Key Takeaways
- The Australian Cyber Security Centre (ACSC) has identified a widespread Vidar Stealer campaign that uses the ClickFix social‑engineering technique to trick users into executing malware.
- Vidar Stealer targets Windows systems, harvesting credentials, credit‑card data, cryptocurrency wallets, browser history, MFA tokens, and other sensitive information.
- Attackers compromise WordPress sites, then redirect visitors to malicious pages that display fake CAPTCHA prompts, convincing users to run harmful commands or download payloads.
- The malware employs defense‑evasion tactics such as self‑deletion of its initial executable and residence in memory, making detection and removal difficult.
- Mitigation focuses on restricting unauthorized execution, keeping software patched, limiting clipboard access from browsers, applying timely updates, and enforcing phishing‑resistant multi‑factor authentication.
Overview of the Vidar Stealer Campaign
The Australian Cyber Security Centre (ACSC) issued a security alert on May 7 warning organizations about an active Vidar Stealer operation that leverages the ClickFix social‑engineering method. Vidar Stealer is an infostealer that has been in circulation since 2018 and primarily infects Microsoft Windows endpoints. Its purpose is to exfiltrate a broad range of sensitive data, including usernames, passwords, credit‑card numbers, cryptocurrency‑wallet keys, browser histories, and multi‑factor authentication (MFA) tokens. The campaign is not limited to a single industry; it hits infrastructure and organizations across multiple sectors, reflecting a broad‑scope threat landscape.
How ClickFix Is Used in the Attack Chain
ClickFix is a social‑engineering tactic that persuades victims to run malicious commands or download harmful payloads voluntarily, thereby bypassing many traditional security controls that rely on blocking unknown executables. In this campaign, attackers first compromise legitimate WordPress websites. Those compromised sites act as launchpads that redirect unsuspecting visitors to attacker‑controlled pages designed specifically for ClickFix exploitation. The redirection is seamless to the user, who believes they are still interacting with a trusted site.
The Fake CAPTCHA Trick
On the malicious landing pages, users encounter a counterfeit CAPTCHA verification prompt that mimics the appearance of legitimate human‑verification widgets. The prompt instructs the user to copy and paste a string of text into a command‑line interface (such as PowerShell or CMD) or to execute a script. Because the user voluntarily types the command, many endpoint protection solutions that focus on blocking unauthorized file downloads do not intervene, allowing the malicious code to run with the user’s privileges.
Initial Infection and Payload Delivery
When the user follows the fake CAPTCHA instructions, a malicious script or executable is downloaded and executed on the victim’s machine. This initial payload often acts as a dropper that retrieves the Vidar Stealer binary from a remote command‑and‑control (C2) server. The dropper may also perform reconnaissance, gathering basic system information to tailor the subsequent stealer module to the victim’s environment.
Vidar Stealer’s Capabilities
Once installed, Vidar Stealer operates as a comprehensive infostealer. It harvests login credentials stored in browsers, email clients, and FTP applications; extracts credit‑card details from autofill fields; pulls cryptocurrency‑wallet private keys and seed phrases; captures browser history, cookies, and saved form data; and can even steal MFA tokens generated by authenticator apps or hardware tokens. The breadth of data collected enables attackers to compromise accounts, conduct financial fraud, and facilitate further intrusions.
Defense‑Evasion Techniques
To avoid detection, Vidar Stealer employs several evasion strategies. After execution, the initial dropper often self‑deletes, leaving only the stealer component running in memory. By residing primarily in RAM rather than writing persistent files to disk, the malware reduces its footprint and hinders traditional antivirus scans that rely on file‑based signatures. Additionally, the malware may use process injection, obfuscation, and encrypted communications with its C2 infrastructure to further conceal its activity.
Impact on Organizations
Because Vidar Stealer targets a wide array of sensitive information, successful infections can lead to credential theft, financial loss, intellectual‑property compromise, and reputational damage. The theft of MFA tokens is particularly concerning, as it can undermine a core defense that many organizations rely on to protect privileged accounts. Moreover, the use of compromised WordPress sites as distribution points means that even organizations with strong internal security may be exposed if they or their partners maintain vulnerable web assets.
ACSC’s Recommended Mitigations
The ACSC alert outlines a series of defensive measures designed to reduce the risk of Vidar Stealer and similar ClickFix‑based attacks. First, organizations should restrict the execution of unauthorized or unapproved applications, including downloaded executables and scripts, through application‑whitelisting or endpoint‑protection policies. Second, keeping WordPress core, plugins, themes, browsers, and scripting engines fully patched eliminates known vulnerabilities that attackers exploit to compromise sites. Third, limiting or blocking clipboard write access from browser‑based JavaScript and untrusted web content prevents malicious scripts from surreptitiously copying commands into the user’s clipboard for execution. Fourth, ensuring operating systems receive the latest security updates closes gaps that malware might use for privilege escalation or persistence. Fifth, applying patches promptly to internet‑facing endpoints and servers reduces the attack surface exposed to external threats. Finally, enforcing phishing‑resistant MFA—such as FIDO2 security keys or certificate‑based authentication—helps protect accounts even if credentials are stolen.
Practical Steps for Implementation
To operationalize the guidance, security teams can deploy endpoint detection and response (EDR) solutions that monitor for abnormal script execution, memory‑only processes, and suspicious command‑line activity. Network‑level controls, such as URL filtering and web‑gateway inspection, can block connections to known malicious domains used for C2 communication. Regular vulnerability scanning of web assets, combined with automated patch‑management workflows, helps maintain WordPress sites in a secure state. User‑awareness training should emphasize the dangers of interacting with unexpected CAPTCHA prompts and the importance of verifying the legitimacy of any request to run commands or scripts. By combining technical controls with informed personnel, organizations can markedly lower their likelihood of falling victim to the Vidar Stealer campaign.
Conclusion
The Vidar Stealer campaign illustrates how attackers blend reliable web‑infrastructure compromises with clever social‑engineering tactics like ClickFix to evade traditional defenses. The malware’s broad data‑theft capabilities, memory‑resident execution, and self‑deletion mechanisms make it a formidable threat. However, a layered defense—centered on application control, timely patching, clipboard restrictions, up‑to‑date systems, and strong, phishing‑resistant authentication—can effectively mitigate the risk. Organizations that adopt the ACSC’s recommendations and reinforce them with vigilant monitoring and user education will be better positioned to detect, prevent, and respond to this evolving threat.

