🔄 Jeśli latami edukujesz wszystkich wokół, że pewne rozwiązania, mimo tego że ich drażnią, działają na rzecz ich bezpieczeństwa, możesz nieco zapędzić się w kozi róg. Bo co wtedy, kiedy one same staną się zagrożeniem?
Źródła:
🤔 How CAPTCHAs work | What does CAPTCHA mean?
https://www.cloudflare.com/en-gb/learning/bots/how-captchas-work/
🥊 AI bots now beat 100% of those traffic-image CAPTCHAs
https://arstechnica.com/ai/2024/09/ai-defeats-traffic-image-captcha-in-another-triumph-of-machine-over-man/
❗️Fake CAPTCHAs, Real Threats: How Lumma Stealer Tricks Users into Self-Inflicted Malware
https://www.senseon.io/blog/2025/1/14/rg9z1hgk51o1i09ibe9hxnlja0brtu
🔎 Lumma Stealer: Fake CAPTCHAs & New Techniques to Evade Detection
https://www.netskope.com/blog/lumma-stealer-fake-captchas-new-techniques-to-evade-detection
✅ Infostealer LummaC2 Spreading Through Fake CAPTCHA Verification Page
https://asec.ahnlab.com/en/85699/
📊 Unmasking Lumma Stealer: Analyzing Deceptive Tactics with Fake CAPTCHA
https://blog.qualys.com/vulnerabilities-threat-research/2024/10/20/unmasking-lumma-stealer-analyzing-deceptive-tactics-with-fake-captcha
🗃️ S3cur3Th1sSh1t/Amsi-Bypass-Powershell
https://github.com/S3cur3Th1sSh1t/Amsi-Bypass-Powershell
❌ Hackers abuse free TryCloudflare to deliver remote access malware
https://www.bleepingcomputer.com/news/security/hackers-abuse-free-trycloudflare-to-deliver-remote-access-malware/
🔓 Threat Actors Target Public-Facing Apps for Initial Access
https://www.infosecurity-magazine.com/news/threat-actors-public-apps-initial/
⚠️ Threat Actor Abuses Cloudflare Tunnels to Deliver RATs
https://www.proofpoint.com/us/blog/threat-insight/threat-actor-abuses-cloudflare-tunnels-deliver-rats
📈 Hackers Will Increasingly Build Malware Campaigns on Legitimate Infrastructure Services
https://www.forcepoint.com/blog/x-labs/hackers-build-malware-campaigns-on-legit-infrastructure
🧑💻 Using CAPTCHA for Compromise: Hackers Flip the Script
https://www.reliaquest.com/blog/using-captcha-for-compromise/
🚨 Cyber attack UAC-0001 (APT28): PowerShell command in clipboard as "entry point" (CERT-UA#11689)
https://cert.gov.ua/article/6281123
Relevant xkcd: https://xkcd.com/2228/
© Wszystkie znaki handlowe należą do ich prawowitych właścicieli.
❤️ Dziękuję za Waszą uwagę.
Znajdziecie mnie również na:
Instagramie @mateuszemsi https://www.instagram.com/mateuszemsi/
Twixxerze @MateuszChrobok https://twitter.com/MateuszChrobok
Mastodonie https://infosec.exchange/@mateuszchrobok
LinkedInie @mateuszchrobok https://www.linkedin.com/in/mateuszchrobok/
Rozdziały:
00:00 Intro
00:30 CAPTCHA
02:34 Trik
05:39 Polecenie
09:34 Co Robić i Jak Żyć?
#CAPTCHA #bezpieczeństwo #malware #kradzież #internet