heroui logo

Windows PowerShell FakeCAPTCHA Clipboard Execution

Splunk Security Content

View Source
Summary
This detection rule targets malicious operations involving PowerShell that are indicative of fake CAPTCHA or ClickFix clipboard hijacking schemes. Specifically, the rule focuses on PowerShell executions that use hidden window parameters combined with specific keywords related to CAPTCHA and verification processes. These social engineering tactics trick users into inadvertently executing harmful commands they have copied to their clipboard. Such commands often deliver payloads that serve as information stealers or remote access trojans, posing significant security risks.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Process
ATT&CK Techniques
  • T1204
  • T1059.001
  • T1204.001
  • T1059.003
Created: 2025-05-14