Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities

March 13, 2026

What CISOs Should Know (And Do) About OpenClaw

March 13, 2026

APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine

March 13, 2026
Facebook X (Twitter) Instagram
Friday, March 13
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»Compromised WordPress Sites Deliver ClickFix Attacks
Cyber Security

Compromised WordPress Sites Deliver ClickFix Attacks

Team-CWDBy Team-CWDMarch 11, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A widespread cyber-criminal campaign has compromised legitimate WordPress websites to infect visitors with infostealer malware, threat researchers at Rapid 7 have warned.

The global operation has compromised over 250 websites including regional news publications, local business websites and a US Senate candidate’s official webpage. 

Sites in at least 12 countries have been impacted, including: Australia, Brazil, Canada, Czechia, Germany, India, Israel, Singapore, Slovakia, Switzerland, the UK and the US.

The attackers’ goal is to exploit the user trust in legitimate websites to secretly infect them with infostealer malware, for the purposes of stealing sensitive data, including login credentials and financial information

The campaign has been active since December 2025. In a blog post by Rapid7, researchers warn that the abuse of legitimate websites “makes this threat dangerous for organizations and individuals alike.”

During a visit to an infected site, users are shown what looks like a Cloudflare Captcha page, something they might expect to see on many websites. However, in this scenario the Captcha page is a convincing fake, designed to begin the infection process.

Fake Captcha and ClickFix Attacks For Social Engineering

The attackers deploy ClickFix, a social engineering technique which uses dialogue boxes containing fake verification messages, to trick people into copying, pasting and running malicious code on their own device.

In this campaign, the fake Captcha asks the user to open the Windows Run command box and paste in a command under the guise of additional verification. The command begins a multi-stage process of downloading and installing malware on the machine.

Infostealer payloads observed being delivered via the compromised WordPress sites included Vidar Stealer, Impure Stealer, Vodka Stealer and Double Donut, the latter of which is often used as part of ClickFix campaigns.

No matter which payload is deployed, the goal is the same: steal usernames, passwords, digital wallets and other sensitive information from the victim. 

Whether they are used by those behind this campaign, or sold to other cybercriminals on underground forums, these stolen credentials can subsequently be used for financial theft or to conduct further, more targeted attacks against organizations.

“The large-scale execution of the compromise across completely unrelated WordPress instances suggests a high level of automation by the threat actor and is likely part of an organized long-term criminal effort,” warned Rapid7 researchers.

It is unclear how exactly the attackers have compromised the targeted WordPress sites, but Rapid 7 has suggested it could be linked to a WordPress plugin or theme vulnerability being exploited, previously stolen credentials being misused or publicly accessible admin interfaces being accessed through brute-force password cracking attacks.

Rapid7 has issued the following advice to WordPress site admins:

  • Regularly review all software components for outdated versions and perform vulnerability scans to identify and mitigate weaknesses
  • Use long and unpredictable passwords for administrative access, possibly using a password manager for audited security and convenience
  • Set up a second authentication factor for administrative access
  • Avoid running untrusted code on devices that store credentials (e.g. saved logins in a browser) usable to administer the website

Rapid 7 said that it had notified US authorities about the Senate candidate’s official webpage being compromised.

Infosecurity has contacted WordPress for comment.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleBlackSanta EDR-Killer Targets HR Teams in CV-Themed Campaign
Next Article Infosecurity Europe Announces 2026 Keynote Line Up
Team-CWD
  • Website

Related Posts

Cyber Security

What CISOs Should Know (And Do) About OpenClaw

March 13, 2026
Cyber Security

Expanded Identity Attack Vectors: From Document Fraud to Signal Manipu

March 12, 2026
Cyber Security

Researchers Uncover ‘LeakyLooker’ Vulnerabilities in Google Looker

March 11, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Near-ultrasonic attacks on voice assistants

September 11, 20256 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Our Picks

Why LinkedIn is a hunting ground for threat actors – and how to protect yourself

January 16, 2026

Chronology of a Skype attack

February 5, 2026

Your information is on the dark web. What happens next?

January 13, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.