ClickFix the false verification that activates Vidar and steals credentials from memory

Published 4 min de lectura 58 reading

The Australian Cybersecurity Centre (ACSC) has just warned about an active campaign using the social engineering technique known as ClickFix to induce victims to run malicious commands and thus deploy the info-stealer Vidar. In this scheme the attackers compromise WordPress sites - with vulnerable themes or plugins - to redirect users to pages that fake a Cloudflare check or a CAPTCHA and ask them to copy and paste a PowerShell line on their computer. That simple action, as unusual as it may seem, is enough for malware to run, remove your binary and operate from memory, making forensic research and traditional detection difficult.

ClickFix exploits the user's confidence and rush: the visual "verification" remote and the pretext of a supposed security correction make a PowerShell order an effective vector. Vidar, in addition to being offered as malware-as-a-service, is designed to steal passwords from browsers, cookies, cryptomoneda portfolios, self-completed data and system details, and to solve your command and control servers (C2) by "dead-drop" in public services such as Telegram bots or Steam profiles, a technique that complicates simple lock by domain.

ClickFix the false verification that activates Vidar and steals credentials from memory
Image generated with IA.

Practical involvement is clear: any organization with users who navigate to public sites (customers, remote workers, partners) is at risk if it does not limit the actions that a browser tab can induce in the system. In addition, WordPress administrators should understand that an outdated or unnecessary plugin installation is an effective platform to redirect malicious traffic to thousands of visitors.

In terms of detection and response, there are useful technical features: the execution of PowerShell with coded parameters or long "one-liner" commands, traffic to messaging services or public profiles acting as dead-drops, and the absence of a persistent executable because Vidar is executed in memory. To improve visibility it is recommended to enable advanced PowerShell (ScriptBlockLogging, ModuleLogging and Transcription) registration and to centralize these events on a SIEM or EDR platform capable of analyzing memory behaviors and command chains before the binary is deleted.

As concrete mitigation measures, the ACSC recommends restrictions on PowerShell and the implementation of white application lists, adding practical measures that should already be implemented: implement implementation policies that prevent unsigned scripts, use Constrained Language Mode where appropriate, implement AppLocker or Windows Defender Application Control (WDAC) to block unauthorized executions, and strengthen AMSI and EDR capabilities that inspect memory. Microsoft maintains useful technical documentation to configure these defenses and application control policies in Windows environments: https: / / learn.microsoft.com / windows / security / amenat-protection / windows-defender-application-control / windows-defender-application-control--wdac--overview.

ClickFix the false verification that activates Vidar and steals credentials from memory
Image generated with IA.

For WordPress administrators the priority is immediate: to update kernel, themes and plugins, to remove inactive components, to apply basic hardening (file permissions, to disable issue / plugin editing from the panel, to restrict administrative access by IP or VPN) and to deploy a WAF that blocks redirections and suspicious requests. It is also appropriate to install file integrity monitoring solutions and change alerts in html access or in templates that are usually modified after intrusion. The ACSC newsletter itself includes commitment indicators (IoC) that can be integrated into detection and blocking rules: http: / / www.cyber.gov.au / about-us / view-all-content / alerts-and-advisories / clickfix-distributing-vidar-stealer-via-wordpress-targeting-Australian-infrastructure.

No less important is human defense: to train employees and customers to never stick commands on a terminal or PowerShell from a web instruction, and to promote the use of password administrators and multifactor authentication to limit the impact of credentials theft. Finally, establish a response playbook (isolate the host, flip memory, rotate exposed credentials, restore from reliable copies) and perform phishing and incident simulation exercises will reduce the exposure window against campaigns that depend on the user's impulsivity.

The combination of relatively simple techniques by the attacker (WordPress engagement + visual deception + a single PowerShell command) and modern memory concealment tools again shows that effective security requires multiple-layer controls: patching and hardening of web applications, strict enforcement restrictions on endpoints, visibility of command telemetry and continuous awareness campaigns. If you manage infrastructure or manage sites, act now: update, restrict and monitor may be the difference between a minor incident and a mass credentials leak.

Coverage

Related

More news on the same subject.