Warning Issued by the Australian Cyber Security Centre on ClickFix Activity
The Australian Signals Directorate’s Australian Cyber Security Centre (ACSC) has raised an alarming red flag regarding the ClickFix activity, which employs compromised WordPress sites to disseminate the Vidar Stealer malware.
An advisory released on May 7 indicates that this nefarious campaign predominantly targets Australian infrastructure and organizations across various sectors.
However, its modus operandi poses risks to any Windows user duped by a counterfeit verification prompt on seemingly legitimate websites.
The efficacy of the attack lies in the authenticity of the websites involved. According to the ACSC, genuine WordPress pages are infiltrated with a payload domain that triggers external JavaScript.
This nefarious script supplants the original webpage with a deceptive verification interface and archives an obfuscated PowerShell command to the visitor’s clipboard.
Victims are then compelled to execute this command manually, often with elevated administrative privileges, resulting in the unobtrusive installation of Vidar.
Distinction from Conventional CAPTCHA
In stark contrast to authentic CAPTCHA mechanisms, a legitimate version does not require users to invoke Windows Run, paste commands, or authorize PowerShell.
This manual requirement epitomizes the ClickFix deception: the browser provides the clipboard information, effectively making the user the unwitting implementation conduit.
For endpoint security teams, critical indicators extend beyond just the final Vidar binary; they encompass the documented sequence of clipboard write actions, PowerShell execution, outbound downloads from the compromised payload domain, and subsequent HTTP/S POST traffic.
Vidar functions as an infostealer, resulting in ramifications that extend beyond the initial compromised host.
The ACSC highlights that Vidar has the potential to pilfer credentials, browser data, cryptocurrency wallet information, and system specifics. The ramifications of data theft can lead to further malicious activities.
In practical terms, a confirmed ClickFix execution necessitates a comprehensive browser credential audit, session and token revocation for any work accounts accessed on the device, cryptocurrency wallet evaluations, and vigilance for unfamiliar sign-ins originating from suspicious sources.
For Windows forensic investigation, it is essential to monitor for recently executed PowerShell commands that were initiated post-browser interaction, particularly those containing obfuscated scripts replicated from a web page.

Additionally, scrutinize script-block logging for remote download intentions and outbound connections to recently identified domains accompanied by POST requests.
For website proprietors, it is crucial to review recently altered WordPress themes, plugins, and template files for any injected script tags or iframe loaders.
Removing dormant plugins and themes and contrasting live page source code with a known clean backup should also be prioritized.
This development represents a continuation of trends previously detailed by Gridinsoft regarding the evolution of ClickFix and the dissemination of fraudulent CAPTCHA malware.
The fundamental advice for users is both straightforward and definitive: a verification page may request that you click, solve, or wait, but it should never compel you to paste code into Windows. Should this occur, treat it as malware execution rather than merely a suspicious webpage encounter.
Source link: Gridinsoft.com.





