A social engineering attack that tricks users into executing malicious PowerShell commands by impersonating Cloudflare's CAPTCHA verification.
The victim visits a compromised or malicious website. They're presented with what appears to be a legitimate Cloudflare CAPTCHA verification page. Everything looks authentic—the Cloudflare branding, the "Verify you are human" checkbox, and the security messaging.
After clicking the checkbox, a popup appears with "Verification Steps." This is where the attack diverges from legitimate Cloudflare behavior. The victim is instructed to press specific key combinations.
Windows + R (opens Run dialog)Ctrl + V (paste from clipboard)Enter to execute anythingThe Windows Run dialog now contains the malicious PowerShell command that was silently copied to the clipboard. If the user presses Enter, the malware payload executes with their user privileges.
Train employees to recognize and report these attacks before damage occurs.
Real CAPTCHA verification requires only mouse clicks. Any request for Win+R, Ctrl+V, or Enter is an attack.
If a website asks you to paste something, open Notepad first and paste there to see what's actually on your clipboard.
Use AppLocker or Windows Defender Application Control to limit PowerShell to signed scripts only.
Configure Script Block Logging and Module Logging to detect and investigate suspicious commands.
Train users to report unusual verification requests to IT security immediately. Early detection prevents spread.
Remember: When in doubt, don't click out.
Close the browser tab and navigate to the site directly if you need to access it.