Contact

Fake CAPTCHA Lures Victims: Lumma Stealer Abuses Clipboard and PowerShell

NetmanageIT OpenCTI - opencti.netmanageit.com

Fake CAPTCHA Lures Victims: Lumma Stealer Abuses Clipboard and PowerShell



SUMMARY :

A new malware campaign using fake CAPTCHA pages to deliver Lumma Stealer has been identified. The attack leverages ClickFix, a deceptive tactic involving phishing and fake reCAPTCHA pages impersonating Cloudflare verification. The infection chain begins with a fake CAPTCHA page tricking victims into running malicious commands copied to their clipboard. This launches mshta.exe, which executes a VBScript to run PowerShell commands. These commands download and execute a malicious payload, which acts as a loader for Lumma Stealer. The attack uses various evasion techniques, including anti-debugging measures and code injection. The stealer captures screen data, extracts clipboard information, and exfiltrates stolen data through multiple command-and-control servers.

OPENCTI LABELS :

lumma stealer,clickfix,fake captcha


Open in NetmanageIT OpenCTI Public Instance with below link!


Use public read only username and password on login page.

NOTE : Use Public READ only user credentials on login page banner.


Fake CAPTCHA Lures Victims: Lumma Stealer Abuses Clipboard and PowerShell