Research from the Hudson Rock Threat Intelligence Team has uncovered a highly effective and self-sustaining cybercrime feedback loop. Threat actors are weaponizing credentials harvested by infostealer malware (such as Lumma and Vidar) to gain administrative access to legitimate business websites, particularly those running on WordPress. Once in control, they inject malicious code, transforming these trusted domains into hosts for new malware distribution campaigns. These campaigns often use a social engineering technique dubbed "ClickFix," which tricks visitors into pasting and executing malicious PowerShell commands. This creates a vicious cycle: the compromised sites distribute more infostealers, which harvest more credentials, leading to more compromised websites. This tactic allows attackers to abuse the reputation of legitimate businesses to bypass security controls and reach a wider audience of potential victims.
This trend represents a strategic evolution in the cybercrime ecosystem, moving from simply selling stolen credentials to actively using them to co-opt victim infrastructure. The feedback loop is dangerously efficient:
Hudson Rock's analysis of 1,600 malicious domains found that 13% were legitimate business sites whose admin credentials had been found in previous infostealer logs, directly confirming this link.
The "ClickFix" technique is a key component of the distribution phase.
clipboard.writeText).Win+R), paste the content of their clipboard (which they believe is a verification code), and press Enter. This action executes the hidden PowerShell command.The 'ClickFix' technique is particularly insidious because it bypasses many browser-based security measures. Since the user is manually executing the code via the Run dialog, it is not subject to the same sandboxing and security warnings as a direct file download.
/wp-admin) from unfamiliar IP addresses.index.php, .htaccess) or the appearance of new, strangely named files.| Type | Value | Description | Context | Confidence |
|---|---|---|---|---|
| file_path | /wp-admin/ |
Monitor for multiple failed login attempts followed by a successful login from a new IP, which could indicate a brute-force or credential stuffing attack. | Web Server Logs | medium |
| file_name | index.php, .htaccess |
Unauthorized modifications to these core files are a common sign of a website compromise. | File Integrity Monitoring (FIM) | high |
| command_line_pattern | powershell -enc |
The execution of encoded PowerShell commands is a hallmark of fileless malware delivery. | EDR, Windows Event ID 4688 | high |
Enforce MFA on all administrative accounts. This is the single most effective control to break the feedback loop by preventing the initial website compromise.
Mapped D3FEND Techniques:
Educate users to recognize social engineering tactics like 'ClickFix' and to never execute code from untrusted sources.
Use modern endpoint protection (EDR) that can detect malicious PowerShell execution and infostealer behaviors.
Mapped D3FEND Techniques:
The entire feedback loop described in this attack depends on the attacker's ability to reuse stolen credentials. Implementing mandatory Multi-Factor Authentication (MFA) on all administrative interfaces (WordPress, cPanel, FTP, etc.) is the most critical and effective countermeasure. This single control breaks the chain. Even with a valid stolen password, the attacker cannot complete the login without the second factor. For businesses managing websites, this is not optional; it is a fundamental security requirement. This would have prevented the 13% of legitimate businesses from having their infrastructure hijacked. It is the highest priority mitigation.
For the businesses whose sites are being hijacked, early detection is key to minimizing damage. Implementing a File Integrity Monitoring (FIM) solution on the web server is crucial. A FIM tool creates a baseline of all website files and then continuously monitors for any changes, additions, or deletions. It would immediately alert the site administrator the moment an attacker injects a malicious script or modifies a core file like index.php. This allows for rapid response—taking the site offline, removing the malicious code, and forcing a password reset—before the site can be used to infect a large number of visitors. This provides a critical detection layer at the point of compromise.
The 'ClickFix' technique relies entirely on tricking the end-user. Therefore, user education is a vital countermeasure. Security awareness training must be updated to include modern, browser-based social engineering tactics. Users need to be taught a simple, unbreakable rule: no legitimate website will ever require you to copy code and paste it into a command prompt or Run dialog to verify your identity or fix an error. This is always a trap. Using simulations and clear examples of the 'ClickFix' prompt can help solidify this learning. While technical controls are essential, an aware user is the last line of defense against social engineering that bypasses automated security.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats