Hacked sites deliver Vidar infostealer to Windows users

A recent cybercrime campaign uses compromised WordPress websites to distribute the Vidar infostealer malware to Windows users. The attack employs fake CAPTCHA pages that trick victims into running malicious commands. The infection chain involves an HTA script, which downloads and executes a malicious MSI installer. This installer then deploys a GoLang loader that ultimately decrypts and loads the Vidar infostealer into memory. The campaign targets users in multiple countries, including Italy, France, the United States, the United Kingdom, and Brazil. The attackers inject malicious code into WordPress sites, which filters visitors and displays the fake CAPTCHA page to Windows desktop users.

Pulse ID: 69b91a3de2106fb26b3bff52
Pulse Link: https://otx.alienvault.com/pulse/69b91a3de2106fb26b3bff52
Pulse Author: AlienVault
Created: 2026-03-17 09:09:17

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#Brazil #CAPTCHA #CyberCrime #CyberSecurity #France #Golang #InfoSec #InfoStealer #Italy #Malware #OTX #OpenThreatExchange #RDP #UnitedKingdom #UnitedStates #Vidar #Windows #Word #Wordpress #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange