Hackers are abusing fake CAPTCHA pages on compromised or malicious websites to trick Windows users into installing malware on their systems. These CAPTCHA pages mimic familiar “prove you’re human” checks, often styled like Cloudflare or other widely used services, but instead of a normal visual challenge they prompt users to manually execute seemingly simple actions—such as pressing Windows + R, pasting a copied command, and hitting Enter—to complete the verification. What victims don’t realize is that these steps execute a hidden PowerShell command that initiates the malware installation process. (GBHackers Security)
The primary payload delivered through this technique is the StealC information-stealer malware, which has an advanced, in-memory infection chain that avoids traditional downloads. Once executed, StealC can harvest sensitive data including browser credentials, cryptocurrency wallets, gaming accounts, email logins like Outlook, system information, and even screenshots, forwarding this stolen data back to a command-and-control (C2) server. The use of a clipboard hijack and social engineering to bypass typical security prompts makes the attack especially dangerous because technical protections like safe-browsing warnings or download blockers are often sidestepped entirely. (eSecurity Planet)
This campaign, often referred to under the social engineering name ClickFix, highlights how attackers are increasingly turning trusted user behaviors and interfaces against victims. Because it relies on social manipulation rather than exploiting a software vulnerability, traditional defensive tools can struggle to detect it before damage occurs. Experts recommend stricter controls on script execution, enforced application policies in Windows, close monitoring of unusual remote commands, and, most importantly, educating users to be extremely wary of any site that asks them to run commands as part of a CAPTCHA. (eSecurity Planet)