Infostealer Infections Expose Cloud Credentials, Enabling Cyber Attacks on Global Companies
A new investigation by the Hudson Rock Threat Intelligence Team, backed by data from ClickFix Hunter, has revealed a startling cycle: legitimate business websites are being weaponized using stolen administrative credentials obtained through Infostealer malware.
Traditional web-based exploits have steadily declined as browsers like Chrome and operating systems such as Windows strengthened their defenses.
In response, cybercriminals have shifted to “human-assisted” malware delivery, tricking users into executing malicious commands.
In a typical ClickFix campaign, victims are redirected to compromised websites through malvertising or SEO poisoning.
These pages often display deceptive overlays resembling CAPTCHA challenges, Chrome update errors, or Windows alerts.
When users interact with them, embedded JavaScript scripts copy a PowerShell command to the clipboard. The site then instructs the user to press Windows + R, paste the “verification code,” and press Enter, inadvertently executing the malicious script with full privileges.
This command downloads and executes Infostealer malware such as Lumma, Vidar, or Stealc, which silently collects passwords, tokens, and saved credentials from browsers and applications.
According to ClickFix Hunter’s data, more than 1,600 live domains have been observed serving ClickFix campaigns, with hundreds discovered in the past month alone.
Hudson Rock’s analysis uncovered a more profound connection among these compromised sites: approximately 13% overlap with domains whose administrative credentials had already been leaked via Infostealer infections.
Case studies of jrqsistemas.com and wo.cementah.com illustrate the feedback loop. In both cases, administrative logins stolen via Infostealer infections were later used by attackers to hijack the same websites and host new ClickFix payloads.
This creates a self-propagating chain where victims become unwilling participants in distributing further infections.
By combining ClickFix Hunter’s real-time monitoring with Hudson Rock’s Cavalier
This decentralized infrastructure makes takedowns more difficult and allows the ecosystem to persist despite law enforcement disruptions.
Experts warn that as long as infostealer logs containing credentials for WordPress, cPanel, and cloud dashboards circulate in underground markets, attackers can continuously repurpose legitimate business assets.
Hudson Rock recommends using its free API tools to identify compromised domains, track infections, and prevent hijacked infrastructure from being reused in future attacks.
The findings underscore a critical truth in 2025: the most significant vulnerability is no longer in software code; it’s in human actions and exposed credentials that power the global web.
Follow us on Google News , LinkedIn and X to Get More Instant Updates, Set Cyberpress as a Preferred Source in Google.
The post Infostealer Infections Expose Cloud Credentials, Enabling Cyber Attacks on Global Companies appeared first on Cyber Security News.
INDIANAPOLIS (WOWO) — The Indiana Criminal Justice Institute (ICJI) is teaming up with Indiana State…
FORT WAYNE, Ind. (WOWO) — Families of children with physical and mental disabilities often face…
The sequel to Stellar Blade will not be published by PlayStation, developer Shift Up has…
Michael Pennington — better known to Star Wars fans as Return of the Jedi's Moff…
50 Years Ago An early morning trash fire that may have been set by four…
Editor’s note: This is the second of two parts. “In happy moments one realizes that…
This website uses cookies.