Transcript
A (0:02)
You're listening to the Cyberwire network, powered by N2K. And now a word from our sponsor. The Johns Hopkins University Information Security Institute is seeking qualified applicants for its innovative Master of Science in Security Informatics degree program. Study alongside world class interdisciplinary experts and gain unparalleled educational research and professional experience in information security and assurance. Interested U.S. citizens should consider the Department of Defense's Cyber Service Academy program, which covers tuition, textbooks and a laptop, as well as providing a $34,000 additional annual stipend. Apply for the fall 2026 semester and for this scholarship by February 28th. Learn more at CS JHU. Edu MSSI hello everyone and welcome to the Cyberwires Research Saturday. I'm DAV Dave Bittner and this is our weekly conversation with researchers and analysts tracking down the threats and vulnerabilities, solving some of the hard problems, and protecting ourselves in our rapidly evolving cyberspace. Thanks for joining us.
B (1:43)
This type of attack is trying to fool the visitors of a website to do something that they used to do, like updating their browser in the early phases with a clear fake or in this case solving a captcha. We are so used to do that, so we are doing it once again. But in this case we are being fooled into doing something quite malicious, in this case running the attacker's code on our system.
A (2:11)
That's Nati tal, head of Guardiolabs. The research we're discussing today is about captchageddon unmasking the viral evolution of the ClickFix browser based threat. Can you walk us through how the attack actually works?
B (2:32)
Yes. So as you all know, captchas are suddenly popping up on your screen and asking you to solve a puzzle or select where you see the traffic lights or buses and stuff like that. And this one is actually quite the same. You get this capture screen out of the blue. It can be when you enter a new site or just as a pop up, which was the case in early ages of this attack, a pop up from some kind of advertisement and you see this captcha and you say to yourself, okay, I need to solve it. In this case when you click on the Verify your human, you're asked to do something a bit different than usual, which is a bunch of keyword or keyboard shortcuts. You need to click and then you are proving you are a human. But in this case you are actually lured into running this type of code that was copied to your clipboard in the background without you even knowing. And when you click on those buttons you actually open up the run window in Your Windows system, you paste that malicious code into it and press enter to execute it. So you think that everything is okay, but actually you just executed some malicious code that is now going and downloading probably an infosteeler that is now being installed on your system, gathering all the information about you, about your browser, your credentials, your bank accounts, everything, sending it out to the attackers. And that's it. It's all done in a matter of milliseconds actually, and you move on and everything is okay. You didn't even know that this was happening in the background.
![Browser attacks without downloads. [Research Saturday] - CyberWire Daily cover](/_next/image?url=https%3A%2F%2Fmegaphone.imgix.net%2Fpodcasts%2F9e316220-957b-11f0-9a31-9baca023fb9f%2Fimage%2F95b72a93c2ffaf8ff900d662a9bd3735.png%3Fixlib%3Drails-4.3.1%26max-w%3D3000%26max-h%3D3000%26fit%3Dcrop%26auto%3Dformat%2Ccompress&w=1920&q=75)