Infostealers Fuel Vicious Cycle, Hijacking Victim Websites to Spread More Malware

Cybercrime Feedback Loop: Threat Actors Use Stolen Credentials to Turn Business Websites into Malware Distribution Platforms

HIGH
January 3, 2026
5m read
MalwareCyberattackThreat Intelligence

Related Entities

Organizations

Hudson Rock

Products & Tech

Other

Lumma Vidar StealcInfostealer

Full Report

Executive Summary

Research from the Hudson Rock Threat Intelligence Team has uncovered a highly effective and self-sustaining cybercrime feedback loop. Threat actors are weaponizing credentials harvested by infostealer malware (such as Lumma and Vidar) to gain administrative access to legitimate business websites, particularly those running on WordPress. Once in control, they inject malicious code, transforming these trusted domains into hosts for new malware distribution campaigns. These campaigns often use a social engineering technique dubbed "ClickFix," which tricks visitors into pasting and executing malicious PowerShell commands. This creates a vicious cycle: the compromised sites distribute more infostealers, which harvest more credentials, leading to more compromised websites. This tactic allows attackers to abuse the reputation of legitimate businesses to bypass security controls and reach a wider audience of potential victims.

Threat Overview

This trend represents a strategic evolution in the cybercrime ecosystem, moving from simply selling stolen credentials to actively using them to co-opt victim infrastructure. The feedback loop is dangerously efficient:

  1. Infection: A user is infected with an infostealer like Lumma or Vidar, which steals credentials saved in their browser.
  2. Harvesting: The attacker collects these credentials, which may include logins for a business's WordPress admin panel, cPanel, or FTP server.
  3. Compromise: The attacker uses the stolen credentials to log into the business website and inject malicious scripts.
  4. Distribution: The now-compromised website is used to host a new malware campaign.
  5. Re-Infection: Visitors to the trusted but compromised site are tricked into downloading the next wave of infostealer malware, starting the cycle anew.

Hudson Rock's analysis of 1,600 malicious domains found that 13% were legitimate business sites whose admin credentials had been found in previous infostealer logs, directly confirming this link.

Technical Analysis

The "ClickFix" technique is a key component of the distribution phase.

  1. Initial Access (T1078 - Valid Accounts): The attacker uses stolen credentials to log into a website's administrative backend.
  2. Defense Evasion (T1562.001 - Disable or Modify Tools): The attacker may modify the site or inject scripts to present a fake security challenge or error message to visitors.
  3. Execution (T1059.001 - PowerShell): The compromised site displays a prompt, such as a fake CAPTCHA, instructing the user to fix an issue. When the user clicks a button, a malicious PowerShell command is silently copied to their clipboard (clipboard.writeText).
  4. Social Engineering (T1204.002 - Malicious File): The user is then instructed to open the Windows Run dialog (Win+R), paste the content of their clipboard (which they believe is a verification code), and press Enter. This action executes the hidden PowerShell command.
  5. Payload Delivery: The PowerShell script then downloads and executes the final payload, which is another infostealer like Lumma or Vidar.

The 'ClickFix' technique is particularly insidious because it bypasses many browser-based security measures. Since the user is manually executing the code via the Run dialog, it is not subject to the same sandboxing and security warnings as a direct file download.

Impact Assessment

  • For Hijacked Businesses: Their websites are flagged as malicious, destroying their reputation, tanking their SEO, and getting them blacklisted by security vendors. They may also face legal liability for distributing malware.
  • For End Victims: They are infected with potent infostealer malware, leading to the theft of their own credentials, financial data, and personal information, perpetuating the cycle.
  • For the Ecosystem: This feedback loop greatly increases the scale and reach of infostealer campaigns, making them more resilient and harder to stamp out. Every victim potentially becomes an unwitting part of the attacker's infrastructure.

Cyber Observables for Detection

  • Unusual login activity to website admin panels (e.g., /wp-admin) from unfamiliar IP addresses.
  • Unexpected modifications to core website files (e.g., index.php, .htaccess) or the appearance of new, strangely named files.
  • Outbound network connections from a web server to known malware C2 domains.
Type Value Description Context Confidence
file_path /wp-admin/ Monitor for multiple failed login attempts followed by a successful login from a new IP, which could indicate a brute-force or credential stuffing attack. Web Server Logs medium
file_name index.php, .htaccess Unauthorized modifications to these core files are a common sign of a website compromise. File Integrity Monitoring (FIM) high
command_line_pattern powershell -enc The execution of encoded PowerShell commands is a hallmark of fileless malware delivery. EDR, Windows Event ID 4688 high

Detection & Response

  • File Integrity Monitoring (FIM): Implement FIM on web servers to alert on any unauthorized changes to website files. This can provide the earliest indicator that a site has been compromised.
  • Endpoint Detection and Response (EDR): On the client side, EDR is crucial for detecting the execution of suspicious PowerShell commands. A rule that alerts on a browser process spawning a PowerShell script that makes a network connection is a high-fidelity indicator of this attack.
  • Log Analysis: Regularly review web server access and error logs for signs of brute-force attacks, SQL injection probes, or successful logins from suspicious locations.

Mitigation

  • Multi-Factor Authentication (MFA): The single most effective mitigation. Enforce MFA on all website administrative accounts (D3-MFA: Multi-factor Authentication). This would have prevented the initial compromise, as a stolen password alone would be insufficient for the attacker to log in.
  • User Education: Train end-users to be suspicious of unusual website behavior. Specifically, teach them that no legitimate website will ever ask them to copy and paste code into their system's Run dialog or terminal.
  • Credential Hygiene: Do not save administrative passwords in web browsers where they can be easily stolen by infostealers. Use a dedicated, secure password manager.
  • Website Hardening: Keep all website software (CMS, plugins, themes) up to date. Implement IP-based restrictions for administrative portals, allowing access only from trusted office or VPN IP addresses.

Timeline of Events

1
January 3, 2026
This article was published

MITRE ATT&CK Mitigations

Enforce MFA on all administrative accounts. This is the single most effective control to break the feedback loop by preventing the initial website compromise.

Mapped D3FEND Techniques:

Educate users to recognize social engineering tactics like 'ClickFix' and to never execute code from untrusted sources.

Use modern endpoint protection (EDR) that can detect malicious PowerShell execution and infostealer behaviors.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

The entire feedback loop described in this attack depends on the attacker's ability to reuse stolen credentials. Implementing mandatory Multi-Factor Authentication (MFA) on all administrative interfaces (WordPress, cPanel, FTP, etc.) is the most critical and effective countermeasure. This single control breaks the chain. Even with a valid stolen password, the attacker cannot complete the login without the second factor. For businesses managing websites, this is not optional; it is a fundamental security requirement. This would have prevented the 13% of legitimate businesses from having their infrastructure hijacked. It is the highest priority mitigation.

For the businesses whose sites are being hijacked, early detection is key to minimizing damage. Implementing a File Integrity Monitoring (FIM) solution on the web server is crucial. A FIM tool creates a baseline of all website files and then continuously monitors for any changes, additions, or deletions. It would immediately alert the site administrator the moment an attacker injects a malicious script or modifies a core file like index.php. This allows for rapid response—taking the site offline, removing the malicious code, and forcing a password reset—before the site can be used to infect a large number of visitors. This provides a critical detection layer at the point of compromise.

The 'ClickFix' technique relies entirely on tricking the end-user. Therefore, user education is a vital countermeasure. Security awareness training must be updated to include modern, browser-based social engineering tactics. Users need to be taught a simple, unbreakable rule: no legitimate website will ever require you to copy code and paste it into a command prompt or Run dialog to verify your identity or fix an error. This is always a trap. Using simulations and clear examples of the 'ClickFix' prompt can help solidify this learning. While technical controls are essential, an aware user is the last line of defense against social engineering that bypasses automated security.

Sources & References

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

InfostealerFeedback LoopClickFixPowerShellWordPressLummaVidarMalware Distribution

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading