Skip to content

Security Advisory: Fake CAPTCHA Scams are Tricking Users into Running Malicious Commands

Listen: Security Advisory: Fake CAPTCHA Scams are Tricking Users into Running Malicious Commands
3:38

We are seeing a growing attack technique where threat actors use fake “Verify you’re human” CAPTCHA pages to trick users into running malicious commands on their own systems.

This technique, tracked by Microsoft and multiple security vendors as ClickFix, relies on user action rather than a software exploit. Once executed, it commonly leads to credential theft, session hijacking, or remote access malware.

Learn what this attack looks like, why it works, and what to do if it occurs in your environment.

What This Attack Looks Like

The page often appears legitimate at first.

Common indicators include:

  • A normal-looking website that suddenly displays a CAPTCHA or security check
  • Instructions telling the user to:
    • Click a button labeled Copy, or copy a highlighted “verification code”
    • Press Windows + R
    • Paste the copied text into the Run dialog
    • Press Enter to “verify”

That action is the attack.

Legitimate CAPTCHA checks never require users to:

  • Open Run
  • Open PowerShell
  • Open Terminal
  • Open Command Prompt
  • Copy or paste commands

If a page asks for any of these steps, assume it is malicious.

Why This Works

ClickFix succeeds because it exploits behavior, not vulnerabilities.

Contributing factors include:

  • Users are conditioned to click through prompts quickly
  • Frequent security dialogs have created verification fatigue
  • The attacker never executes malware directly
  • The user runs the payload on the attacker’s behalf

Once executed, the impact often includes:

  • Information-stealing malware
  • Compromised credentials and sessions
  • Remote access capabilities
  • Follow-on account compromise

Because execution is user-driven, detection may occur after the initial action.

What To Do If You See This

If you encounter a CAPTCHA or security prompt that asks you to copy and paste anything:

  • Close the browser tab immediately
  • Do not paste anything into Run, PowerShell, Terminal, or Command Prompt
  • Do not continue on the site
  • If you arrived via an ad or pop-up, do not return

Treat the page as hostile and move on.

If You Already Ran the Command

Treat this as a potential security incident.

Immediate actions:

  • Disconnect the affected device from the internet
  • Stop logging into email, portals, banking, or any sensitive systems from that device
  • Do not attempt self-cleanup or run additional commands

Next steps:

  • Reset passwords from a known-clean device
  • Review recent sign-in and authentication activity for suspicious access
  • Check for signs of credential theft, persistence, or remote access
  • Validate the endpoint using your security tooling or with assistance from your IT or security provider

If you cannot confidently confirm the device is clean, reimage it using a known-good base image.

Assume compromise until proven otherwise.

Prevention Reminders to Share with Users

  • Real CAPTCHAs never ask you to copy or paste commands
  • Any “verification” requiring system tools is a scam
  • Many of these attacks originate from ads or manipulated search results
  • Slow down and navigate directly to trusted sites

User awareness remains one of the most effective defenses against this technique.

Why This Matters

ClickFix attacks are increasing because they bypass traditional exploit-based defenses and rely on human action.

Organizations that prepare for user-executed malware scenarios are better positioned to contain incidents quickly, reduce blast radius, and prevent follow-on account compromise.

If users recognize this pattern early, the attack often fails entirely.

Stay safe and stay vigilant.
– ISI Cybersecurity Team

Related Posts