Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Australian Cyber Security Centre Issues Alert Over ClickFix Attacks

May 8, 2026

SAP-Related npm Packages Compromised in Credential-Stealing Supply Chain Attack

May 8, 2026

How Crowdsourced Security is Transforming the Public Sector Cybersecur

May 8, 2026
Facebook X (Twitter) Instagram
Friday, May 8
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Australian Cyber Security Centre Issues Alert Over ClickFix Attacks
News

Australian Cyber Security Centre Issues Alert Over ClickFix Attacks

Team-CWDBy Team-CWDMay 8, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


The Australian Cyber Security Centre (ACSC) has issued a warning about a malicious cyber campaign which exploits the ClickFix social engineering technique to deliver potent password-stealing malware.

In the alert, issued on May 7, Australian Signals Directorate’s (ADC) ACSC warned that the Vidar Stealer campaign is targeting infrastructure and organizations across multiple sectors.

Vidar Stealer is a form of infostealer which primarily targets Microsoft Windows users and is designed to steal sensitive information from victims. Information it targets includes usernames, passwords, credit card data, cryptocurrency wallets, browser history, multi-factor authentication (MFA) tokens and more. The malware has been active since 2018.

The ACSC has warned that a widespread campaign to distribute the malware combines compromised WordPress sites with ClickFix techniques.

Users are directed to compromised WordPress sites, which are then used to redirect to sites which are designed to deliver the malware.

The sites leverage ClickFix, a social engineering tactic which tricks users into unwittingly running malicious commands or downloading harmful payloads onto their own machines.

In this campaign, the ClickFix technique uses fake CAPTCHA verification prompts to convince users to execute malicious commands or scripts. Because the user is entering command, it commonly bypasses traditional cybersecurity protections.

Once deployed, Vidar Stealer employs defense‑evasion techniques, including self‑deletion of the initial executable, which enables the malware to persist and operate primarily in memory, making it harder to detect and remove.

How to Mitigate Vidar Stealer Attacks

The ACSC recommends that organizations follow guidance issued in the alert to counter the threat of Vidar Stealer and other malware campaigns distributed by ClickFix attacks. The advice includes:

  • Restrict execution of unauthorised or unapproved applications, including downloaded executables and scripts
  • Ensure WordPress, plugins, themes, browsers, and scripting engines are fully patched and up to date
  • Block or limit clipboard write access from browser-based JavaScript and untrusted web content
  • Ensure operating systems are kept fully patched with the latest security updates.
  • Apply patches promptly to endpoints and servers, particularly those exposed to the internet
  • Enforce phishing-resistant MFA



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleSAP-Related npm Packages Compromised in Credential-Stealing Supply Chain Attack
Team-CWD
  • Website

Related Posts

News

SAP-Related npm Packages Compromised in Credential-Stealing Supply Chain Attack

May 8, 2026
News

PCPJack Campaign Boots TeamPCP Off Compromised Machines

May 8, 2026
News

How to Automate Exposure Validation to Match the Speed of AI Attacks

May 8, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views
Our Picks

Is it time for internet services to adopt identity verification?

January 14, 2026

Why the tech industry needs to stand firm on preserving end-to-end encryption

September 12, 2025

‘What happens online stays online’ and other cyberbullying myths, debunked

September 11, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.