From FakeCaptcha to Infostealer: Easy prevention steps for FakeCaptcha technique

From FakeCaptcha to Infostealer: Easy prevention steps for FakeCaptcha technique

This article written in collaboration with my colleague and friend Iago

From FakeCaptcha to Infostealer

What is the fake captcha attack vector?

For the last few weeks we have seen a high incidence among our customers of an attack vector known as FakeCaptcha or Clickfix. It’s currently on the top lists of most active malware families.

This technique is mainly used by infostealers like Lumma and delivered via malvertising campaigns and redirectors.

Tries to convince users that they are presented with a legitimate captcha to prove their are not a bot with a deceptive Pop-Up. Displays some variant of the typical message “I’m not a robot”.

Fake Captcha pop-up

Classic captcha pop-up used in the attack.

Then victims are guided through 3 steps to ‘verify’ they are humans. What is really happening is they are copying the malicious PowerShell script from the attacker’s page and running it via the Run dialog in Windows.

  1. Press Windows Key + R: This opens the Run dialog box.

  2. Press Control + V: Pastes the preloaded code from the website’s virtual clipboard

  3. Press Enter: Executes the pasted command. This triggers the download and execution of the initial stage payload.

Fake captcha verification steps presented to potential victims Verification Steps

Fake captcha verification steps presented to potential victims

There are already plenty of articles explaining in detail this attack technique, we want to focus on prevention and will now explain some mitigation steps to protect your environment from this technique and avoid user to ever being able to execute the initial payload.

Mitigation

We present 2 different options to prevent users from following the fake verification steps that end up on the initial payload being executed, blocking the attack at a very early stage.

Via Group Policy

It is possible to use GPOs to mitigate the actions required by the threat actors:

  • Open Group Policy editor with the gpedit.msc
  • Browse to User Configuration -> Administrative Templates -> Start Menu and Taskbar.
GPO
  • Once there, double click over Remove Run menu from Start menu, select enable and apply
GPO

This modification will remove the “run command” from Start Menu along with some other options to open that dialog box:


Allows you to remove the Run command from the Start menu, Internet Explorer, and Task Manager.

If you enable this setting, the following changes occur:

(1) The Run command is removed from the Start menu.
(2) The New Task (Run) command is removed from Task Manager.
(3) The user will be blocked from entering the following into the Internet Explorer Address Bar:

- A UNC path: \\<server>\<share>
- Accessing local drives: e.g., C:
- Accessing local folders: e.g., \temp>

Also, users with extended keyboards will no longer be able to display the Run dialog box by pressing the Application key (the key with the Windows logo) + R.

After changes are applied, if someone tries to open Run command dialog from Start Menu with Windows Key + R, they will get the following message:

Dialog box

Via Registry Key

  • Open the Registry Editor.
  • Browse to HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer
  • Add a new value as follows:
Fake Captcha pop-up
  • This will have the same effect as the GPO and will prevent users from opening the Run Command dialog box.

Conclusion

Fake-Captcha or ClickFix technique has proved to be very effective on initial infections for infostealer malware. This poses a significant risk to organizations. These mitigation steps are effective and relatively easy to apply and shouldn’t affect the daily work of regular users that are the more likely to fall for these fake captcha pop-ups.

References:

https://blog.checkpoint.com/security/march-2025-malware-spotlight-fakeupdates-and-ransomhub-ransomware-group-dominate-cyber-threats/

https://www.microsoft.com/en-us/security/blog/2025/03/06/malvertising-campaign-leads-to-info-stealers-hosted-on-github/

https://www.bleepingcomputer.com/news/security/clickfix-attack-delivers-infostealers-rats-in-fake-bookingcom-emails/

https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/manage/group-policy/group-policy-management-console

https://support.microsoft.com/en-us/windows/system-configuration-tools-in-windows-f8a49657-b038-43b8-82d3-28bea0c5666b

Authors:

Iago, cibermanchego

ATT&CK  soc 

See also