September 19th, 2024

Windows PowerShell Phish Has Scary Potential

A phishing campaign targeting GitHub users employs deceptive emails about security vulnerabilities, using a CAPTCHA to execute Lumma Stealer malware via Windows PowerShell, posing risks to less experienced users.

Read original articleLink Icon
Windows PowerShell Phish Has Scary Potential

A recent phishing campaign targeting GitHub users has raised concerns due to its sophisticated use of Windows PowerShell to deliver malware. The phishing emails, which appear to come from GitHub's security team, warn recipients about vulnerabilities in their repositories and direct them to a malicious link. Upon visiting the link, users are prompted to complete a CAPTCHA that involves pressing specific key combinations. This sequence opens the Windows "Run" prompt and executes a command that downloads a password-stealing malware known as Lumma Stealer. While experienced programmers are likely to recognize the scam, less tech-savvy users may fall victim to this tactic. The article highlights the potential for this phishing method to evolve and suggests that Microsoft should consider restricting PowerShell access for average users to mitigate risks. However, Microsoft advises against disabling PowerShell due to its importance in system operations. The article concludes by emphasizing the need for awareness among less knowledgeable Windows users regarding such phishing attempts.

- A phishing campaign is targeting GitHub users with emails about security vulnerabilities.

- The scam uses a CAPTCHA that tricks users into executing malware via Windows PowerShell.

- The malware, Lumma Stealer, is designed to steal stored credentials from victims' PCs.

- Experienced users are less likely to fall for the scam, but less tech-savvy individuals are at risk.

- There are calls for Microsoft to consider restricting PowerShell access for average users to enhance security.

Link Icon 5 comments
By @mrguyorama - 5 months
Why can a website silently add stuff to my clipboard anyway? Firefox and Safari require "transient activation" to enable clipboard actions, which apparently only means you clicked your mouse (anywhere) or made a keystroke. What a brilliant security/permission strategy for such an important function, which can do things like expose your password, modify copied links, shuttle information across web page security and isolation boundaries etc

Chrome at least requires a prompt for reading clipboard contents, which is apparently "diverting from the specifications"!

Who came up with this? Why is every feature in web browsers and javascript built in the dumbest way possible? At least in Win32 when it says "you should only touch the clipboard on request from the user" they have the excuse that it was 1995 and there was very little information to muck with or steal on the average computer! Even then they still worked towards hardening the functionality.

Web browsers implemented this in 2018!

By @AshamedCaptain - 5 months
I do not understand how this works. I thought the default PS policy on all versions of Windows was not to run "unsigned" PS scripts by default (precisely for this reason). Or at least I've personally seen that a myriad times.

So, are these malware scripts signed, has MS relaxed the default PS policy, do users relax it, or has this malware found another way around it?

By @speckx - 5 months
By @mimi89999 - 5 months
Shouldn’t Windows just show a huge warning explaining the implications of such actions when a user who has never used the Windows Run function nor PowerShell suddenly attempts to run some suspicious code pasted form the clipboard?