The Australian Cybersecurity Centre (ACSC) has just warned about an active campaign using the social engineering technique known as ClickFix to induce victims to run malicious commands and thus deploy the info-stealer Vidar. In this scheme the attackers compromise WordPress sites - with vulnerable themes or plugins - to redirect users to pages that fake a Cloudflare check or a CAPTCHA and ask them to copy and paste a PowerShell line on their computer. That simple action, as unusual as it may seem, is enough for malware to run, remove your binary and operate from memory, making forensic research and traditional detection difficult.
ClickFix exploits the user's confidence and rush: the visual "verification" remote and the pretext of a supposed security correction make a PowerShell order an effective vector. Vidar, in addition to being offered as malware-as-a-service, is designed to steal passwords from browsers, cookies, cryptomoneda portfolios, self-completed data and system details, and to solve your command and control servers (C2) by "dead-drop" in public services such as Telegram bots or Steam profiles, a technique that complicates simple lock by domain.

Practical involvement is clear: any organization with users who navigate to public sites (customers, remote workers, partners) is at risk if it does not limit the actions that a browser tab can induce in the system. In addition, WordPress administrators should understand that an outdated or unnecessary plugin installation is an effective platform to redirect malicious traffic to thousands of visitors.
In terms of detection and response, there are useful technical features: the execution of PowerShell with coded parameters or long "one-liner" commands, traffic to messaging services or public profiles acting as dead-drops, and the absence of a persistent executable because Vidar is executed in memory. To improve visibility it is recommended to enable advanced PowerShell (ScriptBlockLogging, ModuleLogging and Transcription) registration and to centralize these events on a SIEM or EDR platform capable of analyzing memory behaviors and command chains before the binary is deleted.
As concrete mitigation measures, the ACSC recommends restrictions on PowerShell and the implementation of white application lists, adding practical measures that should already be implemented: implement implementation policies that prevent unsigned scripts, use Constrained Language Mode where appropriate, implement AppLocker or Windows Defender Application Control (WDAC) to block unauthorized executions, and strengthen AMSI and EDR capabilities that inspect memory. Microsoft maintains useful technical documentation to configure these defenses and application control policies in Windows environments: https: / / learn.microsoft.com / windows / security / amenat-protection / windows-defender-application-control / windows-defender-application-control--wdac--overview.

For WordPress administrators the priority is immediate: to update kernel, themes and plugins, to remove inactive components, to apply basic hardening (file permissions, to disable issue / plugin editing from the panel, to restrict administrative access by IP or VPN) and to deploy a WAF that blocks redirections and suspicious requests. It is also appropriate to install file integrity monitoring solutions and change alerts in html access or in templates that are usually modified after intrusion. The ACSC newsletter itself includes commitment indicators (IoC) that can be integrated into detection and blocking rules: http: / / www.cyber.gov.au / about-us / view-all-content / alerts-and-advisories / clickfix-distributing-vidar-stealer-via-wordpress-targeting-Australian-infrastructure.
No less important is human defense: to train employees and customers to never stick commands on a terminal or PowerShell from a web instruction, and to promote the use of password administrators and multifactor authentication to limit the impact of credentials theft. Finally, establish a response playbook (isolate the host, flip memory, rotate exposed credentials, restore from reliable copies) and perform phishing and incident simulation exercises will reduce the exposure window against campaigns that depend on the user's impulsivity.
The combination of relatively simple techniques by the attacker (WordPress engagement + visual deception + a single PowerShell command) and modern memory concealment tools again shows that effective security requires multiple-layer controls: patching and hardening of web applications, strict enforcement restrictions on endpoints, visibility of command telemetry and continuous awareness campaigns. If you manage infrastructure or manage sites, act now: update, restrict and monitor may be the difference between a minor incident and a mass credentials leak.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...