top of page

“Beware the New Fake CAPTCHA Scam: How Clicking ‘I’m Not a Robot’ Could Let Malware Into Your Device”

Recently, cybersecurity researchers have uncovered a dangerous new fraud technique—call it “ClickFix”—that lures internet users with fake CAPTCHA / verification prompts. It’s designed to trick people into executing malware themselves, which can steal personal data, passwords, and lead to identity theft.

Illustration of a scammer in a hoodie in front of a laptop.

How the Scam Works (in simple terms):

  • You visit a website (often one offering streaming, free downloads, or some attractive “deal”) and are told you need to pass a CAPTCHA (prove you’re human).

  • The site asks you to press a sequence like Windows + R, Ctrl + V, then Enter—steps that open a Windows system dialog, paste in a command (which the malware already placed in your clipboard), and execute it.

  • That command may run Windows utilities to fetch and install “info‑stealer” software (malware) which gathers things like passwords, credential files, browser data.

What To Watch Out For / Red Flags:

  • If a website asks you to open system utilities and paste or run something (e.g. “Run,” “Ctrl+V,” etc.) as part of CAPTCHA.

  • Grammar, branding, or spelling inconsistencies on verification pop‑ups.

  • Unexpected pop‑ups on websites you don’t trust.

  • Sites offering “free” content (movie streaming, cracked apps, etc.) are much more likely to be compromised.


What We Know: How This Scam Works

This isn’t just theoretical—it’s been actively observed by cybersecurity firms. Here are the details:

  • The tactic is often called ClickFix. Attackers create or hijack fake CAPTCHA or “prove you are human” pages. McAfee+4The Register+4Malwarebytes+4

  • After the user clicks the “I’m not a robot / verify” type button, the site often instructs them to perform seemingly innocuous keyboard/OS actions like:

    1. Press Windows key + R (opens the “Run” dialog on Windows). WeLiveSecurity+2Malwarebytes+2

    2. Press Ctrl + V (paste what is in the clipboard). Malwarebytes+1

    3. Press Enter to execute the pasted command. WeLiveSecurity+2Malwarebytes+2

  • The catch: the malicious page preloads (or silently copies) a malicious script or command into your clipboard. When you paste and run it, it may launch a PowerShell or invoke a Windows tool (like mshta.exe) that downloads malware (often an “info‑stealer” type) from a remote server. Malwarebytes+2SecurityWeek+2

  • Once installed, the malware can do things like log keystrokes, harvest saved credentials (passwords), browser data, possibly email, photos, etc. In short: a big risk for identity theft. Malwarebytes+2WeLiveSecurity+2

  • Several campaigns use masquerades of real verification tools (like reCAPTCHA, Cloudflare Turnstile, etc.) to appear legitimate. Some clones are very convincing. SecurityWeek+1

  • Magnitude:• The “ClearFake” campaign (which overlaps with ClickFix tactics) has compromised over 9,300 websites using fake CAPTCHA / Turnstile verification pages. The Hacker News• The infostealer “Lumma Stealer” is often the payload. WeLiveSecurity+2The Hacker News+2

Why This is Especially Dangerous

  • User‑driven infection: unlike drive‑by downloads, this requires the user to do something. That lowers detection (people tend to trust what they are asked to do, especially under “verification” guise). Malwarebytes+1

  • Use of trusted OS tools: using legitimate Windows tools (PowerShell, mshta) helps attackers evade detection from antivirus/endpoint tools because those tools are built into the system. Malicious activity can hide behind “normal” tools. The Register+1

  • High scale and evolving: attackers are using many domains, obfuscation, different infection vectors (phishing, compromised sites, ad‑networks) so the risk is widespread. WeLiveSecurity+1

What People Should Watch Out For / Be Skeptical Of

Here are red flags / warning signs:

  • A site asking you to press Windows+R, then paste something, then press Enter, as part of a CAPTCHA or verification. That’s not normal for legitimate “prove you’re not a robot” challenges.

  • Being told to “paste something from your clipboard” without being shown what it is or why. Legit CAPTCHA services never ask you to execute system commands.

  • Pop‑ups or verification pages on sites that are not well known or secure (especially streaming sites, “free” content, cracked software, etc.) that have poor design, odd grammar, missing security certificates, strange URLs.

  • Anything that feels “off” with branding (logo slightly incorrect, capitalization wrong, URLs that are similar but not exact to well‑known ones). For example, some fake Cloudflare “Turnstile” pages mimic the service but with subtle discrepancies. SecurityWeek

“Beware the New Fake CAPTCHA Scam: How Clicking ‘I’m Not a Robot’ Could Let Malware Into Your Device”

What You / Community Can Do to Protect Yourselves

Ideas for actionable tips:

  1. Keep antivirus / anti‑malware software currentEnsure these tools are up to date. Use ones that can detect unusual behavior (not just known malware) and clipboard manipulation.

  2. Don’t blindly follow promptsIf a site asks you to perform system actions (open Run, paste from clipboard, execute commands), STOP and ask: “Is this really needed?”

  3. Verify website legitimacyCheck URL carefully, check site certificates (HTTPS), search for reviews or complaints. If a link came from an email‑or social media‑post, verify separately using official sites.

  4. Avoid dubious or pirated content sourcesMany of these scams are propagated via compromised / shady websites offering free content, cracked software, etc. Those are high risk.

  5. Keep your system patchedOS, browser, and any plugins should be updated; many malware exploit unpatched vulnerabilities.

  6. Check credit reports / monitor accountsEven if you don’t think anything happened, set up alerts and occasionally check credit activity so you spot identity theft early.

  7. Educate especially vulnerable groupsElderly, less tech‑savvy folks, anyone who might follow instructions without question. Make sure they know what legitimate CAPTCHA challenges look like.

“Beware the New Fake CAPTCHA Scam: How Clicking ‘I’m Not a Robot’ Could Let Malware Into Your Device”

Comments

Rated 0 out of 5 stars.
No ratings yet

Add a rating
bottom of page