The post Fake CAPTCHAs, crypto disappeared in 3 minutes with the PowerShell trick appeared on BitcoinEthereumNews.com. A wave of fake CAPTCHA is leading users to execute PowerShell on Windows, triggering the crypto thief Lumma Stealer. According to an analysis by DNSFilter, 23 interactions in 72 hours were recorded, with 17% of visitors following the instructions displayed on the screen (DNSFilter). Immediate result: crypto wallets emptied and funds laundered in less than 3 minutes. According to the data collected by the incident response teams that analyzed the blocked pages between August 14 and 17, 2025, the operational window to prevent the first transfer of funds is often less than 180 seconds. Industry analysts also note that campaigns with persuasive overlays record conversion rates between 12% and 20%, consistent with the 17% detected by DNSFilter. Key data: 17% of “conversion” upon command execution. Tactic: verification overlay that simulates an anti-bot check and guides the execution of PowerShell. Impact: theft of credentials, cookies, 2FA, and wallet crypto with almost instant monetization. An example of false CAPTCHA that prompts a “manual” verification: a warning sign not to be overlooked. How the deception works: from the fake “I am not a robot” to in-memory malware The false CAPTCHAs mimic the classic “I’m not a robot,” but instead of validating access, they prompt the user to press Windows+R and paste a command. This initiates a PowerShell execution that downloads and loads into memory a DLL linked to Lumma Stealer, often using a fileless technique to evade traditional antivirus software.  Malware can disable or bypass runtime controls like AMSI (Antimalware Scan Interface) to hide payloads loaded in memory. An interesting aspect is the speed of collection: once active, the malware extracts saved passwords, cookies, session tokens, 2FA codes, and cryptocurrency wallet data. The case observed by DNSFilter: overlay on legitimate sites The alert was triggered when a managed provider detected a verification overlay… The post Fake CAPTCHAs, crypto disappeared in 3 minutes with the PowerShell trick appeared on BitcoinEthereumNews.com. A wave of fake CAPTCHA is leading users to execute PowerShell on Windows, triggering the crypto thief Lumma Stealer. According to an analysis by DNSFilter, 23 interactions in 72 hours were recorded, with 17% of visitors following the instructions displayed on the screen (DNSFilter). Immediate result: crypto wallets emptied and funds laundered in less than 3 minutes. According to the data collected by the incident response teams that analyzed the blocked pages between August 14 and 17, 2025, the operational window to prevent the first transfer of funds is often less than 180 seconds. Industry analysts also note that campaigns with persuasive overlays record conversion rates between 12% and 20%, consistent with the 17% detected by DNSFilter. Key data: 17% of “conversion” upon command execution. Tactic: verification overlay that simulates an anti-bot check and guides the execution of PowerShell. Impact: theft of credentials, cookies, 2FA, and wallet crypto with almost instant monetization. An example of false CAPTCHA that prompts a “manual” verification: a warning sign not to be overlooked. How the deception works: from the fake “I am not a robot” to in-memory malware The false CAPTCHAs mimic the classic “I’m not a robot,” but instead of validating access, they prompt the user to press Windows+R and paste a command. This initiates a PowerShell execution that downloads and loads into memory a DLL linked to Lumma Stealer, often using a fileless technique to evade traditional antivirus software.  Malware can disable or bypass runtime controls like AMSI (Antimalware Scan Interface) to hide payloads loaded in memory. An interesting aspect is the speed of collection: once active, the malware extracts saved passwords, cookies, session tokens, 2FA codes, and cryptocurrency wallet data. The case observed by DNSFilter: overlay on legitimate sites The alert was triggered when a managed provider detected a verification overlay…

Fake CAPTCHAs, crypto disappeared in 3 minutes with the PowerShell trick

A wave of fake CAPTCHA is leading users to execute PowerShell on Windows, triggering the crypto thief Lumma Stealer. According to an analysis by DNSFilter, 23 interactions in 72 hours were recorded, with 17% of visitors following the instructions displayed on the screen (DNSFilter). Immediate result: crypto wallets emptied and funds laundered in less than 3 minutes.

According to the data collected by the incident response teams that analyzed the blocked pages between August 14 and 17, 2025, the operational window to prevent the first transfer of funds is often less than 180 seconds. Industry analysts also note that campaigns with persuasive overlays record conversion rates between 12% and 20%, consistent with the 17% detected by DNSFilter.

  • Key data: 17% of “conversion” upon command execution.
  • Tactic: verification overlay that simulates an anti-bot check and guides the execution of PowerShell.
  • Impact: theft of credentials, cookies, 2FA, and wallet crypto with almost instant monetization.

An example of false CAPTCHA that prompts a “manual” verification: a warning sign not to be overlooked.

How the deception works: from the fake “I am not a robot” to in-memory malware

The false CAPTCHAs mimic the classic “I’m not a robot,” but instead of validating access, they prompt the user to press Windows+R and paste a command. This initiates a PowerShell execution that downloads and loads into memory a DLL linked to Lumma Stealer, often using a fileless technique to evade traditional antivirus software. 

Malware can disable or bypass runtime controls like AMSI (Antimalware Scan Interface) to hide payloads loaded in memory. An interesting aspect is the speed of collection: once active, the malware extracts saved passwords, cookies, session tokens, 2FA codes, and cryptocurrency wallet data.

The case observed by DNSFilter: overlay on legitimate sites

The alert was triggered when a managed provider detected a verification overlay on a European banking site: it displayed a fake DNS error and required a “manual verification.” The user was then guided to execute PowerShell, initiating the download and execution of the Lumma payload. In three days, 23 similar pages were blocked; it should be noted that almost 1 in 6 users followed the proposed steps.

Timeline of a theft in 3 minutes

  1. Entry: the user visits a legitimate site or a cloned page; a false CAPTCHA with DNS error appears.
  2. Social engineering: the page invites to “validate” access with Windows+R and a precompiled command.
  3. Execution: PowerShell disables controls like AMSI, loads a Lumma Stealer DLL, and remains in memory (fileless).
  4. Exfiltration: the malware collects browser credentials, cookies, 2FA, seed, and wallet data from crypto.
  5. Monetization: the keys are used to transfer funds on DEX and mixers; laundering occurs in minutes.

The campaign has been detected repeatedly in a narrow range, with pages changing domain and graphics to evade blocks. Not all variants are fileless: some offer an executable download disguised as a “verifier.” In this context, among the domains observed in similar campaigns are human-verify-7u.pages.dev and recaptcha-manual.shop.

Why the recovery of crypto is so difficult

The speed is the main weapon of the attack. Once stolen, the funds are moved to DEX and automation tools that fragment the transactions. For this reason, the on-chain analysis teams report that laundering can occur in a few minutes, making recovery extremely complex.

Technical indicators (for SOC/IT)

  • Observed Domains/URLs: human-verify-7u.pages.dev, recaptcha-manual.shop, variants on “human-verify” and “recaptcha-manual” subdomains.
  • Tactics, Techniques, Procedures (TTP): social engineering via overlay; execution of PowerShell with AMSI deactivation; DLL loading in memory (fileless); credential collection from browser and wallet.
  • Endpoint anomaly signals: powershell.exe process launched by explorer.exe/win+r; immediate network activity post-execution; access to browser profile directories.
  • Page pattern: fake DNS error + request for “manual verification” with Windows+R combination and “copy/paste”.

Legal notice: share IOCs responsibly; avoid spreading executable commands or payloads.

Quick Guide: Immediate Defense

  1. Do not paste commands suggested by web pages or pop-ups.
  2. Set up DNS blocks and content filtering for suspicious domains and malvertising categories.
  3. Limit the execution of PowerShell scripts for non-administrator users; enable Constrained Language Mode where possible.
  4. Enable and monitor AMSI and EDR solutions with rules on processes in memory.
  5. Separate the use of wallets from the main browser; prefer hardware wallets.
  6. Disable password saving in the browser; use a password manager with MFA.
  7. Train users with real examples of phishing and fake CAPTCHA on sensitive sites.

Countermeasures for companies

  • Network segmentation and blocks at the proxy/DNS level for newly registered domains and “human-verify/recaptcha-manual” patterns.
  • Policy clipboard on managed devices; alert when a site induces copy/paste of commands.
  • Threat hunting on chains of process injection and on anomalous executions of powershell.exe.
  • Immediate escalation playbook: host isolation, session revocation, credential rotation, invalidation of token and cookie.

Limiting the damage after the theft

  • Immediately isolate the device and revoke active sessions on critical services.
  • Regenerate seed phrase and move the funds to secure, uncompromised wallets.
  • Enable MFA on apps independent of the browser; avoid mechanisms linked to cookie or synchronized sessions.

FAQ

How to recognize a fake CAPTCHA?

Be cautious of pages that ask for Windows+R, copy/paste of commands, or download of “verifiers”. In case of doubt, check the URL and close the page.

Is it always a fileless attack?

No. Some variants download a traditional executable; others operate entirely in memory to reduce traces on disk.

Which data are they aiming to steal?

Credentials of browsers, cookies, 2FA, data and keys of wallet crypto.

Sources and insights

Source: https://en.cryptonomist.ch/2025/08/19/fake-captchas-crypto-disappeared-in-3-minutes-the-powershell-trick-of-lumma-stealer-deceives-1-in-6-users/

Market Opportunity
Prompt Logo
Prompt Price(PROMPT)
$0,06373
$0,06373$0,06373
+%0,67
USD
Prompt (PROMPT) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

WLFI Bank Charter Faces Urgent Halt as Warren Exposes Trump’s Alarming Conflict of Interest

WLFI Bank Charter Faces Urgent Halt as Warren Exposes Trump’s Alarming Conflict of Interest

BitcoinWorld WLFI Bank Charter Faces Urgent Halt as Warren Exposes Trump’s Alarming Conflict of Interest WASHINGTON, D.C. – March 15, 2025 – In a dramatic escalation
Share
bitcoinworld2026/01/14 06:40
UNI Price Prediction: Targets $5.85-$6.29 by Late January 2026

UNI Price Prediction: Targets $5.85-$6.29 by Late January 2026

The post UNI Price Prediction: Targets $5.85-$6.29 by Late January 2026 appeared on BitcoinEthereumNews.com. Rebeca Moen Jan 13, 2026 13:37 UNI Price Prediction
Share
BitcoinEthereumNews2026/01/14 05:50
Jose Mourinho Is Back. Can He Be The Special One Again?

Jose Mourinho Is Back. Can He Be The Special One Again?

The post Jose Mourinho Is Back. Can He Be The Special One Again? appeared on BitcoinEthereumNews.com. Portuguese coach Jose Mourinho (L) holds up a Benfica jersey with his name together with Benfica president Rui Costa during his official presentation as new Benfica coach at the Benfica Campus training center in Seixal, on the outskirts of Lisbon, on September 18, 2025. Benfica sacked Portuguese coach Bruno Lage following their defeat to Qarabag on September 16, 2025 evening in the Champions League, and contacted Jose Mourinho the next day to hire him. (Photo by PATRICIA DE MELO MOREIRA / AFP) (Photo by PATRICIA DE MELO MOREIRA/AFP via Getty Images) AFP via Getty Images Two decades after leaving Portugal with a Champions League winner medal in his pocket, Jose Mourinho is back in his home country. Benfica, Portugal’s most successful club, appointed the 62-year-old as their new manager on Thursday, just three weeks after he was fired by Turkish giants Fenerbahce after just over a year in charge. It marks an emotional return for Mourinho, who began his coaching career with the Lisbon giants in 2000, managing 11 matches before resigning. By the time he left Portugal for England just under four years later, his star was in the ascendency. As he introduced himself to the English media for the first time, Mourinho famously described himself as the “Special One”. It was a revealing remark, typical of a man whose confidence bordered on arrogance at times. Crucially, it was also borne out by results. In two seasons at Porto, Mourinho won two league titles, the UEFA Cup and the Champions League. Seven league titles across England, Italy and Spain with Chelsea, Inter Milan and Real Madrid followed, along with another Champions League crown and seven domestic cups across three countries. The Europa League and the Europa Conference League have also been added to Mourinho’s trophy cabinet, the former with…
Share
BitcoinEthereumNews2025/09/19 22:49