Monday, April 14, 2025
HomeCyber AttackClickFix Malware Infect Website Visitors Via Hacked WordPress Websites

ClickFix Malware Infect Website Visitors Via Hacked WordPress Websites

Published on

SIEM as a Service

Follow Us on Google News

Researchers have identified a new variant of the ClickFix fake browser update malware distributed through malicious WordPress plugins.

These plugins, disguised as legitimate tools, inject malicious JavaScript code into compromised websites, tricking users into installing malware. 

The malware uses blockchain technology to obtain malicious payloads, exploiting social engineering tactics to deceive victims. 

- Advertisement - Google News

Over 6,000 websites worldwide have been affected by this recent variant, which spreads malware through fake plugins like “Advanced User Manager” and “Quick Cache Cleaner.”

The malicious actors behind these plugins leverage automation to create many seemingly legitimate plugins with fake metadata. These plugins inject malicious scripts into WordPress pages by exploiting the wp_enqueue_scripts functionality.  

Protecting Your Networks & Endpoints With UnderDefense MDR – Request Free Demo

Plugin code 
Plugin code 

The actors also add a redundant wp_head hook that seems to disable other wp_head actions, but this serves no practical purpose.

Interestingly, the .DS_Store files found within the fake plugin directories are identical and can potentially be used as Indicators of Compromise (IoCs) for detection purposes.

Attackers injected malicious scripts with identical hashes into various plugins, as these scripts loaded an Ethereum library and interacted with a smart contract on Binance Smart Chain. 

Example of ClickFix fake Chrome browser update pop-up dialog.
Example of ClickFix fake Chrome browser update pop-up dialog.

Browser Update pop-ups to visitors based on browser information. 

Some compromised sites now have seemingly benign, empty scripts with recent modification dates, suggesting a partial cleanup attempt by the attackers.  

Attackers launched a ClickFix campaign in June 2024, injecting malicious JavaScript into over 6,000 WordPress sites, which was achieved by either compromising existing plugins or deploying fake plugins disguised as popular ones. 

repository was created on August 23, 2024
repository was created on August 23, 2024

These fake plugins, often with “Classic” added to their names, contained a single file injecting the script using the high-priority “wp_head” hook.

The attackers also started using disposable Github and BitBucket repositories to host their payloads, making detection and takedown more challenging.  

The attack involved a series of automated actions executed by a threat actor using stolen WordPress admin credentials.

The actor logged into a vulnerable website and immediately uploaded a malicious plugin, which was activated and then used to distribute fake browser updates.  

 executable JavaScript code
 executable JavaScript code

The attack was highly efficient, with each session lasting only a few minutes. The attackers likely acquired WordPress admin credentials through brute force attacks, phishing campaigns, or by exploiting malware on the website owners’ computers.

They then used these credentials to install malicious plugins on the websites. 

According to GoDaddy, using legitimate credentials for malicious purposes mirrors past attacks where FTP credentials were stolen and used to compromise websites.

The fake plugins may have been installed from a botnet of infected computers, acting as proxies to hide the attackers’ true origin.

Run private, Real-time Malware Analysis in both Windows & Linux VMs. Get a 14-day free trial with ANY.RUN!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Smishing Campaign Hits Toll Road Users with $5 Payment Scam

Cybersecurity researchers at Cisco Talos have uncovered a large-scale smishing campaign targeting toll road...

IBM Aspera Faspex Flaw Allows Injection of Malicious JavaScript in Web UI

A significant security vulnerability has been identified in IBM Aspera Faspex 5, a popular...

Chinese APT Group Targets Ivanti VPN Vulnerabilities to Breach Networks

In a concerning report from cybersecurity firm TeamT5, it has been revealed that a...

VMware ESXi 8.0 Update 3e Is Now Free — Here’s What’s New

VMware has announced that ESXi 8.0 Update 3e, the latest version of its industry-leading hypervisor,...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Smishing Campaign Hits Toll Road Users with $5 Payment Scam

Cybersecurity researchers at Cisco Talos have uncovered a large-scale smishing campaign targeting toll road...

IBM Aspera Faspex Flaw Allows Injection of Malicious JavaScript in Web UI

A significant security vulnerability has been identified in IBM Aspera Faspex 5, a popular...

Chinese APT Group Targets Ivanti VPN Vulnerabilities to Breach Networks

In a concerning report from cybersecurity firm TeamT5, it has been revealed that a...