A new method of distributing Lumma Stealer malware has been uncovered by cybersecurity company CloudSEK, which targets Windows users through deceptive human verification pages. This technique, initially discovered by Unit42 at Palo Alto Networks, has prompted investigation into it being potentially leveraged to deliver various types of malicious software.
How The Attack Works
Threat actors create phishing sites hosted on various providers, often utilising content delivery networks. The user visits the fake verification page. These sites present users with a fake Google CAPTCHA page. Upon clicking the “Verify” button, users are tricked into following these unusual instructions:
Open the Run dialogue (Win+R).
Press Ctrl+V to paste copied content.
Press Enter.
Unknown to the user, this action executes a hidden JavaScript function that copies a base64-encoded PowerShell command to the clipboard. The PowerShell command, when executed, downloads the Lumma Stealer malware from a remote server, compromising the victim’s system. The downloaded malware then establishes connections with attacker-controlled domains, posing a risk to users and their data.
"This new tactic is particularly dangerous because it plays on users' trust in widely recognised CAPTCHA verifications, which they encounter regularly online. By disguising malicious activity behind what seems like a routine security check, attackers can easily trick users into executing harmful commands on their systems,” said Anshuman Das, security researcher at CloudSEK.
Key Observations
Attackers use base64 encoding and clipboard manipulation to evade detection. According to CloudSEK, fake human verification pages have been hosted on platforms like Amazon S3 and CDNs.
The malware may download additional components, complicating detection and analysis. Although this campaign primarily targets distributing Lumma Stealer malware, it has the potential to deceive users into downloading various types of malicious files onto their Windows devices.
Recommendations
CloudSEK made recommendations for users and organisations to circumvent the malware attack. This includes educating employees and users about the new social engineering tactic, particularly the danger of copying and pasting unknown commands.
Organisations should deploy robust endpoint protection solutions capable of detecting and blocking PowerShell-based attacks. They should also monitor network traffic for suspicious connections to newly registered or uncommon domains, and regularly update and patch systems to reduce vulnerabilities exploited by Lumma Stealer.
RECOMMENDED FOR YOU

Explained: The 'Fake Wedding' Trend Viral On Social Media And Why Indians Are Going Gaga


Shoppers Beware: These Amazon Prime Day Sale Domains May Be Fake, Steal Your Data

Sebi Allows Six Month Window To Re-Lodge Old Share Transfer Requests


Window Frame Of SpiceJet Aircraft Dislodges Mid-Air; No Impact On Passengers' Safety: Airline
