CavalierGPT: The First Comprehensive Infostealers AI Bot - Try Now →

CAPTCHA Chaos: From X Threads to Telegram

Cybercriminals are continuously evolving their tactics to exploit human behavior and trust. In one of the latest campaigns, attackers have weaponized fake CAPTCHA verification systems—tools typically used to verify a user’s legitimacy—to deliver malicious payloads.

Introduction

This campaign demonstrates an evolution from basic fake URL-based CAPTCHAs, seen in previous attacks, to a more sophisticated Telegram-based approach. The primary targets are cryptocurrency communities, where unsuspecting users are deceived into executing malicious scripts. This novel tactic highlights the rapid innovation and adaptability of cybercriminals in delivering malware.

Infection Chain

The infection chain begins on the X platform (formerly Twitter), where attackers hijack legitimate threads, enticing users to join Telegram and channels groups under the guise of helpful discussions.

Once inside these channels, victims are prompted to complete a CAPTCHA verification using a bot designed to mimic “Safeguard” – a popular Telegram bot used for user validation. This process ultimately leads to the deployment of the Lumma Stealer malware via multiple loaders, including the IDAT Loader (also known as Hijack Loader) and the Emmenthal Loader.

Lumma Stealer Attack Diagram

Hijacking Threads on X Platform

Threat actors exploit the X platform to infiltrate legitimate threads within the cryptocurrency community. By impersonating verified accounts or creating accounts with deceptive names and avatars that closely resemble the original poster, these actors strategically reply to popular posts from genuine crypto influencers. Their comments mimic the tone and content of the original thread, giving the appearance of helpful contributions to the discussion. Embedded within these replies are links directing users to Telegram groups and channels, setting the stage for the next phase of the attack.

Hijacked X Twitter Threads with Telegram Groups

Fake CAPTCHA via Telegram Mini Apps

When victims click on the Telegram link, they are presented with a post asking them to verify their identity using a fake Safeguard bot.

Velvet Uniform Telegram Channel

Clicking on the Tap to Verify button leads to fake Telegram bot with a handle resembling legitimate Safeguard variations, such as:

  • OfficiaISafeguardRobot
  • SafeguardsAuthenticationBot
  • Safeguardsauthbot
  • OfficiaISafeguardRobot
  • SafeguardOfficiaIRobot
  • Safeguard_Officialbot

Based on the victim’s device, the bot tailors its behavior:

  • Mobile Devices: A message is displayed stating that verification is not supported on mobile devices.
Mobile Devices Not Supported Message
  • Mac Machines: A command line is executed, delivering the Atomic Stealer malware.
Mac Malware Execution Script & User Interface
  • Windows Machines: The bot simulates a verification process by displaying a fake CAPTCHA that always fails, regardless of the victim’s input. It then suggests an “alternative verification method,” copying a malicious command to the victim’s clipboard and instructing them to execute it manually. Additionally, the bot sends an infection notification back to the attacker.
Windows Machine Execution Script
Windows Machine User Interface & Telegram Messages

Clipboard Command

During the attack, two distinct loaders are observed, both delivering the same final payload: the IDAT Loader (also known as the Hijack Loader) and the Emmenthal Loader.

IDAT Loader

The malicious command copied to the victim’s clipboard fetches a second-stage PowerShell script from the attacker’s Command and Control (C2) server and executes it.

Powershell Execution Code
  • The second-stage script sends a POST request to the C2 endpoint /sendNotification.php, containing the message “PowerShell script executed successfully.”
  • Following this, the script downloads a ZIP archive, extracts its contents, and executes it. The extracted content is the Hijack Loader, which ends up loading the final payload – Lumma stealer.

Emmenthal Loader

The Emmenthal Loader begins its execution by leveraging mshta.exe to retrieve and execute an HTA file from the C2 server.

meow182 Telegram Link

The HTA file includes a large binary blob that in between has the script to be executed within <script> tags. While these <script> tags are filled with junk code, the final extracted executed script is a six-line JavaScript code. This script constructs the next-stage payload by decoding an obfuscated string blob embedded at the beginning of the HTA file.

JavaScript Execution Code

This JavaScript code executes heavily obfuscated PowerShell scripts in memory, ultimately delivering and executing the final payload – Lumma Stealer.

How Morphisec Can Help

Morphisec’s Automated Moving Target Defense (AMTD) technology proactively disrupts attacks with attack surface randomization — AMTD dynamically reshapes application memory, eliminating the framework attackers rely on. Morphisec preemptively neutralizes attacks at the earliest stage (including Lumma Stealer malware and other loaders), preventing any impact on the environment.

With its ultra-lightweight agent, Morphisec prevents unknown attacks and advanced threats while providing unprecedented visibility, requiring no prior knowledge of signatures, behavioral patterns, or indicators of attacks (IoAs).

Schedule a demo today to see how Morphisec stops advanced campaigns and emerging threats.

Get a demo of Morphisec

IOCs

C2

  • truecoders[.]cyou
  • byteguard[.]cyou
  • rainstorm[.]cyou
  • codecrafters[.]cyou
  • stem-clasping[.]kliplaxupoi[.]shop
  • 92p1ka158tr2[.]com
  • cloudewahsj[.]shop
  • rabidcowse[.]shop
  • noisycuttej[.]shop
  • latechilderni[.]cyou
  • meow182[.]com

ZIP – Hijack Loader

  • 4bf9b71414d8b06a02687ebe4caf61ad558bb9c2
  • 44f448e150266cde73808a2b4226314358d4a8f5
  • c17a7a559a47ab7e835eef840c55c490fdb93729

HTA – Emmenthal Loader

  • a3f3d7f6704ccb0d8ba4431ad5f5bfa088c93dbd
  • f34e950726b4a4ba9efcb34e5317971e5a60866b
  • a50f2940e15b68c60d688dd3ce725a6ccf3d0831
  • dd062bdcb616def4ff69f0e3816eb161fe0f537e

Don’t Stop Here

More To Explore

BE THE FIRST TO KNOW

Get FREE access to Cavalier GPT

Stay informed with the latest insights in our Infostealers weekly report.

Receive a notification if your email is involved in an Infostealer infection.

No Spam, We Promise

BE THE FIRST TO KNOW

Get FREE access to Cavalier GPT

Stay informed with the latest insights in our Infostealers weekly report.

Receive a notification if your email is involved in an Infostealer infection.

No Spam, We Promise