2025-03-19
Attackers Learn to CAPTCHA Phish
Researchers from HP Wolf Security have observed increasing use of counterfeit CAPTCHA checks to lead users into "ClickFix" phishing attacks. These rely on "the user's own complacency" in completing the test to trick them into pasting and executing a PowerShell script in the Windows "Run" prompt that downloads and installs a malware payload, often from a legitimate cloud hosting service with a reputable IP address, thereby circumventing security alerts. Microsoft recently published a report observing a faked CAPTCHA overlaid on a site mimicking Booking.com to deliver the same type of attack. Sekoia Threat Detection & Research (TDR) has observed the spread of ClearFake malware using faked Google reCAPTCHA and Cloudflare Turnstile verifications as lures. In early March 2025, Arctic Wolf warned that "widely used physical therapy video site HEP2go" had been compromised and was being used to target the healthcare sector with ClickFix using a counterfeit CAPTCHA. Suggested mitigations and preventions of this technique are thorough awareness training on signs of phishing, and administrative limits on the clipboard and the "Run" command if needed.
Editor's Note
Never underestimate the craftiness of evildoers. That said, the red flag was being asked to run a set of commands on your device. That's a stop, think, stop again, think again moment before declaring it too dodgy and leaving the site. Unfortunately for far too many people, they never enter the stop think stage, so I suspect there is a good ROI for the evildoer.

Curtis Dukes
Talked about this issue last year (https://isc.sans.edu/diary/31282) and it has only become more common since then. Controlling powershell script execution has been important even before that as attackers have used various tricks to execute malicious powershell scripts for years. Nothing fundamentally new here.

Johannes Ullrich
CAPTCHA as bait, ranks right up there with "Click here to get the latest version of Adobe Reader."

William Hugh Murray
A CAPTCHA that entices you to run copy/pasted content should be an immediate red flag. The attack tells the user to hit the Win+R key combination to run the pasted script. Consider implementing a GPO which prevents the run command when Win+R is pressed.

Lee Neely
This one is interesting; it's the 2025 version of the IRC chat channel telling you to type rm -Rf / in a terminal to fix your issues. It's many decades later, and this is still a vector. This time, however, it's a phishing lure disguised as a captcha. Maybe in 5 years, ChatGPT will let me know that rm -Rf / fixes all my problems; In the meantime, this will be an educational lesson for some that you can't just copy/paste into a terminal. Unfortunately, I am not sure how we can protect against this one.

Moses Frost
Read more in
HP: Threat Insights Report (PDF)
Microsoft: Phishing campaign impersonates Booking .com, delivers a suite of credential-stealing malware
Sekoia: ClearFakeÕs New Widespread Variant: Increased Web3 Exploitation for Malware Delivery
Arctic Wolf: Healthcare Sector Targeted by Fake CAPTCHA Attack on HEP2go to Deliver Infostealer Malware
Krebs on Security: ClickFix: How to Infect Your PC in Three Easy Steps
SCWorld: Phony CAPTCHA checks trick targets to download malware
SCWorld: ÔClickFixÕ campaign targets hospitality firms with phishing attacks
The Hacker News: ClearFake Infects 9,300 Sites, Uses Fake reCAPTCHA and Turnstile to Spread Info-Stealers