Compromised WordPress sites used in global ClickFix infostealer campaign

March 21, 20262 min read2 sources
Share:
Compromised WordPress sites used in global ClickFix infostealer campaign

Attackers have compromised more than 250 legitimate websites, many running WordPress, and are using them to deliver ClickFix-style malware lures that can infect visitors with infostealers, according to research highlighted by Rapid7.

The campaign abused trusted sites rather than obvious malicious domains. Infosecurity Magazine reported that the affected pages included news outlets and a U.S. Senate candidate’s official website. Visitors were shown fake verification or troubleshooting prompts designed to trick them into copying and executing malicious commands themselves, a hallmark of ClickFix attacks.

That user-assisted step matters because it can sidestep some automated defenses. Instead of relying on a browser exploit or a booby-trapped attachment, the attackers push the victim to launch the infection chain manually. Rapid7 said the end goal was infostealer malware, which typically targets browser-stored passwords, session cookies, autofill data and cryptocurrency wallet information.

The report does not publicly tie the campaign to a specific CVE or named malware family. That leaves open several possible entry points for the website compromises, including vulnerable plugins or themes, stolen administrator credentials, or weaknesses in hosting environments. What is clear is the scale: hundreds of real websites were turned into malware delivery infrastructure.

The wider risk extends beyond the initial infection. Stolen credentials and session tokens are commonly reused for account takeover, fraud and follow-on intrusions. For site owners, the campaign is another reminder that a compromised CMS can become a distribution point for attacks against readers, customers and supporters. For users, a familiar domain is no guarantee of safety, and prompts asking them to paste commands into PowerShell, Terminal or a browser dialog should be treated as suspicious.

Defenders should watch for unusual JavaScript injections on web servers, suspicious command-line execution on endpoints, and signs of browser credential theft. Organizations that rely on WordPress should prioritize patching, plugin reviews and stronger admin protections. Users who suspect exposure should reset passwords, revoke active sessions and consider using a trusted VPN on untrusted networks, though it will not stop this type of social engineering on its own.

Share:

// SOURCES

// RELATED

Google patches Chrome’s fifth zero-day of the year

Google fixed Chrome zero-day CVE-2023-4863, a libwebp flaw under active attack that could allow arbitrary code execution.

2 min readMar 21

Ransomware affiliate leak exposes The Gentlemen’s playbook

A leak from affiliate Hastalamuerte reportedly reveals The Gentlemen’s use of FortiGate exploits, BYOVD evasion and Qilin-style tactics.

2 min readMar 21

AI and deepfakes are making cyber-attacks easier to launch, Cloudflare warns

Cloudflare says AI and deepfakes are helping attackers scale phishing, impersonation and fraud with less skill and greater realism.

2 min readMar 21

Critical Langflow flaw was exploited within hours of disclosure

A critical Langflow vulnerability enabling unauthenticated RCE was reportedly exploited within hours of public disclosure.

2 min readMar 21