Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Hackers Exploit WordPress Sites to Power Next-Gen ClickFix Phishing Attacks

0
Medium
Published: Wed Oct 08 2025 (10/08/2025, 16:43:00 UTC)
Source: The Hacker News

Description

A sophisticated phishing campaign exploits compromised WordPress sites by injecting malicious JavaScript into theme files, redirecting visitors to fraudulent ClickFix phishing pages that mimic legitimate browser verification challenges. The injected code uses remote loaders and hidden iframes to deliver payloads without direct downloads, leveraging techniques like cache smuggling to evade detection. Attackers employ the IUAM ClickFix Generator phishing kit to create customizable, convincing landing pages that deploy malware such as DeerStealer and Odyssey Stealer, targeting multiple platforms including macOS. The campaign’s stealthy approach bypasses traditional defenses by using browser cache to store malicious payloads and executing them via obfuscated PowerShell commands without internet communication. This lowers the barrier for cybercriminals to conduct large-scale, multi-platform attacks. European organizations running WordPress sites are at risk, especially those with outdated themes or weak administrative controls. Mitigation requires proactive theme and plugin management, continuous monitoring for unauthorized changes, and enhanced detection of phishing infrastructure. Countries with high WordPress adoption and significant digital commerce sectors, such as Germany, the UK, France, and the Netherlands, are particularly vulnerable. Given the medium complexity but impactful nature of the attack, the suggested severity is high due to potential data theft, credential compromise, and operational disruption.

AI-Powered Analysis

AILast updated: 10/09/2025, 01:05:26 UTC

Technical Analysis

This threat involves a malicious campaign targeting WordPress websites by injecting harmful JavaScript code into theme-related files, specifically the functions.php file. The injected code references legitimate services like Google Ads to evade detection but acts as a remote loader by sending HTTP POST requests to attacker-controlled domains (e.g., brazilc[.]com). This domain responds with dynamic payloads, including JavaScript files hosted on porsasystem[.]com, which perform user redirection to phishing pages mimicking Cloudflare’s browser verification challenges. These phishing pages are generated using the IUAM ClickFix Generator kit, enabling attackers to create highly customizable and convincing fake verification pages that trick users into executing malicious commands. The phishing kit also manipulates clipboard content and detects victim operating systems to tailor malware delivery, including information stealers like DeerStealer and Odyssey Stealer (targeting macOS). A novel technique called cache smuggling is employed, where malicious payloads are preloaded into the browser cache disguised as innocuous files (e.g., JPEG images) and executed locally via obfuscated PowerShell scripts without downloading additional files or communicating with command-and-control servers. This stealth approach complicates detection and mitigation. The campaign exploits common WordPress vulnerabilities such as outdated themes and weak administrative controls, enabling persistent access and widespread infection. The threat landscape is exacerbated by the availability of commercial phishing kits that lower the technical barrier for attackers, facilitating large-scale, multi-platform phishing and malware campaigns.

Potential Impact

European organizations using WordPress for their websites, especially those in e-commerce, media, and public sectors, face significant risks from this campaign. The injected JavaScript can redirect legitimate visitors to phishing sites that harvest credentials or deliver malware, potentially leading to data breaches, credential theft, and unauthorized access to corporate networks. The use of sophisticated evasion techniques like cache smuggling and obfuscated PowerShell scripts increases the likelihood of prolonged undetected infections, complicating incident response efforts. The multi-platform nature of the malware, including targeting macOS systems, broadens the scope of affected endpoints within organizations. Disruption of customer trust and brand reputation is a likely consequence if visitors are compromised through legitimate corporate websites. Additionally, the campaign’s ability to bypass common security controls such as antivirus and web filters raises the risk of successful exploitation. The financial and operational impact can be substantial, including regulatory penalties under GDPR if personal data is compromised. The threat also poses risks to supply chain security if compromised WordPress sites serve as vectors for further attacks.

Mitigation Recommendations

1. Immediately audit all WordPress installations for unauthorized modifications, focusing on theme files like functions.php and other core components. 2. Enforce strict update policies for WordPress core, themes, and plugins to eliminate known vulnerabilities exploited by attackers. 3. Implement file integrity monitoring solutions to detect unexpected changes in website files in real-time. 4. Harden WordPress administrative access by enforcing strong, unique passwords, multi-factor authentication, and limiting login attempts. 5. Conduct regular security scans using specialized tools that detect malicious JavaScript injections and anomalous administrator accounts. 6. Employ web application firewalls (WAFs) with custom rules to block suspicious HTTP POST requests and known malicious domains such as brazilc[.]com and porsasystem[.]com. 7. Monitor DNS and network traffic for connections to known phishing infrastructure and TDS domains associated with this campaign. 8. Educate website administrators and users about phishing tactics, especially the use of fake browser verification pages and clipboard manipulation. 9. Use endpoint detection and response (EDR) tools to identify obfuscated PowerShell execution and suspicious cache usage indicative of cache smuggling techniques. 10. Collaborate with hosting providers and security vendors to rapidly remediate compromised sites and share threat intelligence.

Need more detailed analysis?Get Pro

Technical Details

Article Source
{"url":"https://thehackernews.com/2025/10/hackers-exploit-wordpress-themes-to.html","fetched":true,"fetchedAt":"2025-10-09T01:05:06.256Z","wordCount":1551}

Threat ID: 68e70a4432de7eb26af4e138

Added to database: 10/9/2025, 1:05:08 AM

Last enriched: 10/9/2025, 1:05:26 AM

Last updated: 10/9/2025, 3:11:05 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats