Let's be real. Elderly people or most of the boomer generation will fall for this and probably some of the younger people, without IT or security background would also.
You're right, but you're technically also wrong. Yes, people are tired of it, but that would actually mean less people would likely fall for it. Apparently when you're tired of something, you go ahead and interact with it more for some reason, but normal people do not. They see the thing and they immediately disengage. I, for example, have closed thousands of pages when I saw a captcha and simply couldn't be bothered because it wasn't important enough. I am very fatigued of them and therefore stop interacting with not just pages but even whole sites that want me to do even one. Because I am tired of them, not only will I not do their captcha, I will never use their site again if I suspect I will be forced to do so to get what I wanted out of them in the first place. You've also clearly never dealt in much YGO if you think that people don't immediately forfeit when seeing their opponent slap down a card from decks they're tired of seeing. Something that happens because fatigue = disengagement.
The crazy thing is this type social engineering attack bypasses browser sandboxing (browser can't launch executables on the host).. pretty ingenuous but scary stuff. All the more reason it's essential to use ad-blocking software.
Unfortunately even the simplest and dumbest trick works for most of the average users, and that's why they keep appearing. Under circumstances, even the most careful may fall for it. Thank you for this video of analyzing the situation (and to everyone else of course who did the research and spread awareness about it).
Even a techy person could fall for it if they're just going through the motions. Never underestimate just how much you've been programmed to follow along with random bullshit processes.
people constantly fall for discord login scams and pollute servers with more bot scams, i could see a fake captcha being even more effective than those
Maybe because your average user isnt usualy computer enthusiast and have computer as "necessary evil". Usualy as workstation or machine for home use, to play movies and download porn. The technology goes forward so quick even professionals have "heads full" and often dont see the obvious. Lack of time is general issue and if you have deadlines and for example also staff shortage, you will fall for even more stupid things. Thats why there are ICT departments in companies.
John Hammond when he sees an Western name like Arnold Schwarzenegger: "That's too easy!" Also John Hammond when he sees basically a four-letter non-Western name: "I'm sorry, I quit."
John, thanks for this. I am doing a write up so to speak on captchas. Mainly because many people who are just users do not know the dangers. Besides the dangers, with AI, these are useless and verification is so much more complicated than I at first assumed. Heck as we speak those working on countering this and find better ways are still finding ways that are better than what they roll-out almost daily, doing a great job for sure but for this I have not quite seen as much research being done. Any rate long story short, much appreciated.
@@iamyourgreatgreatgreatgrea6291 it was on a pirating website so ... not risking that the website to go down + why tf do u want the website if you know how the hack work?
Never seen this one but just opening something on the computer itself is fishy. Once you get to the fact that they want you to paste something, it immediately tells you they copied something to your clipboard when you pressed the button. I can see clicking it (they're constantly changing these systems around for no reason, so the fact that it looks a little different isn't necessarily weird) but the first is just an immediate red flag and the second is a giant rainbow kaleidescope flag unless you don't know copy and paste.
This is great😂 I don’t want to be the analyst that has to work up a solution to prevent clients from using the clipboard to evade the browser sandbox. Seriously, always interesting. Also thanks for sharing some of the other examples and writeups showing how our users fall victim to these payloads 🔥🔥
No, but, shouldn't there be a warning when you copy/paste into the terminal, it did that in my old linux system? Look, when you open web developer tools, there is warning because this is used by scammers to fool non tech people, so why is it not obvious, that anything else where the user is copy/pasting into a field which has connection to terminal, then there should be a warning, preferebly a confirmation via UAC? When you download a file from the internet, it has certain restricted rights, same should be the case with anything copied from a web site into a terminal or system form field.
I posted about the potential for this on Reddit years ago, and no joke was met with so much toxic/know it all replies that i deleted the post. "I told you so" is never a response i want to give in relation to malware.
i'm starting to think the analyst they are referring to may be me !, I had responded to this exact looking incident with the same IOC'S but I knew the user manually ran this powershell as I could see it in the logs the question was why and how and where did they get the this encoded command. did some digging and came across unusual amounts of redirects and yep came across the download step domain with a fake captcha getting the user to open the run window and paste in the command. very simple but clearly effective.
@@tsuketsu9889 You don't have to be tech literate to Just Say No. No to clicking any links or buttons in email. No to giving personal info over the phone (or even answering a call). No to running commands. No to doing anything asked that is unusual. In fact I would think being tech illiterate should make it easier. If you don't understand it, don't do it. If in doubt, don't do it.
I use the old fashioned copy style on my web site because the new is way too advanced, and the old one works, and I assume will also work for a very long time for backwards compatibility. But it's not the browsers fault and not javascripts fault either, it is a security flaw in the OS, that data from an unsafe area is not validated before execution. It's very clever, because it is not directly obvious that it is a security flaw, but it is.
Oh God, as soon as I saw the "Verification Steps"... Like others are saying in the comments, most of us know immediately something fishy is going on, but my mom, dad, grandmother etc would all just follow those steps blindly, not knowing what Win+R does or opens, not knowing they're about to paste something that's been set on their clipboard,... It's so scummy from these bad actors, they know exactly that most people have no clue what all of this means. It's so sad, and I feel sorry for every victim. They're paying the price just for not being familiar enough with these things.
glad there is a barrier between for it to work... if it were the exact same looking captcha AND only need to click, that would be a nightmare! also, i got your DevSecCon 2024 ad on your video around the 9 minutes mark lol, not sure if you pay your self and have 0 gains or a net loss... still was funny seeing your ad playing over your ad!
This video shined a light on questions I had. ty Am, I the only one who still now and then, wonders how people's boredom keeps turning...well ugly 😐 😒 🙄 😑
The fact they have to do this, is desperate. Problem: Everytime they "invent" a new vector, it's easier to detect them. That multistage-obfuscation is just hilarious.
because encoded commands are actually used i use it sometimes, a b64 encoded string, instead of dealing with the crazyness of quote marks but yeah would be better if that gets blocked from being runned by the "run" thing, it is useful but i think it should be limited to running from console or as a command runned by a program
Fun fact: The user click on the capcha is required for some browser fearures like going to fullscreen or using clipboard. When it's done in the "contructor" it just throws an error.
Bravo!!! But !! I haven't understand bro, there is a lot of high tec information too much to understand, well congratulations that you know too much, but did we got infected finally? is it dangerous ? should I format my pc and keep my data safe on an hdd? what should we do from the moment we did dropped in that f.trap. :)
I was sus when i saw this captcha and i would have fallen for it, if I was not little educated on some technical stuff, so I googled and here you go found this video.
Kinda off topic, but now you point out the Run command order key, it makes me wonder why Microsoft didn't just store the command history as a MULTI_SZ - worried about size limit maybe?
I will click 10 times or verify 10 times because the CAPTCHA loop infinitely then I will block the website from my search engine results. And for me recently some website will jump to a separate page that just have CAPTCHA in the page so if it happens I will not able to tell if that is a fake site or not because the website is show in the search result.
i appreciate your videos, but judging by video title, i thought its some brand new 0 day drive-by on a click exploit, but all it is, is yet another social engineering hack where you have to do stupid things to win stupid prizes. have you ever showcased drive by exploits though? if there are any, in 2024
I started to refuse to do captchas about a year ago for anything except banking or government services. I just click off and find what I need elsewhere. Seeing malware delivered via captcha just reinforces my decision.
As windows admin windows+R is immediate and final red flag I would need to nope from that site, but for not powerusers it is quite smart way . Anoter reminder to not use your windows pc with admin priveledges. Have good password on your admin account stored somewhere secure in few safe places digitally or physically (not your notepad or word file without any encription)
lol. hate to admit it .. if i accidentally ran into this at the end of the week .. another time when i m feeling tired .. i’d probably fall for it. i know people who would fall for it .. simply because there are captcha variations that ask you interact via keyboard as proof.
I accidentally fell for it ,I then realised I f*** ed up ,I ran multiple full scans which didn’t find anything ,and then closed my computer and changed my passwords from another device ,am I still compromised ,what do I do next
i can see even people that have decent knowledge on how to avoid malware and all that stuff falling for this since you have to have alot more knowledge about malware and all that stuff to know instantly what this does somewhat so you know its malware
Will anyone fall for that? Well... for my mom to use the computer, I had to make shortcuts to all the sites she uses on her desktop. It took her like a week to understand that when she clicks another link it opens a new tab and not closes the other site. When one time by mistake she opened a new tab and it launched a Google search page, she couldn't understand what happend and just wasn't able to use the computer until I came and "fixed it". She is "just" 50. Yeah. I'd say she would fall for that if she could figure out what the windows key is.
Why does shell support base64 on the command line? hell... why does Microsoft still hide file extensions by default? ohhh I see they implemented bash piping in windows and it's enabled by default ... The security team at micrsoft is doing wonders.
This mostly seems pretty pointless. Anyone who doesn't at least have the basics of tech are probably not going to want to do "whatever that means" as far as they're concerned and anyone who is online even a moderate amount in general are probably too tired of seeing these things to bother. You don't need any amount of tech savvy to be tired of seeing captchas at which point you just close the page. In an ironic twist of security events, the vast majority of people who might see these, are probably going to be protected by, essentially, simple laziness, lol.
can you please show how to find "pishing" email location? every Sunday, i got to my mail "paypal" post service" mastercard" re connection . i need to know from where the email came from tnx p.s love your channel
Sorry to be cynical, but really not an interesting attack vector. John admits this multiple times, and I waited for more to come out of it, but there really wasn't any more substance to it. The Twitter (and RUclips) comments saying this would fool people are largely missing the point. It's a social engineering technique that has the same motivation that MFA fatigue attacks do, this is not anything new. Appreciate the attempt to give it some relevance by trying to make it more convincing. Also, kinda odd to review the .md file to us in the text editor.
It's not the CAPTHAs fault, actually, it is a security flaw in the OS, not an obvious flaw I admit, but it is a violation of good security practice, when data which is coming from an unsafe area and then moved into the system area for execution is not verified by the user. The same is true when you download an executable from the internet, which is unsafe by defasult, again when you run that executable the user should be asked for verification by UAC.
if the malware run automaticaly when you click captcha, then it will be a serious problem, BUT if it runs AFTER you copying some nosense code to your runtime, then, what kind of person would do that?
Your grandma would do that. She has no idea that what she's doing is wrong. Infact she most probably doesn't even know what "powershell" and "base64" even mean.
i just got tricked with this an hour ago then I searched this video. is there any way to remove this after being infected? every time i open chrome, all profiles opens too. i think my information got hacked. i am so fed up with captchas and i thought its just an ordinary captcha with different captcha methods. i feel so dvmb.
Hey John , very good video ! I was wondering if I can help you with more Quality Editing in your videos and make Highly Engaging Thumbnails which will help your videos to get more views and engagement . Please let me know what do you think ?
I could definitely see people falling for this. The fatigue among users encountering captchas is real. That's what this relies on.
Let's be real. Elderly people or most of the boomer generation will fall for this and probably some of the younger people, without IT or security background would also.
You're right, but you're technically also wrong. Yes, people are tired of it, but that would actually mean less people would likely fall for it.
Apparently when you're tired of something, you go ahead and interact with it more for some reason, but normal people do not.
They see the thing and they immediately disengage.
I, for example, have closed thousands of pages when I saw a captcha and simply couldn't be bothered because it wasn't important enough.
I am very fatigued of them and therefore stop interacting with not just pages but even whole sites that want me to do even one.
Because I am tired of them, not only will I not do their captcha, I will never use their site again if I suspect I will be forced to do so to get what I wanted out of them in the first place.
You've also clearly never dealt in much YGO if you think that people don't immediately forfeit when seeing their opponent slap down a card from decks they're tired of seeing.
Something that happens because fatigue = disengagement.
@@ardwetha Yeah especially if you offer them free roblox
The crazy thing is this type social engineering attack bypasses browser sandboxing (browser can't launch executables on the host).. pretty ingenuous but scary stuff. All the more reason it's essential to use ad-blocking software.
Yeah if youre based pirating shit at your grandmas house lol.
Nobody who has a job is falling for that shit.
It's evil genius
I know A LOT of people, who would fall for it
Unfortunately even the simplest and dumbest trick works for most of the average users, and that's why they keep appearing. Under circumstances, even the most careful may fall for it.
Thank you for this video of analyzing the situation (and to everyone else of course who did the research and spread awareness about it).
its very clever if you think about it. "techy" people would not fall for it, but normal people, would probably fall for it
Even a techy person could fall for it if they're just going through the motions. Never underestimate just how much you've been programmed to follow along with random bullshit processes.
Linus tech tips falls for it
@@MrNaesme hold alt f4 to check if there's malware
people constantly fall for discord login scams and pollute servers with more bot scams, i could see a fake captcha being even more effective than those
Ty that worked @@truthboom
Any child offered vbucks, roblox, etc, playing on their parents/family computer would absolutely fall for this
that's what account systems are for
Don't make toddlers your sysadmin
seems stupid but the sad part is it works very well for your average user
Maybe because your average user isnt usualy computer enthusiast and have computer as "necessary evil". Usualy as workstation or machine for home use, to play movies and download porn. The technology goes forward so quick even professionals have "heads full" and often dont see the obvious. Lack of time is general issue and if you have deadlines and for example also staff shortage, you will fall for even more stupid things. Thats why there are ICT departments in companies.
Said an apple user....
The one John made, I feel, would trick so many people... Much more than the attacker's version shown before that.
John Hammond when he sees an Western name like Arnold Schwarzenegger: "That's too easy!"
Also John Hammond when he sees basically a four-letter non-Western name: "I'm sorry, I quit."
Schwarze WHAT
To be fair, non western names are generally much harder to pronounce for native English speakers.
John, thanks for this. I am doing a write up so to speak on captchas. Mainly because many people who are just users do not know the dangers. Besides the dangers, with AI, these are useless and verification is so much more complicated than I at first assumed. Heck as we speak those working on countering this and find better ways are still finding ways that are better than what they roll-out almost daily, doing a great job for sure but for this I have not quite seen as much research being done. Any rate long story short, much appreciated.
I DON'T BELIEVE IT ... I JUST SAW IT YESTERDAY AND ALMOST FELL FOR IT!!!
me too but when they said Crtl + V i knew something was fishy so why not hack the hackers site
Thank god you didn't provide any info about where you saw it, truly helps people so they don't encounter it.
@@iamyourgreatgreatgreatgrea6291 it was on a pirating website so ... not risking that the website to go down + why tf do u want the website if you know how the hack work?
Never seen this one but just opening something on the computer itself is fishy.
Once you get to the fact that they want you to paste something, it immediately tells you they copied something to your clipboard when you pressed the button.
I can see clicking it (they're constantly changing these systems around for no reason, so the fact that it looks a little different isn't necessarily weird) but the first is just an immediate red flag and the second is a giant rainbow kaleidescope flag unless you don't know copy and paste.
i fell for it today bruh i didnt even notice it because i was multi tasking
This is the biggest "facepalm" foothold I have seen in 2024
This is great😂 I don’t want to be the analyst that has to work up a solution to prevent clients from using the clipboard to evade the browser sandbox. Seriously, always interesting. Also thanks for sharing some of the other examples and writeups showing how our users fall victim to these payloads 🔥🔥
No, but, shouldn't there be a warning when you copy/paste into the terminal, it did that in my old linux system?
Look, when you open web developer tools, there is warning because this is used by scammers to fool non tech people, so why is it not obvious, that anything else where the user is copy/pasting into a field which has connection to terminal, then there should be a warning, preferebly a confirmation via UAC?
When you download a file from the internet, it has certain restricted rights, same should be the case with anything copied from a web site into a terminal or system form field.
New fear unlocked.
Guess I am declaring myself as ROBOT.
I got a John Hammond ad ln this video haha
Same lol
Same
Thank you for sharing. I just read this from the news and it freaks me out.
Gladly, it is just so obvious that it is a mallware.
I posted about the potential for this on Reddit years ago, and no joke was met with so much toxic/know it all replies that i deleted the post. "I told you so" is never a response i want to give in relation to malware.
guess you were right, for better or worse
Reddit moment
Watching a John Hammond and then i get an ad from John Hammond. Now that's marketing at work
The more complex things get, the easier simple weapons seem to work.🤔
boom
We need to make Win + R to require you to type "allow pasting" for first time like browser dev tools does. Normies would get stuck behind skill issue.
They'll just add: Type "allow pasting"
i'm starting to think the analyst they are referring to may be me !, I had responded to this exact looking incident with the same IOC'S but I knew the user manually ran this powershell as I could see it in the logs the question was why and how and where did they get the this encoded command. did some digging and came across unusual amounts of redirects and yep came across the download step domain with a fake captcha getting the user to open the run window and paste in the command. very simple but clearly effective.
greetings from the Ethical Hacking Indonesia community John !
You'd have to be a robot to complete those steps.
That's so funny
Old people exist. Unfortunately, they are the most targeted
@@ShortBusRejectz Calling old people robots now?
Tech illiterate people exist, and are more common than you think.
@@tsuketsu9889 You don't have to be tech literate to Just Say No. No to clicking any links or buttons in email. No to giving personal info over the phone (or even answering a call). No to running commands. No to doing anything asked that is unusual. In fact I would think being tech illiterate should make it easier. If you don't understand it, don't do it. If in doubt, don't do it.
You're right about that use of copy - I encountered in a pentest I did a few months ago.
I use the old fashioned copy style on my web site because the new is way too advanced, and the old one works, and I assume will also work for a very long time for backwards compatibility. But it's not the browsers fault and not javascripts fault either, it is a security flaw in the OS, that data from an unsafe area is not validated before execution. It's very clever, because it is not directly obvious that it is a security flaw, but it is.
I love this, and I know people at work who would have followed along without thought.
Oh God, as soon as I saw the "Verification Steps"... Like others are saying in the comments, most of us know immediately something fishy is going on, but my mom, dad, grandmother etc would all just follow those steps blindly, not knowing what Win+R does or opens, not knowing they're about to paste something that's been set on their clipboard,... It's so scummy from these bad actors, they know exactly that most people have no clue what all of this means. It's so sad, and I feel sorry for every victim. They're paying the price just for not being familiar enough with these things.
funnily enough my add before this video started was john Hammond talking about deadsec 😅 very cool
First.. i remember when this video was posted 10 mins ago.. I'm at 12:10. Love the begining and the sponsor of this very video.
glad there is a barrier between for it to work... if it were the exact same looking captcha AND only need to click, that would be a nightmare! also, i got your DevSecCon 2024 ad on your video around the 9 minutes mark lol, not sure if you pay your self and have 0 gains or a net loss... still was funny seeing your ad playing over your ad!
Great breadcrumb on the run dialog. Didn’t know that. 🎉
just came across this website and found this video.
its back up now
Thank you for this I run linux (not trying to sound better just use linux as I am on an old pc)still interesting to see what people are trying.
that powershell bloked by EDR in my office. i dont expect that the cyber attack happens in many places
This video shined a light on questions I had. ty
Am, I the only one who still now and then, wonders how people's boredom keeps turning...well ugly
😐 😒 🙄 😑
These longer videos for me are ok due to somewhat intresting topics you cover but that's just me ^^
It's better for people to know even the more simple methods so they don't get overlooked.
Wtf i just got an ad with you in it on your video, thought i was trippin for a sec.
is there any way to disable the base64 decoding in powershell commands?
The fact they have to do this, is desperate. Problem: Everytime they "invent" a new vector, it's easier to detect them. That multistage-obfuscation is just hilarious.
Why are encoded commands allowed in the first place?
Probably because its useful depending on what you want your app to do
Probably a way to deal with horrendously nested quote marks, so you don't have to add nested escape characters.
because encoded commands are actually used
i use it sometimes, a b64 encoded string, instead of dealing with the crazyness of quote marks
but yeah would be better if that gets blocked from being runned by the "run" thing, it is useful but i think it should be limited to running from console or as a command runned by a program
to be clear i used once b64 but it was just for something that i wasnt going to publish, bad idea for shared work imo
But why on Normie computers that should never need to touch CMD?
I got an ad while watching this. You were in the ad.
Fun fact: The user click on the capcha is required for some browser fearures like going to fullscreen or using clipboard. When it's done in the "contructor" it just throws an error.
Surprised this wasn't a thing earlier
clipboard history should be a web permission denied by default.
i love clever dynamic testing, but dont like dynamic testing to avoid or get a head start in static testing of malware
I got a John Hammond snyk ad, on a John Hammond video 😂
Wow, had a John Hammond Ad on a John Hammond Video 🤣🤣🤣
that JS code looks like something that I'd write. Plain SIMPLE!!!
Bravo!!! But !! I haven't understand bro, there is a lot of high tec information too much to understand, well congratulations that you know too much, but did we got infected finally? is it dangerous ? should I format my pc and keep my data safe on an hdd? what should we do from the moment we did dropped in that f.trap. :)
Oh the irony of hitting Enter being the action that allows the malware to enter your PC.
I was sus when i saw this captcha and i would have fallen for it, if I was not little educated on some technical stuff, so I googled and here you go found this video.
i fell for this the first time i saw it, now i know
His hair is like a delicious croissant
Kinda off topic, but now you point out the Run command order key, it makes me wonder why Microsoft didn't just store the command history as a MULTI_SZ - worried about size limit maybe?
woah thanks for sharing
I will click 10 times or verify 10 times because the CAPTCHA loop infinitely then I will block the website from my search engine results. And for me recently some website will jump to a separate page that just have CAPTCHA in the page so if it happens I will not able to tell if that is a fake site or not because the website is show in the search result.
i appreciate your videos, but judging by video title, i thought its some brand new 0 day drive-by on a click exploit, but all it is, is yet another social engineering hack where you have to do stupid things to win stupid prizes. have you ever showcased drive by exploits though? if there are any, in 2024
There are plenty. I have quite a few.
@@ronpaul9172 "I was busy hoarding computer virus samples while you were out honing your social skills and living a normy life"
@@ronpaul9172 a video with showcasing one would be fun
2:41 You know it's fake when it downloads an EXE and says "run this to prove you're human"
Hei im a newbie and i think got infected this malware, how to disable and erase the malware? thankyou!
I started to refuse to do captchas about a year ago for anything except banking or government services. I just click off and find what I need elsewhere. Seeing malware delivered via captcha just reinforces my decision.
Please make more complex reverse enginnering malware videos. maybe show how to do analysis on exe files
I fell for it. I thought its just another innocent way of captcha. Now my PC is offline
As windows admin windows+R is immediate and final red flag I would need to nope from that site, but for not powerusers it is quite smart way .
Anoter reminder to not use your windows pc with admin priveledges. Have good password on your admin account stored somewhere secure in few safe places digitally or physically (not your notepad or word file without any encription)
Generall you are getting the BAG 🏦🏦🏦😤🙏♥️
DUDE I JUST SAW YOU ON A AD TALKING ABOUT A SAFE SOMETHING IDK I FORGOT
I just met this today… one of our user ran that code… luckily the file instantly got erased by av.
lol. hate to admit it .. if i accidentally ran into this at the end of the week .. another time when i m feeling tired .. i’d probably fall for it.
i know people who would fall for it .. simply because there are captcha variations that ask you interact via keyboard as proof.
Neofetch im looking at you
I don't mean to brag but I'm the one million eight hundred twelve thousand four hundred and thirty second subscriber.
Getting into this video, I was genuinely wondering "are we really talking about the fake captcha that asks for notifications and spam you with ads?"
And another power-user feature about to be removed...
how to fix this?
11:34 jai minton with JH low quality face. Lol😅😅
Your version is even more scary, as it just looks like a coding magic trick.
Sir can you give us roadmap for beginner to advance and also the courses that contain things bcz I am also new and faced difficulties about roadmap
I accidentally fell for it ,I then realised I f*** ed up ,I ran multiple full scans which didn’t find anything ,and then closed my computer and changed my passwords from another device ,am I still compromised ,what do I do next
MY EYES!
what antiwirus should i run or do i reinstall windowos??
Dumber is more effective. I sniff convenience winning over.
What to do after being infected?
Resetting my PC did the trick for me. I kept my personal files
i can see even people that have decent knowledge on how to avoid malware and all that stuff falling for this since you have to have alot more knowledge about malware and all that stuff to know instantly what this does somewhat so you know its malware
What is the interactive sandbox program used?
Any-?
if someone falls for it, what does he do?
If I click only on the blue indication and open menu I take virus or I'm OK?
Your answer is my mom would fall for that
"Verification Steps"
"CTRL + V and Enter"
Hmm ... seems legit!
Will anyone fall for that? Well... for my mom to use the computer, I had to make shortcuts to all the sites she uses on her desktop.
It took her like a week to understand that when she clicks another link it opens a new tab and not closes the other site. When one time by mistake she opened a new tab and it launched a Google search page, she couldn't understand what happend and just wasn't able to use the computer until I came and "fixed it".
She is "just" 50.
Yeah. I'd say she would fall for that if she could figure out what the windows key is.
I fell for it because I´m a dumdum, how do I fix it?
Can't a hacker just delete that registry key to not leave any trace?
lol I was expecting a drive-by zero-day wth is this 😆
Why does shell support base64 on the command line? hell... why does Microsoft still hide file extensions by default? ohhh I see they implemented bash piping in windows and it's enabled by default ... The security team at micrsoft is doing wonders.
Someone needs to show this video to lenard at LTT 😂
This mostly seems pretty pointless. Anyone who doesn't at least have the basics of tech are probably not going to want to do "whatever that means" as far as they're concerned and anyone who is online even a moderate amount in general are probably too tired of seeing these things to bother.
You don't need any amount of tech savvy to be tired of seeing captchas at which point you just close the page.
In an ironic twist of security events, the vast majority of people who might see these, are probably going to be protected by, essentially, simple laziness, lol.
can you please show how to find "pishing" email location? every Sunday, i got to my mail "paypal" post service" mastercard" re connection . i need to know from where the email came from tnx p.s love your channel
Sorry to be cynical, but really not an interesting attack vector. John admits this multiple times, and I waited for more to come out of it, but there really wasn't any more substance to it. The Twitter (and RUclips) comments saying this would fool people are largely missing the point. It's a social engineering technique that has the same motivation that MFA fatigue attacks do, this is not anything new. Appreciate the attempt to give it some relevance by trying to make it more convincing. Also, kinda odd to review the .md file to us in the text editor.
Just another reason I HATE CAPTCHA BS!
It's not the CAPTHAs fault, actually, it is a security flaw in the OS, not an obvious flaw I admit, but it is a violation of good security practice, when data which is coming from an unsafe area and then moved into the system area for execution is not verified by the user. The same is true when you download an executable from the internet, which is unsafe by defasult, again when you run that executable the user should be asked for verification by UAC.
I hate the internet. I wish I never got into computers lol.
Is there an any way to get rid of this malware? I fell for it 😅
Me too. Please help 😢
me 2
if the malware run automaticaly when you click captcha, then it will be a serious problem, BUT if it runs AFTER you copying some nosense code to your runtime, then, what kind of person would do that?
Your grandma would do that. She has no idea that what she's doing is wrong. Infact she most probably doesn't even know what "powershell" and "base64" even mean.
Getting rid of PS5 is the most effective way to prevent modern malware, you do not even need AV.
i just got tricked with this an hour ago then I searched this video. is there any way to remove this after being infected? every time i open chrome, all profiles opens too. i think my information got hacked.
i am so fed up with captchas and i thought its just an ordinary captcha with different captcha methods. i feel so dvmb.
I also would like to know
Hey John , very good video ! I was wondering if I can help you with more Quality Editing in your videos and make Highly Engaging Thumbnails which will help your videos to get more views and engagement . Please let me know what do you think ?