SECURITY NOTICE: Fake CAPTCHA

Fake CAPTCHA Sites Hijack Clipboard to Install Malware

We recently came across a concerning trend: malicious websites posing as CAPTCHA verification pages are hijacking users’ clipboards to trick them into installing information-stealing malware. (Malwarebytes first documented this risk in March 2025.)


If your organization or team uses browsers regularly—and especially if non-technical staff may get redirected to unfamiliar sites—this threat deserves serious attention.


How the Attack Works

Here’s the typical flow of the scam:

  1. A user visits a website (often promising media, articles, download links, etc.).
  2. The site presents a fake “prove you’re not a robot / CAPTCHA” prompt.
  3. Once the user interacts (e.g. clicking a checkbox), the site quietly copies a dangerous command to the clipboard using JavaScript.
  4. The site then instructs the user to:
  5. Open the Windows Run dialog (Win + R).
  6. Press Ctrl + V to paste
  7. Hit Enter
  8. What appears pasted is only the tail of a longer command. The hidden portion—obfuscated or disguised—invokes a system tool (like mshta.exe) to fetch and execute malicious payloads (e.g. encoded PowerShell scripts).
  9. The result: the user essentially executes malware themselves, often an information stealer (such as Lumma Stealer or SecTopRAT).


Because the user performed the “installation” themselves via copy-paste, many security defenses (which focus on blocking downloads) may not catch this behavior.


Why This Is Dangerous

  • It exploits trust and user action rather than relying solely on drive-by downloads.
  • Victims may see only innocuous-looking text (or partial commands), masking the malicious content.
  • The attacker uses legitimate system utilities (like mshta) to carry out the payload, making detection harder.
  • Many users won’t question “paste + run” instructions, especially if they think it's part of a legit verification process.


Recommended Safeguards & Best Practices

To reduce the risk of falling victim to clipboard hijacking attacks, consider adopting the following:

  • Never follow unexplained website instructions or paste commands you don’t fully understand. Cybercriminals often disguise malicious code as harmless text to trick users into executing malware themselves.
  • Use a reputable anti-malware or endpoint protection platform to automatically detect and block suspicious domains, scripts, and clipboard-hijacking attempts.
  • Install browser security extensions or content blockers to stop malicious JavaScript and prevent access to known dangerous websites before they can load.
  • Choose browsers that enforce strict clipboard permissions and isolation, ensuring websites can’t write to or read from your clipboard without your explicit approval.
  • Use a dedicated “sandboxed” browser for untrusted or high-risk sites to contain potential infections and prevent cross-site compromise of your main environment.
  • Train employees—especially non-technical team members—on the dangers of “copy and paste” commands from unverified sources. Informed users are one of the strongest defenses against social engineering attacks.
October 10, 2025
Understanding Business Email Compromise (BEC)
By Kordel Eberly August 17, 2025
Welcome to the Cyber Cold War
fish hook
By Eberly Systems September 20, 2024
We're all in the same boat trying to avoid cybercrime! Here's our top ways to identify a potential phishing attempt.
By Eberly Systems September 10, 2024
Focus on integrating with new team members and new customers
By Eberly Systems July 9, 2024
Keeping you abreast of security news
By Eberly Systems May 2, 2024
West Lawn, PA, May 2, 2024 — Eberly Systems , the West Lawn-based managed IT services and managed voice provider, today announces its acquisition of the Lebanon-based LYLAB Technology Solutions. Eberly Systems seeks to further a movement of people who are motivated and equipped to make a difference in their world through their daily work. They believe in building lasting partnerships based on trust and transparency while delivering industry-leading solutions to support and protect critical business assets. Driven by the principles of people, excellence, integrity, and stewardship, the team prides itself on partnering with companies to securely, reliably, and efficiently grow their businesses. “We cannot be more excited to join forces with the LYLAB team,” comments Kordel Eberly, Eberly Systems President & Founder. “ The integration of LYLAB Technology Solutions into Eberly Systems solidifies our commitment to providing small businesses with unparalleled service and support. We’re proud of this new opportunity to carefully design and manage the IT infrastructure and systems of even more local businesses and communities.” The acquisition solidifies the Eberly Systems commitment to supporting businesses in Lebanon County. Merging the two teams together as one entity offers the collective team the benefit of enhancing capabilities, refining processes, and extending reach to better serve the evolving needs of small businesses in the surrounding area. Future plans include expanding their presence into Lancaster County.
computer help with IT support
By Eberly Systems January 16, 2024
A trusted MSP can be your invaluable strategic partner.
By Eberly Systems January 2, 2024
These 5 key features of Office 365 Business Premium make it essential for businesses to have.
set of keys
By Eberly Systems December 19, 2023
Eberly Systems has been hard at work over the last year in a concerted effort to enhance the security posture of our clients’ information technology environments. Here are the quarterly updates.
construction site
By Eberly Systems July 3, 2023
After years of steady growth, the workforce at a construction development and property management company was becoming increasingly frustrated by disorganized data. Eberly Systems deployed a hybrid cloud storage solution for efficiency and secure data access.