

4

Distinct Outlets

2

Viewpoint Center

Not enough mapped outlets

Outlet Diversity

Very Narrow
0 sources with viewpoint mapping 0 higher-credibility sources 1 reference without direct URL
Coverage is still narrow. Treat this as an early map and cross-check additional primary reporting.

Coverage Gaps to Watch

  • Thin mapped perspectives

    Most sources do not have mapped perspective data yet, so viewpoint spread is still uncertain.

  • No high-credibility anchors

    No source in this set reaches the high-credibility threshold. Cross-check with stronger primary reporting.

Read Across More Angles

Source-by-Source View

Search by outlet or domain, then filter by credibility, viewpoint mapping, or the most-cited lane.

Showing 4 of 4 cited sources with links.

1 citation-only reference will appear once direct links are available.

Unmapped Perspective (4)

bleepingcomputer.com

Termite ransomware breaches linked to ClickFix CastleRAT attacks

Open

bleepingcomputer.com

Unmapped bias Credibility unknown Dossier
bleepingcomputer.com

Microsoft: Hackers abusing AI at every stage of cyberattacks

Open

bleepingcomputer.com

Unmapped bias Credibility unknown Dossier
csoonline.com

Trump’s cyber strategy emphasizes offensive operations, deregulation, AI

Open

csoonline.com

Unmapped bias Credibility unknown Dossier
csoonline.com

ClickFix attackers using new tactic to evade detection, says Microsoft

Open

csoonline.com

Unmapped bias Credibility unknown Dossier
Fact-checked Real-time synthesis Bias-reduced

This article was synthesized by Fulqrum AI from 5 trusted sources, combining multiple perspectives into a comprehensive summary. All source references are listed below.