Sunday, January 26, 2025
HomeCyber AttackBeware Of Fake Captcha Attacks That Delivers Lumma Stealer Malware

Beware Of Fake Captcha Attacks That Delivers Lumma Stealer Malware

Published on

SIEM as a Service

Follow Us on Google News

In the past four weeks, a significant increase in malware distribution attempts via fake Captcha campaigns has been observed, targeting over 1.4 million users.

Lumma Stealer, a hazardous malware designed for data theft, is the primary payload being distributed. 

Cybercriminals leverage phishing emails, such as the recent GitHub Security Team impersonation, to lure victims to malicious websites hosting these malicious Captcha campaigns.

 email directs the user to a malicious website
 email directs the user to a malicious website

When users click on the malicious link, they are taken to a misleading Captcha screen to trick them into copying a malicious script to their clipboard. 

Once copied, the script is executed through instructions provided on the screen, typically involving the Win+R prompt or command line, which leads to the installation of malware on the user’s system, potentially compromising their personal information and system security.

Free Webinar on How to Protect Small Businesses Against Advanced Cyberthreats -> Free Registration

The malicious PowerShell script leverages a JavaScript-enabled button to trick users into copying the script to their clipboard.

Once executed, the script connects to a remote command-and-control server to download a malicious payload. 

Verification Steps
Verification Steps

It could be either the Lumma Stealer malware or an intermediary loader that ultimately drops the stealer onto the victim’s system.

The script’s primary goal is to steal sensitive information from the compromised machine.

The malicious script, initiated by the user, downloads a secondary PowerShell script from a GitHub repository.

This script communicates with a command-and-control server to retrieve the final Lumma Stealer payload disguised as a legitimate application named SysSetup.exe. 

After that, the payload is executed from a temporary directory, which may leave sensitive user data and system functions vulnerable to security breaches.

Download and execute additional PowerShell scripts. 
Download and execute additional PowerShell scripts. 

Recent data reveals a significant surge in fake Captcha campaigns, with Italy, Argentina, France, Spain, and Brazil experiencing the highest impact.

Over the past four weeks, these attacks have targeted millions of unique users worldwide. 

The heatmap illustrates the geographical spread of these campaigns, highlighting the regions most vulnerable to such malicious activities, underscoring the escalating threat posed by fake Captcha attacks and the urgent need for robust countermeasures.

The provided Indicators of Compromise (IoCs) reveal a malicious campaign that deploys the Lumma Stealer malware using a GitHub-based command-and-control (C&C) server and a PowerShell script. 

According to Gen Digital, to protect against such threats, users should exercise caution when dealing with unsolicited emails, avoid executing unknown scripts, enable two-factor authentication, and employ a reputable antivirus solution to detect and prevent malware infections.

Analyse AnySuspicious Links Using ANY.RUN's New Safe Browsing Tool: Try It for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

INE Security Alert: Expediting CMMC 2.0 Compliance

INE Security, a leading global provider of cybersecurity training and certifications, today announced a...

Subaru’s STARLINK Connected Car’s Vulnerability Let Attackers Gain Restricted Access

In a groundbreaking discovery on November 20, 2024, cybersecurity researchers Shubham Shah and a...

Android Kiosk Tablets Vulnerability Let Attackers Control AC & Lights

A security flaw found in Android-based kiosk tablets at luxury hotels has exposed a...

CISA Releases Six ICS Advisories Details Security Issues

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued six Industrial Control Systems (ICS)...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

INE Security Alert: Expediting CMMC 2.0 Compliance

INE Security, a leading global provider of cybersecurity training and certifications, today announced a...

Android Kiosk Tablets Vulnerability Let Attackers Control AC & Lights

A security flaw found in Android-based kiosk tablets at luxury hotels has exposed a...

CISA Releases Six ICS Advisories Details Security Issues

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued six Industrial Control Systems (ICS)...