Fake CAPTCHA pages used to spread infostealer malware

Magnifying glass enlarging the word 'malware' in computer machine code
(Image credit: Shutterstock)

  • Security researchers spot campaign to distribute Lumma Stealer malware
  • A fake CAPTCHA page comes with a JavaScript that copies malicious code into the clipboard
  • To "solve" the fake CAPTCHA, users are told to paste the code in CMD and run it

Fake CAPTCHA pages are being used to trick victims into downloading and running the Lumma infostealer malware.

Security researchers at Guardio Labs recently discovered a major malicious operation, targeting millions of people, called “DeceptionAds”.

The campaign abuses two legitimate services, the Monetag ad network and BeMob, a cloud-based performance tracking platform. It starts with fake ads, promoting things that appeal to the host site’s audience, such as fake offers, downloads, or different services - with pirate streaming and software platforms apparently among the most common themes.

Vane Viper

When the victim clicks on the ad, they are redirected to a fake CAPTCHA page through the BeMob cloaking service. This makes moderation difficult, since BeMob is a legitimate service, and as such, is not being removed from the Monetag ad network by default.

"By supplying a benign BeMob URL to Monetag's ad management system instead of the direct fake captcha page, the attackers leveraged BeMob's reputation, complicating Monetag's content moderation efforts," Nati Tal, head of Guardio Labs, said in a writeup.

The CAPTCHA page comes with a piece of JavaScript code that copies a malicious PowerShell one-line command into the clipboard. However, the victim still needs to paste that code into the CMD and run it, which is where the CAPTCHA “solution” comes in. To solve the CAPTCHA, users are required to bring up the Windows Run dialog, press CTRL+V (paste), and hit enter.

This runs the command that downloads and executes Lumma Stealer. The group behind the attack is called Vane Viper.

Lumma is a popular infostealer in the underground community. It is capable of stealing a wide range of sensitive information , including cryptocurrency wallets, browser data, email credentials, financial information, FTP client data, and system information.

When Monetag and BeMob were notified of the campaign, both companies stepped in to address the issue. Monetag removed 200 accounts, while BeMob terminated the campaign in four days.

Via BleepingComputer

You might also like

TOPICS

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
A hacker typing on a MacBook laptop with code on the screen.
This devious phishing site repurposes legitimate web elements like CAPTCHA pages for malware distribution
Robotic hand clicking on captcha 'I am not a robot'.
Fake CAPTCHAs are being used to spread malware - and we only have ourselves to blame
Someone checking their credit card details online.
Hackers use CAPTCHA scam in PDF files on Webflow CDN to get past security systems
A concept image of someone typing on a computer. A red flashing danger sign is above the keyboard and nymbers and symbols also in glowing red surround it.
Fake Reddit sites found pushing Lumma Stealer malware
DeepSeek
Fake DeepSeek installers are infecting your device with dangerous malware
Robotic hand clicking on captcha 'I am not a robot'.
Double clicking danger - experts warn just two clicks can let attackers steal your accounts
Latest in Security
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Veeam urges users to patch security issues which could allow backup hacks
UK Prime Minister Sir Kier Starmer
The UK releases timeline for migration to post-quantum cryptography
Representational image depecting cybersecurity protection
Cisco smart licensing system sees critical security flaws exploited
Latest in News
L-mount alliance
Sirui joins L-Mount Alliance to deliver its superb budget lenses for Leica, DJI, Sigma and Panasonic cameras
Security padlock and circuit board to protect data
Trust in digital services around the world sees a massive drop as security worries continue
Samuel and Romy standing very close together in A24's Babygirl movie
Everything new on Max in April 2025, including A24's Babygirl and The Last of Us season 2
An AMD Radeon RX 9070 XT made by Sapphire on a table with its retail packaging
AMD’s secret weapon against Nvidia seems to be stock – way more RX 9070 GPUs are rumored to be hitting shelves than RTX 5000 models
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
Seth Milchick and Kier Eagan's animatronic speaking in Severance season 2 episode 10
Apple TV+ announces Severance has been renewed for season 3 after that devastating finale