A new research brief published by DNSFilter indicates a rising threat to cryptocurrency users from fake CAPTCHA pages, which use deceptive “I’m not a robot” prompts to deliver malware targeting crypto wallets. According to DNSFilter, the malicious activity was first identified by one of its managed service provider (MSP) customers. What initially appeared to be a routine CAPTCHA verification was, in fact, an attempt to deploy Lumma Stealer, a fileless malware strain capable of exfiltrating browser-stored credentials and wallet information. While DNSFilter’s content filtering successfully blocked the attack, its researchers traced the infrastructure to reveal broader patterns of coordinated phishing efforts. Fake CAPTCHA Scam Targets Greek Bank Users, Delivers Lumma Stealer via PowerShell Trick The incident began when users encountered a CAPTCHA overlay on a Greek banking site. The page mimicked a legitimate CAPTCHA but displayed a message claiming a DNS “network error,” instructing users to press Windows + R, paste a command from the clipboard, and hit Enter. Following these steps would silently execute the Lumma Stealer payload via PowerShell outside the browser while performing a DNS lookup. Source: DNSFilter DNSFilter linked the campaign to two other domains: human-verify-7u.pages.dev, a Cloudflare Pages site that returns an error after the user clicks the button, and recaptcha-manual.shop, which executes commands outside the browser after users follow the prompts. Further investigation, detailed in DNSFilter’s case study , revealed that the campaign was a sophisticated blend of phishing and malware delivery. Attackers relied on fileless execution techniques, using legitimate browser processes to deliver payloads without writing to disk. DNSFilter deployed its content filtering and domain-blocking controls across the MSP’s network, preventing infections before any credentials or wallet data were compromised. Alerts and blocking policies were updated in real time, and the MSP conducted end-user education sessions to reinforce the dangers of interacting with suspicious CAPTCHA. “The malware in this event was Lumma Stealer, delivered through a fake CAPTCHA in a deceptive malvertising chain. Had the analyst’s device been infected, the PowerShell payload could have disabled Windows AMSI and loaded Lumma DLL,” the report explains. “The stealer immediately sweeps the system for anything it can monetize—browser-stored passwords and cookies, saved 2FA tokens, cryptocurrency-wallet data, remote-access credentials, and even password-manager vaults.” Analysis showed that the fake CAPTCHA was accessed 23 times across the DNSFilter network in just three days. More troubling, 17% of users who encountered the page followed its copy‑and‑paste instructions, triggering the malware payload attempt. While DNSFilter prevented successful infections in this case, researchers noted the potential scale if left unchecked. Rapid Laundering Leaves Scam Victims Powerless to Recover Stolen Crypto Reports have revealed that cybercriminals are laundering stolen cryptocurrency at unprecedented speeds. At these rates, victims of fake CAPTCHA schemes are left with virtually no chance of recovering their funds. As per the previous report, crypto hackers can now transfer stolen digital assets through laundering networks in under three minutes. 🚨 Hackers are stealing more crypto and moving it faster. One laundering process took only 2 minutes 57 seconds. Can the industry cope? #CryptoSecurity #Web3 #Blockchain #DeFi https://t.co/lGwutYsT6Q — Cryptonews.com (@cryptonews) August 12, 2025 Elliptic’s data shows that by using automated laundering tools and decentralized exchanges (DEXs), hackers are executing the entire laundering process in a matter of minutes. Source: Elliptic “This new speed makes real-time intervention nearly impossible,” the report warned. Cybersecurity experts warn that the fake CAPTCHA scams are not just a concern for big firms but also for regular users, as they are often disguised as part of login portals or app installations and target ordinary internet users who may not suspect foul play until their wallets are drained. “Bad actors take advantage of both the highs and lows of life,” said Ken Carnesi , CEO and co-founder of DNSFilter. “Any person at any organization has the same chance of encountering a malicious link. The standard cyber hygiene tips apply: use unique passwords, verify who you are ‘talking’ to before handing over credentials, and think before you click.” The rapid laundering process worsens the impact. Victims often discover the theft too late. Law enforcement agencies find it hard to trace the stolen funds across multiple blockchains. Experts note, however, that when cybersecurity firms intervene promptly, all or some of the stolen funds can still be recovered. “Speed is critical. Funds often can be recovered in whole or part if proper actions are taken within 24 to 72 hours,” Cameron G. Shilling, a cybersecurity expert, said in a publication . As hackers continue to shorten laundering times, the risks for victims are expected to grow. “The arms race between cybercriminals and defenders is accelerating,” Elliptic concluded. “Speed is now the hackers’ greatest weapon.”A new research brief published by DNSFilter indicates a rising threat to cryptocurrency users from fake CAPTCHA pages, which use deceptive “I’m not a robot” prompts to deliver malware targeting crypto wallets. According to DNSFilter, the malicious activity was first identified by one of its managed service provider (MSP) customers. What initially appeared to be a routine CAPTCHA verification was, in fact, an attempt to deploy Lumma Stealer, a fileless malware strain capable of exfiltrating browser-stored credentials and wallet information. While DNSFilter’s content filtering successfully blocked the attack, its researchers traced the infrastructure to reveal broader patterns of coordinated phishing efforts. Fake CAPTCHA Scam Targets Greek Bank Users, Delivers Lumma Stealer via PowerShell Trick The incident began when users encountered a CAPTCHA overlay on a Greek banking site. The page mimicked a legitimate CAPTCHA but displayed a message claiming a DNS “network error,” instructing users to press Windows + R, paste a command from the clipboard, and hit Enter. Following these steps would silently execute the Lumma Stealer payload via PowerShell outside the browser while performing a DNS lookup. Source: DNSFilter DNSFilter linked the campaign to two other domains: human-verify-7u.pages.dev, a Cloudflare Pages site that returns an error after the user clicks the button, and recaptcha-manual.shop, which executes commands outside the browser after users follow the prompts. Further investigation, detailed in DNSFilter’s case study , revealed that the campaign was a sophisticated blend of phishing and malware delivery. Attackers relied on fileless execution techniques, using legitimate browser processes to deliver payloads without writing to disk. DNSFilter deployed its content filtering and domain-blocking controls across the MSP’s network, preventing infections before any credentials or wallet data were compromised. Alerts and blocking policies were updated in real time, and the MSP conducted end-user education sessions to reinforce the dangers of interacting with suspicious CAPTCHA. “The malware in this event was Lumma Stealer, delivered through a fake CAPTCHA in a deceptive malvertising chain. Had the analyst’s device been infected, the PowerShell payload could have disabled Windows AMSI and loaded Lumma DLL,” the report explains. “The stealer immediately sweeps the system for anything it can monetize—browser-stored passwords and cookies, saved 2FA tokens, cryptocurrency-wallet data, remote-access credentials, and even password-manager vaults.” Analysis showed that the fake CAPTCHA was accessed 23 times across the DNSFilter network in just three days. More troubling, 17% of users who encountered the page followed its copy‑and‑paste instructions, triggering the malware payload attempt. While DNSFilter prevented successful infections in this case, researchers noted the potential scale if left unchecked. Rapid Laundering Leaves Scam Victims Powerless to Recover Stolen Crypto Reports have revealed that cybercriminals are laundering stolen cryptocurrency at unprecedented speeds. At these rates, victims of fake CAPTCHA schemes are left with virtually no chance of recovering their funds. As per the previous report, crypto hackers can now transfer stolen digital assets through laundering networks in under three minutes. 🚨 Hackers are stealing more crypto and moving it faster. One laundering process took only 2 minutes 57 seconds. Can the industry cope? #CryptoSecurity #Web3 #Blockchain #DeFi https://t.co/lGwutYsT6Q — Cryptonews.com (@cryptonews) August 12, 2025 Elliptic’s data shows that by using automated laundering tools and decentralized exchanges (DEXs), hackers are executing the entire laundering process in a matter of minutes. Source: Elliptic “This new speed makes real-time intervention nearly impossible,” the report warned. Cybersecurity experts warn that the fake CAPTCHA scams are not just a concern for big firms but also for regular users, as they are often disguised as part of login portals or app installations and target ordinary internet users who may not suspect foul play until their wallets are drained. “Bad actors take advantage of both the highs and lows of life,” said Ken Carnesi , CEO and co-founder of DNSFilter. “Any person at any organization has the same chance of encountering a malicious link. The standard cyber hygiene tips apply: use unique passwords, verify who you are ‘talking’ to before handing over credentials, and think before you click.” The rapid laundering process worsens the impact. Victims often discover the theft too late. Law enforcement agencies find it hard to trace the stolen funds across multiple blockchains. Experts note, however, that when cybersecurity firms intervene promptly, all or some of the stolen funds can still be recovered. “Speed is critical. Funds often can be recovered in whole or part if proper actions are taken within 24 to 72 hours,” Cameron G. Shilling, a cybersecurity expert, said in a publication . As hackers continue to shorten laundering times, the risks for victims are expected to grow. “The arms race between cybercriminals and defenders is accelerating,” Elliptic concluded. “Speed is now the hackers’ greatest weapon.”

Hackers Unleash Devious Malware That Steals Crypto Wallet Data Via Fake Captcha: Report

2025/08/19 05:57

A new research brief published by DNSFilter indicates a rising threat to cryptocurrency users from fake CAPTCHA pages, which use deceptive “I’m not a robot” prompts to deliver malware targeting crypto wallets.

According to DNSFilter, the malicious activity was first identified by one of its managed service provider (MSP) customers. What initially appeared to be a routine CAPTCHA verification was, in fact, an attempt to deploy Lumma Stealer, a fileless malware strain capable of exfiltrating browser-stored credentials and wallet information.

While DNSFilter’s content filtering successfully blocked the attack, its researchers traced the infrastructure to reveal broader patterns of coordinated phishing efforts.

Fake CAPTCHA Scam Targets Greek Bank Users, Delivers Lumma Stealer via PowerShell Trick

The incident began when users encountered a CAPTCHA overlay on a Greek banking site. The page mimicked a legitimate CAPTCHA but displayed a message claiming a DNS “network error,” instructing users to press Windows + R, paste a command from the clipboard, and hit Enter.

Following these steps would silently execute the Lumma Stealer payload via PowerShell outside the browser while performing a DNS lookup.

Source: DNSFilter

DNSFilter linked the campaign to two other domains: human-verify-7u.pages.dev, a Cloudflare Pages site that returns an error after the user clicks the button, and recaptcha-manual.shop, which executes commands outside the browser after users follow the prompts.

Further investigation, detailed in DNSFilter’s case study, revealed that the campaign was a sophisticated blend of phishing and malware delivery. Attackers relied on fileless execution techniques, using legitimate browser processes to deliver payloads without writing to disk.

DNSFilter deployed its content filtering and domain-blocking controls across the MSP’s network, preventing infections before any credentials or wallet data were compromised. Alerts and blocking policies were updated in real time, and the MSP conducted end-user education sessions to reinforce the dangers of interacting with suspicious CAPTCHA.

“The malware in this event was Lumma Stealer, delivered through a fake CAPTCHA in a deceptive malvertising chain. Had the analyst’s device been infected, the PowerShell payload could have disabled Windows AMSI and loaded Lumma DLL,” the report explains.

“The stealer immediately sweeps the system for anything it can monetize—browser-stored passwords and cookies, saved 2FA tokens, cryptocurrency-wallet data, remote-access credentials, and even password-manager vaults.”

Analysis showed that the fake CAPTCHA was accessed 23 times across the DNSFilter network in just three days. More troubling, 17% of users who encountered the page followed its copy‑and‑paste instructions, triggering the malware payload attempt. While DNSFilter prevented successful infections in this case, researchers noted the potential scale if left unchecked.

Rapid Laundering Leaves Scam Victims Powerless to Recover Stolen Crypto

Reports have revealed that cybercriminals are laundering stolen cryptocurrency at unprecedented speeds. At these rates, victims of fake CAPTCHA schemes are left with virtually no chance of recovering their funds.

As per the previous report, crypto hackers can now transfer stolen digital assets through laundering networks in under three minutes.

Elliptic’s data shows that by using automated laundering tools and decentralized exchanges (DEXs), hackers are executing the entire laundering process in a matter of minutes.

Source: Elliptic

“This new speed makes real-time intervention nearly impossible,” the report warned.

Cybersecurity experts warn that the fake CAPTCHA scams are not just a concern for big firms but also for regular users, as they are often disguised as part of login portals or app installations and target ordinary internet users who may not suspect foul play until their wallets are drained.

“Bad actors take advantage of both the highs and lows of life,” said Ken Carnesi, CEO and co-founder of DNSFilter. “Any person at any organization has the same chance of encountering a malicious link. The standard cyber hygiene tips apply: use unique passwords, verify who you are ‘talking’ to before handing over credentials, and think before you click.”

The rapid laundering process worsens the impact. Victims often discover the theft too late. Law enforcement agencies find it hard to trace the stolen funds across multiple blockchains. Experts note, however, that when cybersecurity firms intervene promptly, all or some of the stolen funds can still be recovered.

“Speed is critical. Funds often can be recovered in whole or part if proper actions are taken within 24 to 72 hours,” Cameron G. Shilling, a cybersecurity expert, said in a publication.

As hackers continue to shorten laundering times, the risks for victims are expected to grow. “The arms race between cybercriminals and defenders is accelerating,” Elliptic concluded. “Speed is now the hackers’ greatest weapon.”

Market Opportunity
Gravity Logo
Gravity Price(G)
$0.004643
$0.004643$0.004643
-5.57%
USD
Gravity (G) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

XRP Price Prediction: Can Ripple Rally Past $2 Before the End of 2025?

XRP Price Prediction: Can Ripple Rally Past $2 Before the End of 2025?

The post XRP Price Prediction: Can Ripple Rally Past $2 Before the End of 2025? appeared first on Coinpedia Fintech News The XRP price has come under enormous pressure
Share
CoinPedia2025/12/16 19:22
BlackRock boosts AI and US equity exposure in $185 billion models

BlackRock boosts AI and US equity exposure in $185 billion models

The post BlackRock boosts AI and US equity exposure in $185 billion models appeared on BitcoinEthereumNews.com. BlackRock is steering $185 billion worth of model portfolios deeper into US stocks and artificial intelligence. The decision came this week as the asset manager adjusted its entire model suite, increasing its equity allocation and dumping exposure to international developed markets. The firm now sits 2% overweight on stocks, after money moved between several of its biggest exchange-traded funds. This wasn’t a slow shuffle. Billions flowed across multiple ETFs on Tuesday as BlackRock executed the realignment. The iShares S&P 100 ETF (OEF) alone brought in $3.4 billion, the largest single-day haul in its history. The iShares Core S&P 500 ETF (IVV) collected $2.3 billion, while the iShares US Equity Factor Rotation Active ETF (DYNF) added nearly $2 billion. The rebalancing triggered swift inflows and outflows that realigned investor exposure on the back of performance data and macroeconomic outlooks. BlackRock raises equities on strong US earnings The model updates come as BlackRock backs the rally in American stocks, fueled by strong earnings and optimism around rate cuts. In an investment letter obtained by Bloomberg, the firm said US companies have delivered 11% earnings growth since the third quarter of 2024. Meanwhile, earnings across other developed markets barely touched 2%. That gap helped push the decision to drop international holdings in favor of American ones. Michael Gates, lead portfolio manager for BlackRock’s Target Allocation ETF model portfolio suite, said the US market is the only one showing consistency in sales growth, profit delivery, and revisions in analyst forecasts. “The US equity market continues to stand alone in terms of earnings delivery, sales growth and sustainable trends in analyst estimates and revisions,” Michael wrote. He added that non-US developed markets lagged far behind, especially when it came to sales. This week’s changes reflect that position. The move was made ahead of the Federal…
Share
BitcoinEthereumNews2025/09/18 01:44
DMCC and Crypto.com Partner to Explore Blockchain Infrastructure for Physical Commodities

DMCC and Crypto.com Partner to Explore Blockchain Infrastructure for Physical Commodities

The Dubai Multi Commodities Centre and Crypto.com have announced a partnership to explore on-chain infrastructure for physical commodities including gold, energy, and agricultural products. The collaboration brings together one of the world's leading free trade zones with a global cryptocurrency exchange, signaling serious institutional interest in commodity tokenization.
Share
MEXC NEWS2025/12/16 20:46