The EPOCH Blog

Fake CAPTCHA Attacks are Surging: Here's What to Look Out For

Written by Epoch Team | Dec 5, 2025 4:22:21 PM

In recent weeks, our team has responded to a growing number of incidents involving a new social-engineering tactic that’s quickly gaining traction: fake CAPTCHA attacks.

These attacks disguise themselves as the familiar “I’m not a robot” prompts we all interact with daily. But behind the scenes, they behave very differently, with dangerous consequences.

What We’re Seeing in Real Environments

In the cases we've handled, everything looks normal at first. A user lands on a website- sometimes a sketchy site, other times a legitimate site that has been compromised- and is greeted with a standard-looking CAPTCHA box.

But the moment they click it, the page secretly copies malicious code to the user’s clipboard. Then it displays instructions like: “If the CAPTCHA doesn’t load, press Windows + R and paste the following command.”

If the user follows the prompt and pastes the clipboard contents into the Run dialog, the device immediately begins pulling down malware. We’ve seen:

  • Credential stealers
  • Remote-access trojans
  • Tools designed to harvest browser data and session tokens
  • Malware that spreads laterally looking for additional footholds

This attack works because it doesn’t rely on exploiting a vulnerability- it exploits human trust in something as common as a CAPTCHA.

Why This Attack Is Effective

Attackers know that users are trained to trust CAPTCHAs. They show up on thousands of websites, from login pages to comment sections. And unlike phishing emails or fake login forms, CAPTCHAs don’t usually raise red flags. That familiarity gives attackers a perfect disguise.

We’ve also seen attackers compromise legitimate websites and embed a fake CAPTCHA, which makes the attack even harder for an average user to recognize.

Red Flags to Watch For

We’re now advising clients to immediately stop and report any CAPTCHA that asks them to run or paste anything. A legitimate CAPTCHA will never tell you to:

  • Open the Run dialog
  • Paste a command
  • Open CMD or PowerShell
  • “Fix” or “verify” your challenge by running code

Other red flags include CAPTCHAs appearing on unusual or compromised websites and unexpected clipboard activity, such as content being copied automatically after clicking a CAPTCHA. If any of these occur, it’s critical to pause and report the activity to your IT or security team immediately.

How Organizations Can Protect Themselves

1. Build this into security awareness training

Employees must know that CAPTCHAs should never involve manual commands, clipboard actions, or Run dialogs.

2. Encourage a “stop and ask” mindset

We’d always rather answer a quick phone call or email than clean up malware.

3. Keep endpoint protections up to date

Modern EDR tools can help detect suspicious command execution even if a user makes a mistake.

4. Report suspicious pages immediately

The sooner we are aware, the faster the threat can be contained.

Final Thoughts

Fake CAPTCHA attacks are a perfect example of how attackers continue to shift away from traditional exploits and increasingly focus on manipulating human behavior. We’ve seen these attacks firsthand, and the speed at which they’re spreading makes awareness critical.