<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Captcha — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/captcha/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 18:15:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/captcha/feed.xml" rel="self" type="application/rss+xml"/><item><title>Potential Fake CAPTCHA Phishing Attack via Command Line</title><link>https://feed.craftedsignal.io/briefs/2024-01-fake-captcha/</link><pubDate>Wed, 03 Jan 2024 18:15:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-fake-captcha/</guid><description>This rule detects potential fake CAPTCHA phishing attacks on Windows systems where victims are tricked into copying and pasting malicious commands into the Windows Run dialog box.</description><content:encoded><![CDATA[<p>This detection identifies potential fake CAPTCHA phishing attacks targeting Windows users. The attack relies on compromised websites with browser injects that display fake CAPTCHAs or fake error messages. The user is then instructed to copy and paste a malicious command into the Windows Run dialog box, which executes via PowerShell, Cmd, or Mshta. This technique deceives users into running arbitrary code disguised as a legitimate verification or fix, potentially leading to malware installation or system compromise. The rule focuses on identifying suspicious command-line activity originating from explorer.exe, and containing CAPTCHA-related keywords, indicating a high likelihood of a phishing attempt. This activity started being tracked around August 2025 and continues to be a relevant threat.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>User visits a compromised website displaying a fake CAPTCHA or error message.</li>
<li>The website instructs the user to copy a command containing CAPTCHA-related keywords.</li>
<li>The user pastes the command into the Windows Run dialog box.</li>
<li>Explorer.exe launches either PowerShell, cmd.exe, or mshta.exe.</li>
<li>The launched process executes the malicious command.</li>
<li>The malicious command may download and execute further payloads or scripts.</li>
<li>These payloads can lead to malware installation or system compromise.</li>
<li>The attacker gains unauthorized access or control over the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful execution of these attacks can lead to system compromise, data theft, or malware installation. Victims are tricked into running malicious commands, bypassing traditional security measures. The impact ranges from individual system infections to potential network-wide breaches if the initial foothold is used for lateral movement. A successful attack could result in significant data loss, financial damages, and reputational harm.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Potential Fake CAPTCHA Phishing Attack via PowerShell&rdquo; to your SIEM to detect suspicious command-line activity related to fake CAPTCHAs.</li>
<li>Deploy the Sigma rule &ldquo;Potential Fake CAPTCHA Phishing Attack via Mshta&rdquo; to your SIEM to detect suspicious command-line activity related to fake CAPTCHAs.</li>
<li>Investigate any alerts generated by these rules by examining the command line arguments, parent processes, and network connections.</li>
<li>Enable Sysmon process creation logging to provide detailed information about process executions.</li>
<li>Implement user awareness training to educate users about the dangers of copying and pasting commands from untrusted websites.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>phishing</category><category>captcha</category><category>social-engineering</category><category>windows</category></item></channel></rss>