Stolen Credentials Fuel Self-Sustaining Malware Distribution
Hudson Rock research reveals 220 legitimate business websites hijacked for ClickFix malware attacks after admin credentials were stolen by infostealers.
A dangerous feedback loop has emerged in cybercrime operations: infostealers compromise business owners, steal their website credentials, and attackers then use those credentials to turn legitimate websites into malware distribution platforms—which deploy more infostealers, creating a self-sustaining cycle.
Research published this week by the Hudson Rock Threat Intelligence Team reveals the scale of this problem. Of 1,635 malicious domains tracked via their ClickFix Hunter platform, 220 were legitimate business websites whose administrative credentials appeared in infostealer logs. That's 13% of active malware distribution infrastructure running on hijacked legitimate domains.
What Is ClickFix
ClickFix is a social engineering technique that tricks users into executing malicious code through their own actions. When victims visit a compromised website, they encounter what appears to be a Google reCAPTCHA verification or browser error message.
The fake prompt is convincing enough that many users follow its instructions. Behind the scenes, malicious JavaScript has already copied a PowerShell command to the victim's clipboard. The prompt then asks users to press Windows+R and paste a "verification code" using Ctrl+V.
What actually happens: the victim executes a PowerShell command that downloads and installs infostealer malware—Lumma, Vidar, or Stealc, typically. No exploits required. No zero-days needed. Just social engineering that works.
Microsoft's 2025 Digital Defense Report found ClickFix has become the most common initial access method, accounting for 47% of all initial compromise techniques observed. The technique has even been adopted by nation-state actors like North Korea's Lazarus group for targeted attacks against cryptocurrency companies.
How Legitimate Websites Get Compromised
The attack chain starts with an infected business owner or administrator. Infostealer malware harvests credentials stored in browsers, password managers, and application configuration files. Those credentials often include:
- WordPress admin panel logins
- cPanel and hosting control panel access
- CMS authentication tokens
- FTP and SSH credentials
Once attackers obtain administrative access, they inject ClickFix scripts into the legitimate website. Visitors see fake verification prompts, execute the malicious commands, and get infected themselves. Their credentials then enter the same infostealer ecosystem, potentially compromising more websites.
Hudson Rock documented specific examples:
jrqsistemas.com - Currently hosting an active ClickFix campaign. The site's WordPress administrator credentials were previously stolen by infostealer malware. Attackers used those valid credentials to upload malicious scripts.
wo.cementah.com - Same pattern. Harvested administrative credentials enabled unauthorized access for malware hosting.
Why This Matters
Compromised legitimate domains bypass many security controls that would block newly registered or obviously suspicious domains. Business websites build trust with email security gateways, web filters, and reputation systems over months or years. When those same domains start serving malware, they often sail through defenses.
The feedback loop also complicates takedown efforts. Traditional malware domains can be reported and blocked relatively quickly. But legitimate businesses may not realize their sites are compromised, may not have the technical expertise to remove malicious code, or may delay action to avoid disrupting their operations.
Every successful infection generates more credentials. More credentials mean more compromised websites. More compromised websites mean more distribution points for the same infostealers that started the cycle.
Who Is Getting Hit
Infostealers aren't picky about targets. Small businesses running WordPress sites without dedicated IT support make easy victims. But the credential harvesting affects organizations of all sizes—any administrator who gets infected potentially exposes their organization's web infrastructure.
According to Flashpoint data, information-stealing malware was responsible for 2.1 billion stolen credentials in 2024—75% of that year's total credential theft. Prolific strains like RisePro, StealC, and Lumma compromised 23 million hosts and devices.
The phishing techniques that deliver infostealers have also improved. Attackers use AI to craft convincing lures, exploit trusted platforms like Google Cloud to bypass email security, and time campaigns for maximum impact during holidays and weekends.
Breaking the Cycle
For businesses running websites:
-
Enable multi-factor authentication on all administrative interfaces. MFA won't help if the session is already hijacked, but it raises the bar significantly.
-
Monitor website file integrity. Services that detect unauthorized changes to site files can catch injected malware before it affects visitors.
-
Isolate administrative credentials. Don't log into website admin panels from the same browser or machine used for general work. Consider dedicated admin workstations or virtual machines.
-
Audit admin accounts. Remove accounts for employees who've left. Check for unauthorized accounts that may have been created by attackers.
For users:
Never run commands or scripts copied from websites. Legitimate verification processes don't ask you to open Run dialogs or paste clipboard contents. Any prompt requesting this is almost certainly malicious.
The 220 compromised domains Hudson Rock identified represent just what's currently visible. The actual number of legitimate websites serving malware is certainly higher—and growing with every successful infostealer infection.
Related Articles
EmEditor Website Compromised to Deliver Infostealer
Popular text editor's download page was hijacked for four days in December, serving trojanized installers that steal browser credentials and crypto wallets.
Jan 4, 2026Fog Ransomware Targets US Schools Through Stolen VPNs
A ransomware operation has compromised multiple US educational institutions using stolen VPN credentials. The education sector represents 80% of known victims.
Jan 10, 2026Lazarus Weaponizes Fake Job Interviews With ClickFix Malware
North Korean APT-Q-1 now combines fraudulent cryptocurrency job postings with ClickFix social engineering to deploy GolangGhost backdoor and BeaverTail stealer.
Jan 7, 2026MacSync Stealer Bypasses macOS Gatekeeper Using Apple's Own Notarization
New variant distributed as signed and notarized Swift app evades built-in security. Jamf Threat Labs traces evolution from ClickFix techniques to silent installer approach.
Dec 29, 2025