Malware - Hacked Sites Deliver Vidar Infostealer to Users
Basically, hacked websites are tricking users into installing malware that steals personal information.
Hacked WordPress sites are tricking Windows users into installing the Vidar infostealer. This malware steals sensitive data, posing a significant risk to personal information. Stay cautious and protect your devices from these evolving threats.
What Happened
Cybercriminals have recently launched a campaign delivering the Vidar infostealer through compromised WordPress sites. Instead of exploiting vulnerabilities, they use deceptive tactics to convince users to run malicious commands. The campaign primarily employs fake CAPTCHA pages that mimic legitimate security checks, tricking users into executing harmful scripts.
These attacks have been detected across multiple countries, including Italy, France, the United States, the United Kingdom, and Brazil. Victims visiting these hacked sites are met with a screen resembling Cloudflare’s verification page, which prompts them to run a command that initiates the malware installation process.
Who's Being Targeted
The primary targets of this campaign are Windows users who visit compromised sites. The attackers exploit the trust users place in familiar web security measures. By presenting fake verification messages, they lure victims into executing commands that lead to the installation of the Vidar infostealer. This malware is notorious for harvesting sensitive information, including browser-stored passwords and cryptocurrency wallet details.
The use of fake CAPTCHA pages has become a prevalent tactic in cybercrime, evolving since 2024. This technique preys on users' urgency and curiosity, making it easier for attackers to execute their plans without technical exploits.
Signs of Infection
Once the Vidar infostealer is installed, users may not notice any immediate signs of infection. The malware operates stealthily, collecting data from the infected system without drawing attention. Key indicators of infection include:
- Unusual browser behavior or slow performance.
- Unexpected prompts for sensitive information.
- New or unknown applications appearing on the system.
Because Vidar communicates with remote servers, it can exfiltrate data quietly, making it crucial for users to remain vigilant and monitor their systems for any suspicious activity.
How to Protect Yourself
To safeguard against such attacks, users should adopt several best practices:
- Be cautious: If a website prompts you to run commands, pause and assess the situation. Legitimate sites do not require such actions.
- Verify independently: Always check the authenticity of commands or instructions from websites. Consult official documentation or trusted sources before taking action.
- Keep software updated: Regularly update your operating system and security software to protect against known vulnerabilities.
- Use security tools: Consider using browser extensions that warn against malicious sites or actions, such as the Malwarebytes Browser Guard.
By staying informed and cautious, users can reduce the risk of falling victim to these sophisticated malware delivery methods. Remember, cybercriminals rely on deception, so awareness is your best defense.
Malwarebytes Labs