Categories: Cyber Security News

Infostealers Enable Attackers to Hijack Legitimate Business Infrastructure for Malware Hosting

A dangerous cybercrime feedback loop has emerged where stolen credentials from infostealer malware enable attackers to hijack legitimate business websites and turn them into malware distribution platforms.

Recent research by the Hudson Rock Threat Intelligence Team reveals this self-sustaining cycle transforms victims into unwitting accomplices.

Sponsored
class="wp-block-heading" id="h-the-clickfix-attack-method">The ClickFix Attack Method

Cybercriminals use a sophisticated social engineering technique called “ClickFix” that tricks users into executing malicious code through their own actions.

The attack begins when victims visit compromised websites showing fake security prompts mimicking Google reCAPTCHA or browser error messages.

ClickFix Hunter aggregating 1,635 domains

When users click these fraudulent alerts, malicious JavaScript silently copies a PowerShell command to their clipboard.

The fake prompt then instructs users to press Windows+R and paste the “verification code” using Ctrl+V.

This executes the hidden command, downloading infostealer malware such as Lumma, Vidar, or Stealc, directly onto their system while bypassing traditional security controls.

A classic ClickFix “Fake Captcha” lure. The “I am not a robot” button is not a validation tool; it is a clipboard injector.

Research analyzing data from the ClickFix Hunter platform, which tracks over 1,600 active malicious domains, uncovered a startling pattern.

Cross-referencing these domains with Hudson Rock’s database of compromised credentials revealed 220 domains, approximately 13% that are simultaneously hosting ClickFix campaigns and have administrative credentials exposed in infostealer logs.

This correlation proves a causal relationship, legitimate businesses whose administrators were infected by infostealers have had their websites hijacked to distribute the same malware that compromised them.

Definitive proof of the loop

The stolen credentials include access to WordPress admin panels, cPanel hosting controls, and content management systems.

Analysis of jrqsistemas.com demonstrates this pattern. The domain currently hosts an active ClickFix campaign.

However, Hudson Rock intelligence indicates that the WordPress login credentials for this site’s administrator were previously stolen by infostealer malware.

The domain wo.cementah.com hosting a ClickFix campaign

Attackers used these valid credentials to access the website and upload malicious scripts, transforming a legitimate business site into an attack platform.

Sponsored

Similar evidence exists for numerous other domains, including wo.cementah.com, where administrative credentials harvested by infostealers enabled unauthorized access for malware hosting.

This feedback loop creates exponential growth in attack infrastructure. As more computers get infected, more credentials are stolen.

More stolen credentials lead to more compromised websites, which expand the surface area for ClickFix campaigns, resulting in additional infections. The cycle becomes self-sustaining.

The decentralized nature of this infrastructure makes disruption extremely difficult. Rather than operating from dedicated malicious servers, attackers hide within thousands of legitimate hosting providers using compromised business websites.

Even if authorities dismantle major botnets, the distributed infrastructure remains largely intact.

The ClickFix Hunter platform, developed by ReliaQuest researcher Carson Williams and integrated with Hudson Rock intelligence, provides critical visibility into this threat.

According to Infostealers, the tool distinguishes between purely malicious domains and compromised legitimate sites, enabling more effective remediation strategies.

The cybersecurity community must recognize that modern malware distribution increasingly relies on exploiting human behavior rather than technical vulnerabilities.

As browsers and operating systems become more secure, attackers pivot to social engineering tactics that trick users into turning off their own protections.

Understanding and disrupting the infrastructure supporting these campaigns, particularly the credential theft feedback loop, is essential for breaking this dangerous cycle.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

The post Infostealers Enable Attackers to Hijack Legitimate Business Infrastructure for Malware Hosting appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Samsung Galaxy S26 Ultra review: show off

A notable phone. "Someone might be watching everything I'm doing on my screen," I tell…

32 minutes ago

5 great indie games from GDC 2026

I just got back from the GDC Festival of Gaming, a big industry-focused event in…

32 minutes ago

Wordle’s creator made a fun new puzzle game

Hi, friends! Welcome to Installer No. 119, your guide to the best and Verge-iest stuff…

32 minutes ago

Adobe Settles With U.S. Over Hard-to-Cancel Subscriptions

The post Adobe Settles With U.S. Over Hard-to-Cancel Subscriptions appeared first on TV News Check.

52 minutes ago

NAB Show: Solid State Logic To Debut Net I/O ST 2110 Bridge

Solid State Logic, a provider of audio consoles and IP-based production tools, is debuting its…

52 minutes ago

NAB Show: Boland Communications To Showcase New OLED Displays, Video Wall Applications

Boland Communications, a provider of professional monitors for broadcast, film, television and aviation, is bringing…

52 minutes ago

This website uses cookies.