HP Warns Fake CAPTCHAs Are Spreading Malware in Latest Threat Report


Warning: Trying to access array offset on value of type bool in /var/www/vhosts/easocialmedia.com/httpdocs/wp-content/themes/movedo/includes/grve-header-functions.php on line 322

HP Warns Fake CAPTCHAs Are Spreading Malware in Latest Threat Report

HP Warns Fake CAPTCHAs Are Spreading Malware in Latest Threat Report 150 150 Administrator

HP Inc. has issued its latest HP Threat Insights Report, warning that cybercriminals are increasingly using fake CAPTCHA verification tests to trick users into infecting themselves with malware. The findings, announced during the company’s annual Amplify Conference, highlight how attackers are exploiting users’ growing “click tolerance” resulting from frequent multi-step authentication processes.

The report, based on data from millions of endpoints running HP Wolf Security, details real-world cyberattacks observed between October and December 2024. According to HP, the “CAPTCHA Me If You Can” campaigns directed users to attacker-controlled websites, prompting them to complete fraudulent authentication challenges. Victims unknowingly ran malicious PowerShell commands that installed the Lumma Stealer remote access trojan (RAT) on their devices.

HP Wolf Security researchers also identified additional threats, including attackers spreading an open source RAT known as XenoRAT. This malware features surveillance capabilities such as microphone and webcam capture. Using social engineering techniques, attackers convinced users to enable macros in Word and Excel documents, allowing them to exfiltrate data, log keystrokes, and control devices.

Another campaign outlined in the report involved attackers delivering malicious JavaScript code hidden inside Scalable Vector Graphic (SVG) images. When opened in web browsers, these images deployed seven different malware payloads, including RATs and infostealers. Attackers further utilized obfuscated Python scripts to install the malware, capitalizing on Python’s growing popularity among developers, particularly in the AI and data science fields.

“A common thread across these campaigns is the use of obfuscation and anti-analysis techniques to slow down investigations,” said Patrick Schläpfer, Principal Threat Researcher in the HP Security Lab. “Even simple but effective defence evasion techniques can delay the detection and response of security operations teams, making it harder to contain an intrusion. By using methods like direct system calls, attackers make it tougher for security tools to catch malicious activity, giving them more time to operate undetected – and compromise victims endpoints.”

HP Wolf Security’s approach of isolating threats inside secure containers provided insights into the latest cybercriminal techniques. The company reports that HP Wolf Security customers have interacted with over 65 billion email attachments, web pages, and downloaded files without any reported breaches.

The report found that at least 11% of email threats identified by HP Sure Click bypassed one or more email gateway scanners. Executables were the most common malware delivery method at 43%, followed by archive files at 32%.

“Multi-step authentication is now the norm, which is increasing our ‘click tolerance.’ The research shows users will take multiple steps along an infection chain, really underscoring the shortcomings of cyber awareness training,” said Dr. Ian Pratt, Global Head of Security for Personal Systems at HP Inc. “Organizations are in an arms race with attackers—one that AI will only accelerate. To combat increasingly unpredictable threats, organizations should focus on shrinking their attack surface by isolating risky actions – such as clicking on things that could harm them. That way, they don’t need to predict the next attack; they’re already protected.”

Bild: Envato

Dieser Artikel, "HP Warns Fake CAPTCHAs Are Spreading Malware in Latest Threat Report“ wurde erstmals am veröffentlicht Trends für kleine Unternehmen

    EA-SOZIALE MEDIEN

    Wir wissen, was funktioniert und die besten Ergebnisse bringt!

    Soziale Medien – Design, Marketing

    Arbeitszeit : 7:00 – 20:00 Uhr
    Die Anschrift : Cevizli, Zuhal Street, Ritim Istanbul A1 Block
    Nr: 46 / 1 Wohnung Nr: 188 Maltepe / Istanbul
    Telefon : +90 539 669 6587

    Datenschutzeinstellungen

    Wenn Sie unsere Website besuchen, speichert sie möglicherweise Informationen über Ihren Browser von bestimmten Diensten, normalerweise in Form von Cookies. Hier können Sie Ihre Datenschutzeinstellungen ändern. Es ist erwähnenswert, dass das Blockieren einiger Arten von Cookies Ihre Erfahrung auf unserer Website und den Diensten, die wir anbieten können, beeinträchtigen kann.

    Unsere Website verwendet Cookies, hauptsächlich von Drittanbieterdiensten. Definieren Sie Ihre Datenschutzeinstellungen und/oder stimmen Sie unserer Verwendung von Cookies zu.