Skip to main content

Command Palette

Search for a command to run...

Fake CAPTCHA Deceiving Thousands of Users: The Truth Behind ClickFix

Updated
7 min read
Fake CAPTCHA Deceiving Thousands of Users: The Truth Behind ClickFix

As the ClickFix DNS scam had barely settled, a new campaign emerged in February 2026. This campaign also relies entirely on human factors for exploitation - a serious security weakness that no antivirus system can detect.

Refer to the previous article on the DNS campaign: "Thought It Was Fixing Errors, But Ended Up Installing Malware: ClickFix Returns with a Dangerous Trick."

By spoofing familiar verification mechanisms like CAPTCHA or browser security alerts, attackers trick users into executing malicious commands on their own computers without realizing the risk.

There are no suspicious downloads, no clear security warnings, and no need to exploit operating system vulnerabilities. Yet, a seemingly harmless verification action can instantly steal all user data.

Analyzing this campaign not only helps understand StealC's operational mechanism but also reflects the rising trend of fileless attacks, advanced social engineering, and the Malware-as-a-Service model, which are completely reshaping the current threat landscape.

Initial signs

The campaign begins when the victim visits a legitimate website that has been compromised (watering hole attack). This website is tasked with loading malicious JavaScript to display:

  • Fake CAPTCHA impersonating Cloudflare.

  • Notification: "Verify you are human."

The JavaScript code has been embedded in this website.

Here, users will be guided:

  • Press Win + R.

  • Paste the clipboard content.

  • Press Enter.

In reality, this is not a normal clipboard; instead, it contains a malicious PowerShell command. As mentioned in other ClickFix campaigns, the danger at this stage is:

  • Users unknowingly execute malware.

  • No file downloads appear.

  • Behavior resembles legitimate system operations.

This command downloads and executes a PowerShell script directly in memory, leaving no files on the disk. The ClickFix technique exploits users' trust, as they believe they are performing a legitimate verification, unaware that they are unknowingly installing malware themselves.

Details of the campaign

The campaign is designed as a multi-stage fileless attack chain, where each stage acts only as a loader for the next, allowing the malware to leave almost no trace on the disk.

Distribution Stage - ClickFix Social Engineering

As mentioned above, this stage aims to trick users into executing malware themselves. Users will be directed to visit the legitimate but compromised website "goveanrs.org"—the place where the attacker wants you to download the malicious JavaScript file. The script will then display a fake Cloudflare CAPTCHA.

PowerShell Execution Stage

After the command is launched above, PowerShell will execute:

  • Download the payload from the remote server.

  • Decode the obfuscated content.

  • Load shellcode directly into memory.

Another notable aspect of this stage is that no .exe files are created on the disk. This makes it nearly impossible for traditional antivirus systems to detect.

Shellcode Execution Stage

The payload downloaded is actually Position Independent Shellcode (PIC) - "cptch.bin.".

This shellcode:

  • Does not require a fixed address.

  • Runs in any memory region.

  • Prepares the environment for the next loader.

This can be seen as the transition from script to native malware execution.

Phase: PE Downloader

To fully understand this stage, let's break down each component. Each part is crucial for setting the stage for the subsequent steps.

PE (Portable Executable): PE is the executable file format on Windows (.exe, .dll, .sys), essentially a Windows program that can be used. Downloader: Its role is to connect to the Internet or download additional files from the attacker's server or a remote host. In malware, a downloader is often used to:

  • Download the second payload.

  • Download the backdoor.

  • Download ransomware or spyware.

Reflective: This is the most important part of this step. Simply put, it involves loading the PE directly into RAM without writing a file to the disk. Instead of "Download → save file.exe → run," it performs "Download → load directly into memory → execute." This technique is also known as:

  • Reflective DLL Injection

  • In-memory execution

  • Fileless execution

Stage: Deployment of StealC Malware

After tricking the victim into running PowerShell in the previous steps, this stage marks the transition from social engineering to actual system compromise. At this point, the malware begins operating entirely in memory (fileless execution).cution).

cptchbuild.bin (StealC Payload)

In this stage, all processes will be connected to the C2 server to receive commands: "91.92.240.190." The malware is injected into legitimate processes like svchost.exe or explorer.exe. This is not by chance, as it provides many advantages for the attacker:Hidden within trusted Windows processes.

  • Reduces the chance of EDR detection.

  • Blends in with system traffic.

Finally, StealC begins the data collection process:

  • Browser credentials

  • Cookie & session token

  • Crypto wallets

  • Steam accounts

  • Outlook credentials

  • System information

  • Screenshot desktop

One notable point is that StealC communicates with the control server using:

  • HTTP traffic

  • Base64 encoding

  • RC4 encryption

Conclusion

The ClickFix campaign highlights a significant shift in modern cyberattack tactics: attackers no longer need to exploit complex vulnerabilities or develop sophisticated exploits to infiltrate systems. Instead, they choose to exploit the most uncontrollable factor in any security model—the human element. By disguising themselves under familiar verification mechanisms like CAPTCHA or browser security notifications, ClickFix turns seemingly harmless actions into the starting point for an entire infection chain. When users execute the malicious command themselves, the line between legitimate behavior and attack is nearly erased, rendering traditional defense solutions less effective. In this context, security is no longer just a technological issue but becomes a matter of user awareness and behavior. Understanding how campaigns like ClickFix operate is a crucial step in building proactive defenses against an increasingly sophisticated generation of social engineering attacks.

Recommendations

  1. Do not perform CAPTCHA requests that require system actions.
  • A valid CAPTCHA:

    • Never request pressing Win + R.

    • Do not ask to paste content into Run or PowerShell.

    • Do not request running commands on the machine.

  • Please close the browser immediately.

  1. Be cautious of content automatically copied to the Clipboard.
  • Do not paste content if you are unsure what it is.

  • You can quickly check by pasting into Notepad before executing any commands.

  1. Limit the use of accounts with Administrator privileges.
  • Use a Standard User account for daily tasks.

  • Only use Administrator when absolutely necessary.

  1. Enable enhanced protection for the browser.
  • Enable Safe Browsing / Enhanced Protection

  • Do not save important passwords directly in the browser.

  • Use a separate Password Manager.

  • Regularly delete important login cookies.

  1. Use multi-factor authentication (MFA)
  • MFA can prevent attackers from logging into accounts.

  • Priority:

    • Authenticator App.

    • Hardware Security Key.

  1. Regularly update the operating system and software.
  • Always enable:

    • Windows Update.

    • Browser auto-update..

IOCs

  1. Malicious IP
  • 212.34.138[.]4

  • 138.124.66[.]23

  • 194.150.220[.]218

  • 45.155.69[.]224

  • 45.155.69[.]48

  • 193.33.195[.]32

  1. Domain
  • fw96.data-api-cloud-program.in[.]net

  • bagginess78.cloud-api-system-control.in[.]net

  • algorithm.in[.]net

  • frost-tree-nord.base-blockchain-ground-false.in[.]net

  • woosh-duck.agri-clock-core-sn.in[.]net

  • carlessclapped[.]com

  • download2392.mediafire[.]com

  • download2390.mediafire[.]com

  1. Hash
  • 36b7f4fef5e984a5d60352ef7661ba0bf809feebd749ba1d5ab8d90bdf7feda0

  • 556fdc9932afc5f176803ae67dbc3b9e54c611f1b720e1140ec540e2d151396a

  • 4bfdb2a8f9f3cf83c656c7f25352d46c46a58f5b685a407cf7210aecdc1464f7

  • 9287520644ae33bd6655555fff86b4f026c7f3d1d838ead02b676172450bbb27

Refer to

  1. How ClickFix Opens the Door to Stealthy StealC Information Stealer

  2. Fake CAPTCHAs, Smart Contracts, Real Risk: Unpacking a ClickFix Campaign Delivering SectopRAT · Vega Blog

More from this blog

F

FPT IS Security

761 posts

Dedicated to providing insightful articles on cybersecurity threat intelligence, aimed at empowering individuals and organizations to navigate the digital landscape safely.