Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Malware Uses Fake CAPTCHAs to Steal Information

New Malware Uses Fake CAPTCHAs to Steal Information

Posted on February 24, 2026 By CWS

A newly identified malware campaign is using counterfeit CAPTCHA pages to deceive users and deploy a sophisticated information-stealing tool. This campaign, first detected in early 2026, exhibits similarities to the ClickFix operation, which targeted restaurant booking systems in mid-2025.

Social Engineering Tactics Enhanced

The perpetrators have advanced their social engineering techniques, making it easier for them to bypass conventional security defenses and gain initial access to victims’ systems. The attack begins when a user visits a compromised site that displays a fraudulent CAPTCHA verification page. This page manipulates the user into copying a harmful PowerShell command to their clipboard and executing it manually.

By exploiting human interaction, this approach, known as the “ClickFix” technique, circumvents security mechanisms that typically examine file downloads rather than manual command executions. The command initiates a download from the attacker’s infrastructure, specifically the IP address 91.92.240.219, and verifies user actions via specific API calls before proceeding.

Detailed Analysis of Infection Process

Upon execution, the malicious script launches a multi-stage infection designed to extract sensitive information. The malware targets a broad range of applications, including over twenty-five web browsers, cryptocurrency wallets like MetaMask, and enterprise VPN configurations. Cybersecurity analysts have observed that the campaign checks for virtual environments and active security tools before data exfiltration.

The impact is profound, as attackers gain access to critical credentials and financial resources, enabling them to monetize compromised accounts or infiltrate deeper into corporate networks.

Stealth Techniques and Persistence

The malware employs advanced process injection methods to remain undetected on infected devices. Following the initial PowerShell execution, it retrieves a shellcode file named cptch.bin from the attacker’s servers. Analysts identified an operational security error when the attacker used the variable $finalPayload, which was flagged by Microsoft Defender. This shellcode, generated using the Donut framework, executes directly in memory.

To maintain persistence, the attackers alter the RunMRU registry key, ensuring the malicious PowerShell command is re-executed upon system startup. This persistence strategy grants long-term access and involves rotating payload filenames, such as cptchbuild.bin, to evade hash-based blocking mechanisms.

Organizations are advised to educate users about the dangers of executing commands from web pages. Security teams should monitor for unusual PowerShell activity and specific registry changes. Implementing endpoint detection rules that flag clipboard data reading by browser processes can help identify this threat early.

Cyber Security News Tags:CAPTCHA, cyber attack, Cybersecurity, data breach, information stealer, Malware, PowerShell, security tools, social engineering, virtual environments

Post navigation

Previous Post: GitHub Codespaces Vulnerability Exploited for Repository Control
Next Post: Effective Identity Risk Management in Modern Enterprises

Related Posts

Ransomware 2.0 How AI-Powered Attacks Are Evolving Ransomware 2.0 How AI-Powered Attacks Are Evolving Cyber Security News
Hackers Abuse Microsoft Teams to Gain Remote Access With PowerShell-based Malware Hackers Abuse Microsoft Teams to Gain Remote Access With PowerShell-based Malware Cyber Security News
Judge Demands OpenAI to Release 20 Million Anonymized ChatGPT Chats in AI Copyright Dispute Judge Demands OpenAI to Release 20 Million Anonymized ChatGPT Chats in AI Copyright Dispute Cyber Security News
Inside the Leaks that Exposed the Hidden Infrastructure Behind a Ransomware Operation Inside the Leaks that Exposed the Hidden Infrastructure Behind a Ransomware Operation Cyber Security News
Critical Dell Storage Manager Vulnerabilities Let Attackers Compromise System Critical Dell Storage Manager Vulnerabilities Let Attackers Compromise System Cyber Security News
New Analysis Uncovers LockBit 5.0 Key Capabilities and Two-Stage Execution Model New Analysis Uncovers LockBit 5.0 Key Capabilities and Two-Stage Execution Model Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Lazarus Group Deploys Medusa Ransomware in Cyber Attacks
  • Diesel Vortex Targets Logistics Sector, Steals Credentials
  • Taiwan Cyber Firm Confirms Exploitation by Chinese Hackers
  • Effective Identity Risk Management in Modern Enterprises
  • New Malware Uses Fake CAPTCHAs to Steal Information

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Lazarus Group Deploys Medusa Ransomware in Cyber Attacks
  • Diesel Vortex Targets Logistics Sector, Steals Credentials
  • Taiwan Cyber Firm Confirms Exploitation by Chinese Hackers
  • Effective Identity Risk Management in Modern Enterprises
  • New Malware Uses Fake CAPTCHAs to Steal Information

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News