February 20, 2026 Source: The Hacker News 3 min read · 597 words

ClickFix Campaign Abuses Compromised Sites to Deploy MIMICRAT Malware

Кампанія ClickFix зловживає скомпрометованими сайтами для розгортання шкідливого ПЗ MIMICRAT

Attackers have found a new favorite playground: your trusted websites. Cybersecurity researchers just uncovered an active ClickFix campaign that's weaponizing compromised legitimate sites to deploy a previously unknown remote access trojan called MIMICRAT, according to The Hacker News.

This isn't your typical malware distribution network.

The Breach

The campaign operates with surprising sophistication. Attackers have compromised legitimate websites across multiple industries and geographic regions, transforming them into unwitting accomplices in a multi-stage malware delivery operation. The victims aren't the site owners themselves—though they're certainly affected. The real targets are users who visit these poisoned properties expecting to download software or access legitimate services.

And here's what makes this particularly nasty: ClickFix exploits a social engineering angle that's proven devastatingly effective. Users see what appears to be a legitimate browser notification or error message, which prompts them to click for "support" or "fixes." Those clicks lead them down a path that eventually deposits MIMICRAT onto their machines. The attackers have essentially turned compromised websites into permission factories, making malware installation feel like a normal part of the browsing experience.

So why does this matter? Because the victims likely had no idea the sites were compromised.

Under the Hood

MIMICRAT is the centerpiece here, and it's a tool nobody's documented before. That alone should raise eyebrows in the cybersecurity community. The malware functions as a remote access trojan, meaning once installed, it gives attackers direct control over an infected system.

The delivery mechanism is where the sophistication really shines. Rather than a single-stage attack, the ClickFix campaign uses multiple compromised sites in sequence. Each stage handles a different part of the infection chain—initial compromise, payload staging, final malware execution. This kind of distributed approach makes it harder for security researchers to trace the operation back to its source and harder for defenders to block the entire chain.

The attackers are clearly thinking about operational security. Using different compromised sites means if one domain gets blacklisted or shut down, the operation can continue from others. It's resilience through redundancy.

The Fallout

Once MIMICRAT gets its hooks in, the damage potential is enormous. Remote access trojans aren't picky about what they steal or destroy. We're talking credential harvesting, data exfiltration, lateral movement through corporate networks, or even complete system takeover. In a business environment, this becomes a nightmare scenario.

The geographic and industry diversity of the compromised sites suggests this campaign is casting a wide net.

Frankly, this should have been caught sooner. The fact that multiple legitimate websites across different sectors got compromised without triggering faster takedowns speaks to some serious gaps in web infrastructure monitoring. When a trusted site turns into a malware vector, that's a systemic problem that ripples across the entire ecosystem.

Protecting Yourself

First: be skeptical of unsolicited browser notifications asking you to take action. Legitimate browser warnings exist, but they're typically specific and don't require you to click external links. When in doubt, close the notification and navigate directly to the official source.

Second, keep your systems patched. Most of these campaigns exploit known vulnerabilities or rely on outdated software. Running the latest versions of your browser and operating system eliminates low-hanging fruit.

Third, use endpoint detection and response tools if you're in a corporate environment. These solutions catch behavior patterns that indicate malware execution, even when attackers use novel trojans like MIMICRAT. And consider web filtering solutions that can identify and block access to known malicious domains.

Finally, maintain offline backups of critical data. If you do get infected despite precautions, you'll at least have a recovery path that doesn't involve negotiating with attackers.

Read original article →

Concerned about your project's security? Run an automated pentest with AISEC — AI-powered scanner with expert verification. Go to dashboard →