Cybersecurity experts have warned about a new threat involving fake CAPTCHA pages that appear to be normal verification tests, but are actually used to deceive users and execute malware on their devices.
How the Attack Works
A fake CAPTCHA page appears while browsing, asking the user to execute shortcuts on the keyboard such as Windows + R to open the run window, then Ctrl + V to paste a pre-prepared command, and finally pressing Enter.
These steps lead to the download of malware known as Stealthy StealC Information Stealer, capable of stealing sensitive data such as passwords, browser data, email accounts, gaming accounts, and cryptocurrency wallets.
The attack relies on social engineering to trick users into executing commands voluntarily, without the need to download traditional executable files.
Prevention Tips
Avoid executing any system commands you are asked to perform via the browser when fake CAPTCHA pages appear.
Always check the website address before interacting with any verification test.
Use antivirus software and regularly update your system to reduce vulnerability exploitation.
Digital awareness: Do not assume that all CAPTCHA pages are real, even if they look similar to those on legitimate sites.
This type of attack highlights the importance of caution while browsing and demonstrates how social engineering can make the user themselves a tool for spreading malware.