Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsNew Fake CAPTCHA Scam Abuses Microsoft Tools to Install Amatera Stealer
New Fake CAPTCHA Scam Abuses Microsoft Tools to Install Amatera Stealer
Cybersecurity

New Fake CAPTCHA Scam Abuses Microsoft Tools to Install Amatera Stealer

•January 26, 2026
0
HackRead
HackRead•Jan 26, 2026

Companies Mentioned

Microsoft

Microsoft

MSFT

Google

Google

GOOG

Facebook

Facebook

Why It Matters

The technique shows how attackers can bypass traditional defenses by abusing trusted Microsoft binaries and benign cloud services, raising credential‑theft risk on enterprise Windows environments. Organizations must strengthen script control and user education to mitigate such living‑off‑the‑land attacks.

Key Takeaways

  • •Fake CAPTCHA uses Windows+R command to run LOLBin.
  • •Attack leverages signed SyncAppvPublishingServer.vbs script.
  • •Payload delivered via Google Calendar and PNG steganography.
  • •Targets Windows 10/11 with App‑V enabled.
  • •Amatera Stealer exfiltrates passwords and browser data.

Pulse Analysis

Fake CAPTCHA scams have evolved beyond simple visual puzzles, now coercing users into running system commands. By embedding malicious instructions within a familiar "I am not a robot" prompt, attackers exploit human curiosity and trust. The use of a Windows+R shortcut combined with a copy‑paste code sequence turns an ordinary user action into a silent infection vector, highlighting the growing sophistication of social engineering tactics that blend UI manipulation with legitimate operating‑system utilities.

The core of this campaign relies on a living‑off‑the‑land binary, SyncAppvPublishingServer.vbs, a signed Microsoft script normally used for App‑V management. Because the binary is trusted, many endpoint protection platforms overlook its activity. Further obfuscation comes from fetching command‑and‑control data from a public Google Calendar .ics file and hiding the actual payload inside innocuous PNG images through steganography. This multi‑layered approach—leveraging cloud services, legitimate scripts, and image files—creates a low‑profile delivery chain that can slip past sandbox analysis and traditional signature‑based detection.

For security teams, the incident underscores the need for stricter execution policies and application whitelisting, especially for LOLBins and script hosts. Monitoring for anomalous use of Windows+R, unexpected calendar subscriptions, or unusual image downloads can provide early indicators. Educating users to avoid copying commands from unverified sources remains a critical defense. As attackers continue to weaponize trusted tools and services, a blend of behavioral analytics, strict script controls, and user awareness will be essential to counter these covert credential‑stealing operations.

New Fake CAPTCHA Scam Abuses Microsoft Tools to Install Amatera Stealer

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...