This devious phishing site repurposes legitimate web elements like CAPTCHA pages for malware distribution




  • Phishing campaign mimics CAPTCHA to deliver hidden malware commands
  • PowerShell command hidden in verification leads to Lumma Stealer attack
  • Educating users on phishing tactics is key to preventing such attacks

CloudSek has uncovered a sophisticated method for distributing the Lumma Stealer malware which poses a serious threat to Windows users.

This technique relies on deceptive human verification pages that trick users into unwittingly executing harmful commands.



Source link

Leave a Reply

Your email address will not be published. Required fields are marked *