InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: Hackers exploit WordPress sites to power next-generation ClickFix phishing attacks
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > Hackers exploit WordPress sites to power next-generation ClickFix phishing attacks
Technology

Hackers exploit WordPress sites to power next-generation ClickFix phishing attacks

October 8, 2025 7 Min Read
Share
Hackers exploit WordPress sites to power next-generation ClickFix phishing attacks
SHARE

Cybersecurity researchers are warning of malicious campaigns targeting WordPress sites with malicious JavaScript injections designed to redirect users to sketchy sites.

“Site visitors are injected with content that is drive-by malware, such as a fake Cloudflare verification,” Sucuri researcher Puja Srivastava said in an analysis published last week.

A website security company said it launched an investigation after one of its customer’s WordPress sites served suspicious third-party JavaScript to site visitors, ultimately finding that the attacker had made malicious changes to a theme-related file (‘functions.php’).

The code injected into “functions.php” includes a reference to Google Ads, presumably to evade detection. However, it actually acts as a remote loader by sending an HTTP POST request to the domain “brazilc(.)com”, which responds with a dynamic payload containing two components.

  • JavaScript files hosted on a remote server (‘porsasystem(.)com’). At the time of writing, this file is referenced by 17 websites and contains code that performs site redirects.
  • A piece of JavaScript code that creates a hidden 1×1 pixel iframe. Inside it, insert code that mimics a legitimate Cloudflare asset, such as “cdn-cgi/challenge-platform/scripts/jsd/main.js”. This is the API that is the core part of the bot detection and challenge platform.

It is worth noting that the domain ‘porsasystem(.)com’ is flagged as part of a traffic distribution system (TDS) called Kongtuke (aka 404 TDS, Chaya_002, LandUpdate808, and TAG-124).

According to information shared by an account named ‘monitorsg’ on Mastodon on September 19, 2025, the infection chain begins with a user visiting a compromised site, which results in the execution of ‘porsasystem(.)com/6m9x.js’, which then leads to ‘porsasystem(.)com/js.php’, ultimately redirecting the victim to a ClickFix-style page for malware distribution.

This finding points to the need to protect WordPress sites and keep plugins, themes, and website software up to date, to enforce strong passwords, to scan sites for anomalies, and to create unexpected administrator accounts to maintain persistent access even after malware is detected and removed.

See also  Google discovers PROMPTFLUX malware that uses Gemini AI to rewrite code every hour

Create a ClickFix page using the IUAM ClickFix Generator

The disclosure came as Palo Alto Networks’ Unit 42 detailed a phishing kit named IUAM ClickFix Generator that leverages ClickFix social engineering techniques to infect users with malware and allow attackers to come up with customizable landing pages that mimic browser verification challenges commonly used to block automated traffic.

“This tool allows attackers to create highly customizable phishing pages that mimic the challenge-response behavior of browser validation pages commonly deployed by content delivery networks (CDNs) and cloud security providers to protect against automated threats,” said security researcher Ammar Elsad. “The spoofed interface is designed to appear legitimate to the victim, increasing the effectiveness of the decoy.”

The custom-built phishing page also has the ability to manipulate the clipboard, a key step in a ClickFix attack, and detect the operating system used to adjust the infection sequence and deliver compatible malware.

In at least two different cases, threat actors have been detected using pages generated using kits that deploy information stealers, such as DeerStealer and Odyssey Stealer. Odyssey Stealer is designed to target Apple macOS systems.

The arrival of the IUAM ClickFix Generator further strengthens Microsoft’s advance warning that commercial ClickFix builders will be on the rise in underground forums starting in late 2024. Another notable example of a phishing kit that has integrated this product is Impact Solutions.

Microsoft said in August 2025, “These kits offer the creation of landing pages using a variety of available lures, including Cloudflare. They also offer the construction of malicious commands that users paste into the Windows Run dialog. These kits claim to ensure payload persistence, as well as bypassing antivirus and web protection (some include Microsoft Defender). Some even promise to bypass SmartScreen.”

See also  New Fluent Bit flaw exposes cloud to RCE and stealth infrastructure intrusions

Needless to say, these tools further lower the barrier to entry for cybercriminals, allowing them to launch sophisticated multi-platform attacks at scale without requiring much effort or technical expertise.

ClickFix becomes stealthy through cache smuggling

The findings also follow the discovery of a new campaign that revamps the ClickFix attack method by staying under the radar and using a sneaky technique known as cache smuggling, rather than explicitly downloading malicious files to target hosts.

“This campaign differs from previous ClickFix variants in that the malicious script does not download files or communicate with the internet,” said Marcus Hutchins, lead threat researcher at Expel. “This is accomplished by preemptively storing arbitrary data on the user’s machine using the browser’s cache.”

In an attack documented by the cybersecurity firm, a ClickFix-themed page masquerades as the Fortinet VPN Compliance Checker and uses FileFix tactics to trick users into launching Windows File Explorer, pasting a malicious command into the address bar and triggering the execution of the payload.

Hidden commands are designed to run PowerShell scripts via conhost.exe. What makes this script unique is that it does not download any additional malware or communicate with attacker-controlled servers. Instead, an obfuscated payload is executed that is disguised as a JPEG image and is already cached by the browser when the user visits the phishing page.

“Neither web pages nor PowerShell scripts explicitly download files,” Hutchins explained. “By simply caching a fake ‘image’ in the browser, the malware can retrieve the entire zip file onto the local system without making a web request with a PowerShell command.”

See also  comicform and sectorJ149 hacker deploys form book malware in Eurasian cyberattack

“The implications of this technique are alarming, as cache smuggling can provide a way to bypass protections that detect malicious files when they are downloaded and executed. An innocent-looking “image/jpeg” file is simply downloaded, its contents extracted, and executed via PowerShell commands hidden in the ClickFix phishing lure. ”

Share This Article
Twitter Copy Link
Previous Article Ghost of Tsushima increases the price of swords, making them cheaper than ever Ghost of Tsushima increases the price of swords, making them cheaper than ever
Next Article Germany's Munich airport reopens after being closed for second time in less than 24 hours due to drone attack Germany’s Munich airport reopens after being closed for second time in less than 24 hours due to drone attack

Latest News

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

threat actor known as silver fox In attacks targeting Chinese…

December 4, 2025
Critical RSC bug in React and Next.js allows unauthenticated remote code execution

Critical RSC bug in React and Next.js allows unauthenticated remote code execution

A maximum severity security flaw has been disclosed in React…

December 3, 2025
India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India's Department of Telecommunications (DoT) has directed app-based telecom service…

December 2, 2025
India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India's Ministry of Telecommunications has reportedly asked major mobile device…

December 1, 2025
CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated…

November 30, 2025

You Might Also Like

Five people plead guilty in US for helping North Korean IT workers infiltrate 136 companies
Technology

Five people plead guilty in US for helping North Korean IT workers infiltrate 136 companies

7 Min Read
Sneaky 2FA phishing kit adds BitB pop-up designed to mimic browser address bar
Technology

Sneaky 2FA phishing kit adds BitB pop-up designed to mimic browser address bar

6 Min Read
Evil malware is set in AI tools to infiltrate global organizations
Technology

Evil malware is set in AI tools to infiltrate global organizations

6 Min Read
One click allows you to turn Perplexity's Comet AI Browser into Data Thief
Technology

One click allows you to turn Perplexity’s Comet AI Browser into Data Thief

3 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?