Australia Warns ClickFix Attacks Spreading Vidar Stealer

ClickFix Vidar – Australia’s ACSC warns of ClickFix social-engineering attacks that use malicious PowerShell prompts via compromised WordPress sites to spread Vidar Stealer.
A fresh malware campaign is using a familiar trick to get victims to run commands they never meant to execute, and Australia’s cyber watchdog is urging organizations to act fast.
The Australian Cyber Security Centre (ACSC) has issued a warning about an ongoing operation that distributes Vidar Stealer through ClickFix. a social engineering technique designed to pressure users into running malicious commands.. In these attacks. victims are lured into interactions that look legitimate. then persuaded to execute PowerShell instructions that bypass typical security expectations.
ClickFix works by presenting targets with convincing prompts—often disguised as fake CAPTCHA pages or “browser verification” screens—hosted on compromised or malicious websites.. Rather than relying on exploit chains. the method depends on user behavior. steering people into copying and manually running attacker-provided commands.. In the campaign described by the ACSC, those instructions commonly involve PowerShell to deliver info-stealing malware.
The advisory points to Australian organizations and infrastructure entities as being targeted through compromised WordPress websites that redirect visitors to malicious payloads.. When users land on these sites, they are shown a bogus Cloudflare verification or CAPTCHA-style prompt.. The prompt then directs them to copy and manually execute a PowerShell command on their system—an action that leads directly to a Vidar Stealer infection.
The ACSC’s warning frames this as ClickFix-associated activity that leverages WordPress-hosted infrastructure to spread Vidar Stealer malware.. That detail matters: it shifts attention from “just” suspicious webpages to the broader supply chain of websites that may already be compromised through themes. add-ons. or other WordPress components.
Vidar Stealer itself is an established information-stealing malware family that began appearing in late 2018. later evolving into a malware-as-a-service (MaaS) operation.. According to the ACSC. criminals have favored it for practical reasons: it is relatively cost-effective. easier to deploy. and capable of broad data theft.. The malware focuses on browser passwords and cookies. cryptocurrency wallet data. autofill information. and system details that can help attackers adapt their next steps.
The advisory notes that Vidar Stealer has previously been associated with ClickFix intrusions. alongside distribution routes that include “Windows fixes. ” short-form video content such as TikTok posts. and projects hosted on GitHub.. Last year, the developer released an updated version with upgraded capabilities, reinforcing that the operation continues to refine its tooling.
One operational detail in the campaign increases the challenge for defenders: the malware deletes its executable after it launches on the infected device and then runs from system memory.. The effect is to reduce forensic artifacts that investigators might rely on when trying to trace infections back to a specific binary or file.
Vidar Stealer also obtains its command-and-control (C2) address using “dead-drop” URLs. pulling instructions through public services such as Telegram bots and Steam profiles.. While that approach has been used before. the ACSC highlights that it remains effective. illustrating why threat actors continue to blend into widely used online platforms.
To reduce the risk from this type of attack, the ACSC recommends limiting PowerShell execution and deploying application allow-listing.. The underlying logic is straightforward: if an organization restricts or tightly controls how PowerShell can run. social engineering prompts that depend on users launching PowerShell commands become far less damaging.
For WordPress administrators, the advisory stresses practical hygiene steps.. Organizations are urged to apply available security updates for themes and add-ons. and to remove any themes or plugins that are not in use.. That guidance targets common persistence points in WordPress environments, where outdated components can become an entry point for compromise.
The ACSC’s bulletin includes indicators of compromise (IoCs) for these attacks. Those IoCs are intended to help organizations set up defenses or detect potential intrusions by comparing observed activity against known malicious patterns linked to this ClickFix and Vidar Stealer activity.
For many teams. the most urgent takeaway is not just that Vidar Stealer is the payload. but that the infection pathway starts with convincing verification screens that push users into executing attacker-provided commands.. That’s why technical controls—like PowerShell restriction and allow-listing—need to work alongside training and incident-ready browsing policies. particularly for environments where employees might encounter unexpected CAPTCHA-style prompts.
It also underscores a growing reality for defenders: website compromise is often the delivery mechanism. even when the final impact looks like a desktop infection.. Keeping WordPress components current and trimming unused plugins can meaningfully reduce exposure. while centralized visibility into suspicious redirects and unusual verification prompts can help spot attempts before they result in widespread infections.
Finally. the “memory-first” behavior of Vidar Stealer. combined with dead-drop C2 techniques. suggests attackers are actively optimizing for evasion and resilient communications.. Organizations that treat detection as an ongoing process—using the provided IoCs and reviewing whether endpoint controls align with the ACSC’s recommendations—stand a better chance of breaking the chain before stolen credentials and wallet data can be harvested.
ACSC warning ClickFix Vidar Stealer WordPress compromise PowerShell restriction info-stealing malware cybersecurity