Skip to main content

Archived Article — The Daily Perspective is no longer active. This article was published on 10 March 2026 and is preserved as part of the archive. Read the farewell | Browse archive

Technology

Hackers Turn Trusted Websites Into Malware Launchpads

Researchers uncover a global campaign using compromised WordPress sites and fake security prompts to steal user credentials

Hackers Turn Trusted Websites Into Malware Launchpads
Image: The Register
Key Points 3 min read
  • Rapid7 identified 250+ compromised WordPress sites across 12 countries being abused to distribute infostealer malware
  • Attackers use fake Cloudflare CAPTCHA pages to trick visitors into executing malicious commands on their own machines
  • The stolen credentials are packaged and sold on cybercrime marketplaces, often for as little as $10 per account
  • The campaign has been active since at least December 2025, exploiting a technique called ClickFix that relies on social engineering rather than software vulnerabilities

Cybersecurity researchers have uncovered a large-scale campaign that turns legitimate, trusted websites into unwitting accomplices in credential theft. Security researchers at Rapid7 have identified an ongoing, widespread compromise of legitimate WordPress websites misused by an unidentified threat actor to inject a ClickFix implant impersonating a Cloudflare human verification challenge, with more than 250 distinct infected websites spanning at least 12 countries including Australia, Brazil, Canada, Czechia, Germany, India, Israel, Singapore, Slovakia, Switzerland, the UK, and the US.

The attack is deceptively simple in its execution but effective in its results. Malicious code injected into compromised sites serves visitors a convincing fake Cloudflare CAPTCHA page that instead of simply proving you are not a robot, instructs users to copy and run a command on their machine, a step that ultimately triggers the download of credential-stealing malware. The trick works because the attack starts on websites that otherwise look perfectly legitimate; visitors think they are just clearing yet another Cloudflare bot check when in fact they are being talked through the first step of infecting their own machine.

The campaign exploits a social engineering technique known as ClickFix. ClickFix exploits the fact that users rarely question simple keyboard instructions when they believe they are interacting with a trusted security control; a malicious PowerShell command is already placed on the clipboard and executes when pasted into the Run dialog, giving the attacker code execution without triggering browser download prompts or security warnings. The CAPTCHA instructions are available in at least 31 languages including English, French, German, Spanish, Italian, Portuguese, Dutch, Russian, Ukrainian, Polish, Turkish, Romanian, Hungarian, Czech, Swedish, Finnish, Danish, Norwegian, Greek, Bulgarian, Serbian, Croatian, Hebrew, Arabic, Indonesian, Malay, Thai, Vietnamese, Estonian, Latvian, and Lithuanian.

What makes the campaign particularly concerning is its efficiency. The large-scale execution of the compromise across completely unrelated WordPress instances suggests a high level of automation by the threat actor and is likely part of an organised long-term criminal effort, according to Rapid7 security researcher Milan Spinka. Rather than manually breaking into websites one by one, the attackers appear to be using automated tools to compromise large numbers of sites simultaneously.

Once a victim follows the instructions on the fake verification page, the attack chain can install an infostealer, malware designed to quietly scoop up useful data from the infected machine that typically includes browser-stored credentials, authentication cookies, cryptocurrency wallet information, and other bits of digital loot.

The economic incentive behind the campaign is significant. Prices for stolen credentials on underground marketplaces vary dramatically based on target value; a Fortune 500 executive's credentials might sell for $50,000, while consumer accounts trade for $10-50. This pricing structure has helped infostealer malware become one of the most profitable tools in the cybercriminal arsenal. Info stealer infections commonly present as precursor activity to major cyber security incidents, as cybercriminals use them to gather user credentials.

Using compromised websites as delivery channels provides attackers with significant tactical advantages. Using compromised websites as the delivery mechanism gives the operators a useful layer of camouflage; security tools and users alike are far less suspicious of well-known domains than newly registered malware sites, and the attackers get to piggyback on the reputation of whoever's unlucky enough to have their website hacked.

The campaign highlights a critical shift in how modern malware spreads. The cybersecurity community must recognise that modern malware distribution increasingly relies on exploiting human behaviour rather than technical vulnerabilities; as browsers and operating systems become more secure, attackers pivot to social engineering tactics that trick users into turning off their own protections.

For organisations and individuals, the implications are serious. Australian users should exercise caution when encountering CAPTCHA prompts on unfamiliar websites and avoid copying or executing commands shown in security dialogs. Cybercriminals may seek to purchase and use stolen user credentials associated with corporate accounts to gain initial access to devices of the victim's employer, their clients and other enterprise systems, with subsequent impact to organisations including ransomware, extortion, business email compromise and theft of intellectual property.

Sources (7)
Aisha Khoury
Aisha Khoury

Aisha Khoury is an AI editorial persona created by The Daily Perspective. Covering AUKUS, Pacific security, intelligence matters, and Australia's evolving strategic posture with authority and nuance. As an AI persona, articles are generated using artificial intelligence with editorial quality controls.