Thursday, February 27, 2025
HomeCyber AttackBeware Of Fake Captcha Attacks That Delivers Lumma Stealer Malware

Beware Of Fake Captcha Attacks That Delivers Lumma Stealer Malware

Published on

SIEM as a Service

Follow Us on Google News

In the past four weeks, a significant increase in malware distribution attempts via fake Captcha campaigns has been observed, targeting over 1.4 million users.

Lumma Stealer, a hazardous malware designed for data theft, is the primary payload being distributed. 

Cybercriminals leverage phishing emails, such as the recent GitHub Security Team impersonation, to lure victims to malicious websites hosting these malicious Captcha campaigns.

 email directs the user to a malicious website
 email directs the user to a malicious website

When users click on the malicious link, they are taken to a misleading Captcha screen to trick them into copying a malicious script to their clipboard. 

Once copied, the script is executed through instructions provided on the screen, typically involving the Win+R prompt or command line, which leads to the installation of malware on the user’s system, potentially compromising their personal information and system security.

Free Webinar on How to Protect Small Businesses Against Advanced Cyberthreats -> Free Registration

The malicious PowerShell script leverages a JavaScript-enabled button to trick users into copying the script to their clipboard.

Once executed, the script connects to a remote command-and-control server to download a malicious payload. 

Verification Steps
Verification Steps

It could be either the Lumma Stealer malware or an intermediary loader that ultimately drops the stealer onto the victim’s system.

The script’s primary goal is to steal sensitive information from the compromised machine.

The malicious script, initiated by the user, downloads a secondary PowerShell script from a GitHub repository.

This script communicates with a command-and-control server to retrieve the final Lumma Stealer payload disguised as a legitimate application named SysSetup.exe. 

After that, the payload is executed from a temporary directory, which may leave sensitive user data and system functions vulnerable to security breaches.

Download and execute additional PowerShell scripts. 
Download and execute additional PowerShell scripts. 

Recent data reveals a significant surge in fake Captcha campaigns, with Italy, Argentina, France, Spain, and Brazil experiencing the highest impact.

Over the past four weeks, these attacks have targeted millions of unique users worldwide. 

The heatmap illustrates the geographical spread of these campaigns, highlighting the regions most vulnerable to such malicious activities, underscoring the escalating threat posed by fake Captcha attacks and the urgent need for robust countermeasures.

The provided Indicators of Compromise (IoCs) reveal a malicious campaign that deploys the Lumma Stealer malware using a GitHub-based command-and-control (C&C) server and a PowerShell script. 

According to Gen Digital, to protect against such threats, users should exercise caution when dealing with unsolicited emails, avoid executing unknown scripts, enable two-factor authentication, and employ a reputable antivirus solution to detect and prevent malware infections.

Analyse AnySuspicious Links Using ANY.RUN's New Safe Browsing Tool: Try It for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Lotus Blossom Hacker Group Uses Dropbox, Twitter, and Zimbra for C2 Communications

The Lotus Blossom hacker group, also known as Spring Dragon, Billbug, or Thrip, has...

Squidoor: Multi-Vector Malware Exploiting Outlook API, DNS & ICMP Tunneling for C2

A newly identified malware, dubbed "Squidoor," has emerged as a sophisticated threat targeting government,...

Unpatched Vulnerabilities Attract Cybercriminals as EDR Visibility Remains Limited

Cyber adversaries have evolved into highly organized and professional entities, mirroring the operational efficiency...

Threat Actors Attack Job Seekers of Fortune 500 Companies to Steal Personal Details

In Q3 2024, Cofense Intelligence uncovered a targeted spear-phishing campaign aimed at employees working...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Lotus Blossom Hacker Group Uses Dropbox, Twitter, and Zimbra for C2 Communications

The Lotus Blossom hacker group, also known as Spring Dragon, Billbug, or Thrip, has...

Squidoor: Multi-Vector Malware Exploiting Outlook API, DNS & ICMP Tunneling for C2

A newly identified malware, dubbed "Squidoor," has emerged as a sophisticated threat targeting government,...

Unpatched Vulnerabilities Attract Cybercriminals as EDR Visibility Remains Limited

Cyber adversaries have evolved into highly organized and professional entities, mirroring the operational efficiency...