Plus: How attackers gain access without triggering alerts ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­    ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­  
Zero Trust Weekly

This week in Zero Trust

The easiest way attackers get in and how to stop it

Plus: Why Adam Savage won't trust USB keys

Estimated reading time: 4-5 minutes

 

In this issue:

  • This tool can prevent a minor compromise from becoming a major breach
  • Why FedRAMP matters to all organizations
  • Why credential theft keeps winning 
  • Webinar: Fight back against AI cyberattacks
  • Threats you need to know: Malware delivered through WhatsApp and ClickFix further evades detection
View in browser

Manage preferences

From the CEO

What influences our product strategy

 

"We’re in a fortunate—or unfortunate—position in that we get to hear the stories of lots of customers who have come to us after they got hit. We get to see details of those attacks, and in many cases, we get to understand them. We’re taking all of that data, and we build around it." - Danny Jenkins

 

 

Danny Jenkins joins Adam Savage's Tested

Why Adam Savage won't trust USB keys

 

This week, Danny joined Adam Savage's Tested to discuss the dangers of USB keys. You never know what could be on those drives, and you could initiate a malicious program just by plugging it in. 

 

Get the full breakdown from Danny and Adam:

Watch the video

From the ThreatLocker blog

Rethinking access, compliance, and identity 

 

How attackers quietly gain admin rights 

And how endpoint privilege management shuts them down

  • What's happening: Many organizations still rely on broad admin privileges to keep operations moving, but that convenience comes at a cost. Endpoint privilege management (EPM) controls and monitors user privileges to reduce security risk while ensuring users always have access to what they need. Instead of blanket admin access, EPM offers granular, just-in-time privileges and clear logging for analysis and record keeping.
  • Why it matters: Overprivileged accounts are one of the easiest ways for attackers to escalate access and move laterally. A minor compromise can quickly become a major breach. EPM also helps satisfy many industry regulatory requirements without expanding your attack surface. 
  • The big picture: Least privilege is no longer optional. A strong EPM solution should include automation capabilities to lighten the load on IT teams, scalability, and clear visibility into access and policy decisions.
    ➡️Read more about how to choose the right EPM solution.

FedRAMP satisfies compliance and Zero Trust

Why FedRAMP matters beyond compliance

  • What you need to know: Security expectations are increasing for all organizations, particularly federal agencies, their contractors, MSPs, and technology providers. FedRAMP status indicates long-term viability for organizations operating in regulated environments. Organizations on the FedRAMP Marketplace have passed one of the most demanding audit and validation programs in the world, meaning the platform is built to meet sustained, enforceable security expectations. 
  • Why it matters: Organizations aren't just being asked if they're compliant. They're being asked if they can enforce security continuously, produce audit-ready evidence at any time, and if they can scale into regulated environments. FedRAMP helps answer those questions early. 
  • The big picture: FedRAMP is about more than compliance. FedRAMP security is stronger by design, helps you align quickly with common security frameworks like CMMC and NIST, and prevents future rework when it comes to audits and regulatory exposure.
    ➡️Learn more about FedRAMP.

Attackers keep logging in

What makes credential theft so dangerous

  • What's happening: Cybercriminals are doubling down on credential theft because it works. According to Verizon's 2025 DBIR, 22% of breaches assessed used compromised credentials as the initial access vector. Attackers are using phishing, social engineering, infostealers, and purchased credentials to gain access without triggering alarms.
  • Why it matters: When attackers log in with valid credentials, lateral movement, data exfiltration, and privilege escalation are all easier. AI is making phishing and social engineering more believable, meaning organizations must assume credentials will be compromised and plan to stop attackers if they get inside. 
  • The big picture: Even simple security controls go a long way in protecting your organization. Organizations should continuously review access logs to better identify unusual activity like logins from unusual locations, spikes in failed login attempts, and unexpected after-hours access.
    ➡️Get more tips for protecting your organization from credential theft.
Fight back against AI cyberattacks

Join us to learn how AI-boosted attacks work, what they're targeting, and how you can fight back to protect your organization.

 

Fight back against AI cyberattacks

 

Tuesday, April 7 | 11 a.m. EDT | CPE eligible

Register now

Threats you need to know

WhatsApp weaponized and a new ClickFix variant

 

Using WhatsApp to deliver malware 

Attackers are following their targets across platforms

  • What's happening: Microsoft is warning of new campaigns using WhatsApp to deliver malware directly to targets. Beginning in February, attackers are using the app to distribute Visual Basic Script files to initiate a multi-stage infection chain to enable remote access. After gaining access, attackers escalate privileges and ultimately install malicious MSI packages. 

  • Why it matters: WhatsApp is widely used and trusted, making it a prime vector for attackers. The activity blends into normal system activity and uses legitimate tools and platforms to lower skepticism. 
  • The big picture: In a Zero Trust architecture, you never let your guard down. Phishing attacks are increasing and becoming more believable, but don't let that distract you from other potential access vectors. Attackers will follow users across platforms. Defense should as well. 

ClickFix evolves to bypass PowerShell detection

Blending malicious commands into legitimate behavior

  • What's happening: CyberProof researchers identified a new variant of ClickFix attacks that tricks victims into infecting their own devices. By combining Windows Run dialog, rundll32.exe, and WebDAV, attackers are able to bypass defenses that are monitoring for script-based activity. It begins with luring users to a compromised site where the user is then prompted to open Windows Run and paste a copied command. Eventually, the infection chain transitions to PowerShell using non-interactive flags to download and run additional payloads without raising alarm. 

  • Why it matters: Many defenses are designed to catch suspicious command execution. This campaign deliberately avoids using recognizable function names to avoid such detection. To further hide from sandbox environments and analysts, it finds Windows APIs on the fly using the DJB2 hashing method. 

  • The big picture: Detecting unusual behavior is key to preventing new variants such as this one. Restricting unnecessary WebDAV traffic and monitoring for unusual executions can stop an attack like this early. 
Cyber Hero Frontline, a magazine by ThreatLocker

The next issue of Cyber Hero Frontline features insights into:

  • Simplifying your security stack

  • Securing AI
  • Cloud & attack surface sprawl
  • Supply chain & third-party risk explosion

Subscribe below to ensure you get a copy:

Get Cyber Hero Frontline, Issue 4
ThreatLocker: Zero Trust Platform | Zero Trust Weekly

ThreatLocker, 1901 Summit Tower Blvd, Orlando, Florida 32810, United States

Manage preferences

Connect with us

                             

©2026 ThreatLocker Inc., All Rights Reserved