Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
EtherRAT Targets Enterprise Admins with SEO Poison
May 1, 2026
New Spyware Platform: Rebrand & Resell Android Lets Buyers
May 1, 2026
Attackers Abuse CAPTCHA, ClickFix for Cred Tactics Boost
May 1, 2026
Home/Threats/ClickFix Attacks Target Windows Systems to Deploy StealC
Threats

ClickFix Attacks Target Windows Systems to Deploy StealC

A sophisticated social engineering campaign targets Windows users, leveraging fake CAPTCHA verification pages to deploy the StealC information stealer malware. The attack begins when victims visit...

Sarah simpson
Sarah simpson
February 13, 2026 2 Min Read
0 0

A sophisticated social engineering campaign targets Windows users, leveraging fake CAPTCHA verification pages to deploy the StealC information stealer malware.

The attack begins when victims visit compromised websites that display fraudulent Cloudflare security checks, tricking them into executing malicious PowerShell commands.

The compromised website loads a malicious script (Source - LavelBlue)
The compromised website loads a malicious script (Source – LavelBlue)

This campaign represents a dangerous evolution in cybercrime tactics, combining psychological manipulation with advanced technical evasion methods to steal sensitive data.

The attack starts with seemingly legitimate websites that have been compromised by threat actors. When users visit these sites, malicious JavaScript loads a fake CAPTCHA page that mimics Cloudflare’s verification system.

The page instructs victims to press Windows Key + R, then Ctrl + V to paste a hidden command, and finally press Enter to execute it. This ClickFix technique exploits user trust, making victims believe they are completing a routine security check when they are actually launching malware.

LevelBlue researchers identified this multi-stage attack chain that downloads position-independent shellcode, reflectively loads a 64-bit PE downloader, and finally injects the StealC malware into legitimate Windows processes.

Multi-stage infection chain (Source - LavelBlue)
Multi-stage infection chain (Source – LavelBlue)

The stealer targets browser credentials from Chrome, Edge, Firefox, and other browsers, cryptocurrency wallet extensions including MetaMask and Coinbase Wallet, Steam account authentication files, Outlook email credentials, and system information with screenshots.

Infection Chain and Evasion Tactics

The malware employs fileless execution techniques that operate entirely in memory without writing files to disk, making detection extremely difficult.

After the initial PowerShell command executes, it connects to a remote server to download shellcode generated using the Donut framework.

Fake CAPTCHA page (Source - LavelBlue)
Fake CAPTCHA page (Source – LavelBlue)

This shellcode then loads a custom PE downloader compiled with Microsoft Visual C++ that retrieves the final StealC payload and injects it into svchost.exe, a legitimate Windows service process.

StealC communicates with its command-and-control server using HTTP traffic encrypted with Base64 and RC4 encoding.

The malware uses dual-layer string obfuscation to hide critical configuration data including C2 server URLs, targeted file paths, and database queries.

Organizations should monitor for suspicious User-Agent strings like “Loader,” flag PowerShell execution with encoded commands, detect VirtualAlloc and CreateThread patterns indicating shellcode injection, and alert on unusual access to browser credential databases.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitMalwareSecurityThreat

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

Chrome Extensions Hijacked 500K VKontakte Infected Users

Next Post

OpenClaw 2026.2.12 Released With Fix for 40+ Security Issues

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Ransomware Victims Jump to 7,831 as AI Crime Tools Scale Global
May 1, 2026
Deep#Door Stealer Harvests Passwords, Cloud Browser Tokens
May 1, 2026
China-Aligned Attackers Use ShadowPad, IOX Proxy WMIC Multi-Stage
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us