A persistent malware campaign is exploiting CAPTCHA prompts to steal data from victims. The scheme relies on users not questioning the steps in a CAPTCHA prompt. Users are directed to a website offering attractive content, such as music or movies. A CAPTCHA prompt asks them to prove they are not a robot, and if they follow the steps, the website copies a text string to their clipboard. This allows hackers to download and install malware, which can then steal sensitive data.

Threat Groups Using RMM Tools for Initial-Stage in Attacks
Hackers are increasingly using remote monitoring and management (RMM) software as a first step in cyberattacks, particularly in email campaigns, according to researchers at cybersecurity