“`html
An alarming cycle of cybercrime has arisen where pilfered credentials from infostealer malware permit cybercriminals to commandeer authentic business sites and convert them into platforms for distributing malware.
Recent findings from the Hudson Rock Threat Intelligence Team indicate that this self-perpetuating loop turns victims into unintentional participants.
The ClickFix Attack Method
Cybercriminals employ a complex social engineering tactic recognized as “ClickFix,” which deceives individuals into executing harmful code through their own behavior.
The assault initiates when victims access compromised sites displaying counterfeit security alerts that imitate Google’s reCAPTCHA or browser error notifications.

Upon clicking these deceitful warnings, executing malicious JavaScript discreetly copies a PowerShell command into their clipboard.
The counterfeit alert then directs users to hit Windows+R and paste the “verification code” using Ctrl+V.
This triggers the concealed command, downloading infostealer malware such as Lumma, Vidar, or Stealc directly to their device while circumventing standard security measures.

Analysis conducted with data from the ClickFix Hunter platform, tracking over 1,600 active malicious domains, unveiled a shocking trend.
Cross-verifying these domains with Hudson Rock’s database of compromised credentials revealed 220 domains, roughly 13%, that are concurrently facilitating ClickFix campaigns while having administrative credentials exposed in infostealer logs.
This correlation confirms a causal link; genuine businesses whose administrators fell prey to infostealers have seen their websites overtaken to disseminate the very malware that compromised them.

The pilfered credentials encompass access to WordPress administrative panels, cPanel hosting controls, and content management systems.
An examination of jrqsistemas.com illustrates this trend. The domain is currently operating an active ClickFix campaign.
However, Hudson Rock intelligence suggests that the WordPress login credentials for this domain’s administrator were earlier stolen by infostealer malware.

Cybercriminals leveraged these legitimate credentials to gain access to the
“““html
website and upload harmful scripts, altering a legitimate business site into an attack platform.
Similar proof exists for many other domains, including wo.cementah.com, where administrative credentials acquired by infostealers allowed unauthorized entry for malware hosting.
This feedback loop fosters exponential growth in attack infrastructure. As additional computers become infected, further credentials are taken.
More compromised credentials result in more hacked websites, which broaden the surface area for ClickFix campaigns, leading to increased infections. The cycle becomes self-perpetuating.
The decentralized character of this infrastructure renders disruption exceedingly challenging. Instead of functioning from dedicated malicious servers, perpetrators conceal themselves within thousands of legitimate hosting providers using compromised business websites.
Even if law enforcement dismantles significant botnets, the distributed infrastructure largely remains unscathed.
The ClickFix Hunter platform, created by ReliaQuest researcher Carson Williams and incorporated with Hudson Rock intelligence, offers crucial visibility into this threat.
According to Infostealers, the tool differentiates between solely malicious domains and compromised legitimate sites, facilitating more efficient remediation strategies.
The cybersecurity community must acknowledge that contemporary malware distribution increasingly depends on exploiting human behavior instead of technical weaknesses.
As browsers and operating systems grow more secure, attackers shift to social engineering tactics that deceive users into disabling their own protections.
Grasping and disrupting the infrastructure backing these campaigns, particularly the credential theft feedback loop, is vital for breaking this perilous cycle.
“`