Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025

Meta adds support to logy for Android and iOS users

June 19, 2025

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Fake CAPTCHA campaign spreads Lumma Stealer in multi-pronged attacks
Global Security

Fake CAPTCHA campaign spreads Lumma Stealer in multi-pronged attacks

AdminBy AdminJanuary 23, 2025No Comments3 Mins Read
Fake CAPTCHA Campaign
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


January 23, 2025Ravi LakshmananPhishing / Malware

A fake CAPTCHA campaign

Cybersecurity researchers are turning their attention to a new malware campaign that uses fake CAPTCHA checks to deliver the infamous Lamma information stealer.

“The campaign is global, and Netskope Threat Labs is tracking victims in Argentina, Colombia, the United States, the Philippines, and other countries around the world,” said the report shared with The Hacker News.

“The campaign also spans multiple industries, including healthcare, banking and marketing, with the telecommunications industry having the largest number of targeted organizations.”

The attack chain begins when the victim visits a compromised website that directs them to a fake CAPTCHA page that instructs the site visitor to copy and paste a command into the Windows Run prompt that uses a proprietary mshta.exe binary to download and execute the HTA file from a remote server.

Cyber ​​security

It should be noted that a previous iteration of this technique, widely known as Click Fixinvolved executing a Base64-encoded PowerShell script to cause a Lumma Stealer infection.

The HTA file in turn executes a PowerShell command to run the next stage payload, a PowerShell script that unpacks a second PowerShell script responsible for decoding and loading the Lumma payload, but not before taking steps to bypass the Windows antimalware scanning interface (AMSI) in an attempt to avoid detection.

“By downloading and running malware in this way, an attacker avoids browser-based protections because the victim will perform all necessary actions outside the context of the browser,” Froes explained.

“Lumma Stealer operates using a malware-as-a-service (MaaS) model and has been very active in recent months. By using different delivery methods and payloads, it makes detection and blocking of such threats more difficult, especially when abusing user interactions within the system.”

A fake CAPTCHA campaign

As recently as this month, Lumma was also distributed via about 1,000 fake domains impersonating Reddit and WeTransfer, which redirect users to download password-protected archives.

These archive files contain an AutoIT dropper called SelfAU3 Dropper, which then launches the theft, respectively to researcher Sekoia crep1x. At the beginning of 2023. threat subjects loan funds a similar technique to create over 1,300 domains masquerading as AnyDesk to promote the Vidar Stealer malware.

The development comes as Barracuda Networks in detail an updated version of the Phishing-as-a-Service (PhaaS) toolkit known as The 2FA tycoon which includes advanced features to “interfere with, derail, and otherwise thwart attempts by security tools to confirm its malicious intent and inspect its web pages.”

Cyber ​​security

These include using legitimate—possibly compromised—email accounts to send phishing emails, and taking a number of steps to prevent analysis by detecting automated security scripts, listening for keystrokes that suggest web inspection, and disabling right-click context menus.

There have also been social engineering-based credential harvesting attacks that use avatar provider Gravatar to impersonate various legitimate services, such as AT&T, Comcast, Eastlink, Infinity, Kojeko, and Proton Mail.

“Using Gravatar’s Profiles as a Service, attackers create convincing fake profiles that mimic legitimate services, tricking users into revealing their credentials,” said SlashNext Field CTO Stephen Kowsky. said.

“Instead of conventional phishing attempts, attackers adapt their fake profiles to resemble legitimate services, which they impersonate through services that are often not known or secured.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025

Meta adds support to logy for Android and iOS users

June 19, 2025

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025

Meta adds support to logy for Android and iOS users

June 19, 2025

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025

Meta adds support to logy for Android and iOS users

June 19, 2025

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.