Categories: Cyber Security News

Threat Actors Use Infostealers to Turn Legitimate Businesses into Malware Hosts

Cybercriminals are exploiting a dangerous feedback loop where infostealer malware transforms legitimate businesses into unwitting accomplices in cybercrime.

Recent analysis by the Hudson Rock Threat Intelligence Team reveals that attackers are using stolen credentials to commandeer authentic business websites for hosting malicious ClickFix campaigns.

The ClickFix attack technique tricks users into executing malware by mimicking trusted system interfaces like CAPTCHA verifications or browser updates.

ClickFix Hunter aggregating 1,635 domains

When victims interact with these fake prompts, malicious PowerShell commands are copied to their clipboard.

Users are then instructed to paste and execute these commands through the Windows Run dialog, bypassing traditional security controls.

Research conducted using the ClickFix Hunter platform uncovered a startling pattern: 220 out of 1,635 tracked malicious domains are legitimate business websites whose administrative credentials were previously stolen by infostealers.

This represents approximately 13% of active ClickFix infrastructure, demonstrating how victims become vectors for future attacks.

The investigation examined specific cases including jrqsistemas.com, where WordPress administrative credentials appeared in infostealer logs.

Attackers used these stolen credentials to access the legitimate website’s content management system and upload ClickFix scripts, transforming a business site into a malware distribution point.

A classic ClickFix “Fake Captcha” lure

This self-sustaining cycle operates as follows: infostealers compromise user machines and harvest credentials for website administration panels, hosting services, and content management systems.

Cybercriminals then use these stolen credentials to inject malicious code into legitimate websites. These compromised sites host new ClickFix campaigns that distribute more infostealers, perpetuating the cycle.

The approach proves particularly effective because compromised legitimate domains bypass many security filters.

Unlike newly registered domains that trigger suspicion, established business websites often maintain trusted reputations with security systems and users alike.

Security researchers emphasize that this infrastructure hijacking represents a significant shift in cybercrime economics.

Rather than purchasing domains and hosting services which creates paper trails and incurs costs attackers exploit stolen credentials to access existing infrastructure at no cost while maintaining operational anonymity.

The domain wo.cementah.com hosting a ClickFix campaign

Hudson Rock has released free API endpoints enabling security teams to detect whether their domains appear in infostealer logs, providing early warning of potential compromise.

According to Infostealers, the ClickFix Hunter platform integrates this intelligence to help organizations identify and remediate hijacked infrastructure.

The feedback loop highlights a critical vulnerability in modern cybersecurity: the human element combined with credential theft creates self-perpetuating attack ecosystems.

Organizations must implement comprehensive monitoring for unauthorized access to administrative systems and conduct regular credential audits to break this cycle.

Security experts recommend multi-factor authentication for all administrative access, regular monitoring of website file integrity, and employee training on recognizing social engineering tactics.

As infostealers continue evolving, breaking the victim-to-vector cycle requires proactive defense strategies that address both technical vulnerabilities and human factors.

Follow us on Google News , LinkedIn and X to Get More Instant UpdatesSet Cyberpress as a Preferred Source in Google.

The post Threat Actors Use Infostealers to Turn Legitimate Businesses into Malware Hosts appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

These Are The Most Valuable Magic: The Gathering Cards From The Teenage Mutant Ninja Turtle Set

The second Magic: The Gathering set of 2026 is here, and it’s Turtle Time! The…

19 minutes ago

Magic’s Duskmourn Precon Bundle is Discounted Right Now, and It’s an Absolute Bargain When You Consider What’s Included

2024 was a solid year for Magic: The Gathering, but in all the excitement over…

19 minutes ago

Magic: The Gathering’s Lorwyn Eclipsed Booster Boxes Just Crashed to New All-Time Low Price at Amazon

Magic: The Gathering has kicked off its newest Teenage Mutant Ninja Turtles set, but Lorwyn…

20 minutes ago

Amazon’s 4K Fire TV Sticks Are Already on Sale Ahead of the Big Spring Sale

Amazon has officially announced its Big Spring Sale (which is set to run this year…

20 minutes ago

These Are the 10 Most Valuable Final Fantasy Magic Cards That Collectors Are Still Chasing

Magic: The Gathering’s Universes Beyond lineup of crossovers is becoming more prevalent in 2026, but…

20 minutes ago

New restaurants, tasting room fully open at Cherapa Place

March 16, 2026 All three new food and beverage options at Cherapa Place now are…

55 minutes ago

This website uses cookies.