Fake CAPTCHA sites now have tutorial videos to help victims install malware
嗯,用户让我帮忙总结一篇文章的内容,控制在100字以内,而且不需要特定的开头。首先,我需要仔细阅读这篇文章,理解其主要内容和重点。 文章讲的是ClickFix这种网络攻击活动,利用虚假的CAPTCHA页面和剪贴板劫持来诱导用户执行恶意命令。攻击者甚至针对Mac用户传播Atomic Stealer。他们还改进了攻击手法,比如嵌入视频教程、检测操作系统并自动复制代码,再加上倒计时制造紧迫感。这些方法让攻击更加有效。 接下来,文章还提到了防御措施,比如不要匆忙执行命令、避免从不可信来源运行代码、手动输入命令、安装反恶意软件以及提高安全意识。最后还有Malwarebytes的浏览器扩展推荐。 现在我需要将这些信息浓缩到100字以内。重点包括ClickFix的攻击手法、目标人群、改进措施以及防御建议。要确保语言简洁明了,不遗漏关键点。 可能的结构是:描述攻击方式和目标,提到改进措施如视频教程和倒计时,然后简要提到防御方法。这样既涵盖了攻击手段又提到了应对措施。 最后检查字数是否在限制内,并确保表达清晰准确。 </think> 2025年犯罪分子利用虚假CAPTCHA网站和剪贴板劫持诱导用户执行恶意代码传播Lumma Stealer。研究人员将其命名为ClickFix攻击,并发现犯罪分子通过A/B测试优化感染方法。最新版本的ClickFix针对Mac用户传播Atomic Stealer,并通过嵌入视频教程、检测操作系统自动复制代码及设置倒计时等手段提升攻击成功率。此类钓鱼页面主要通过SEO中毒的Google搜索结果传播,并辅以邮件、社交媒体和应用广告扩散。专家建议用户谨慎处理网页指令、避免运行未知代码、手动输入命令并安装实时反恶意软件以防范此类攻击。 2025-11-7 15:1:33 Author: www.malwarebytes.com(查看原文) 阅读量:29 收藏

clipboard writing

Early on in 2025, I described how criminals used fake CAPTCHA sites and a clipboard hijacker to provide instructions for website visitors that would effectively infect their own machines with an information stealer known as the Lumma Stealer.

ClickFix is the name researchers have since given to this type of campaign—one that uses the clipboard and fake CAPTCHA sites to trick users into running malicious commands themselves.

Later, we found that the cybercriminals behind it seemed to be running some A/B tests to figure out which infection method worked best: ClickFix, or the more traditional file download that disguises malware as a useful application.

The criminals probably decided to go with ClickFix, because they soon came up with a campaign that targeted Mac users to spread the infamous Atomic Stealer.

Now, as reported by researchers from Push Security, the attackers behind ClickFix have tried to make the campaign more “user-friendly.”  The latest fake CAPTCHA pages include embedded video tutorials showing exactly how to run the malicious code.

instructions for Mac users
Image courtesy of Push Security

The site automatically detects the visitor’s operating system and provides matching instructions, copying the right code for that OS straight to the clipboard—making typos less likely and infection more certain.

A countdown timer adds urgency, pressuring users to complete the “challenge” within a minute. When people rush instead of thinking things through, social engineering wins.

Unsurprisingly, most of these pages spread through SEO-poisoned Google search results, although they also circulate via email, social media, and in-app ads too.

How to stay safe

With ClickFix running rampant—and it doesn’t look like it’s going away anytime soon—it’s important to be aware, careful, and protected.

  • Slow down. Don’t rush to follow instructions on a webpage or prompt, especially if it asks you to run commands on your device or copy-paste code. Attackers rely on urgency to bypass your critical thinking, so be cautious of pages urging immediate action. Sophisticated ClickFix pages add countdowns, user counters, or other pressure tactics to make you act quickly.
  • Avoid running commands or scripts from untrusted sources. Never run code or commands copied from websites, emails, or messages unless you trust the source and understand the action’s purpose. Verify instructions independently. If a website tells you to execute a command or perform a technical action, check through official documentation or contact support before proceeding.
  • Limit the use of copy-paste for commands. Manually typing commands instead of copy-pasting can reduce the risk of unknowingly running malicious payloads hidden in copied text.
  • Secure your devices. Use an up-to-date real-time anti-malware solution with a web protection component.
  • Educate yourself on evolving attack techniques. Understanding that attacks may come from unexpected vectors and evolve helps maintain vigilance. Keep reading our blog!

Pro tip: Did you know that the free Malwarebytes Browser Guard extension warns you when a website tries to copy something to your clipboard?


We don’t just report on threats—we remove them

Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by downloading Malwarebytes today.


文章来源: https://www.malwarebytes.com/blog/news/2025/11/fake-captcha-sites-now-have-tutorial-videos-to-help-victims-install-malware
如有侵权请联系:admin#unsafe.sh