120
submitted 1 month ago* (last edited 1 month ago) by UnH1ng3d@lemmy.world to c/pcmasterrace@lemmy.world

I just saw this and felt I should share it. I'm sure most people here wouldn't fall for it but it can't hurt to make sure 👍

Edit: I just wanted to add, I have no idea what this tried to copy. I'm using Firefox on Linux which is perhaps why it didn't make it to my clipboard 🤷

top 50 comments
sorted by: hot top controversial new old
[-] ceiphas@lemmy.world 46 points 1 month ago
[-] x00z@lemmy.world 3 points 1 month ago

Should I keep a copy of the file that I can then start using again after payment?

[-] LovableSidekick@lemmy.world 2 points 1 month ago

Have a blessed day!

[-] slazer2au@lemmy.world 22 points 1 month ago

If your web browser tells you to do something outside of your web browser, you shouldn't.

[-] kruhmaster@sh.itjust.works 19 points 1 month ago

Please check your phone for the verification code we sent you 🤣🤣🤣🤣🤣

[-] Kbobabob@lemmy.world 2 points 1 month ago

I get my messages in my browser though

[-] KairuByte@lemmy.dbzer0.com 12 points 1 month ago

Many non tech users wouldn’t even realize they were leaving the browser.

[-] Zeroc00l@sh.itjust.works 8 points 1 month ago

Non tech users...like the Amish?

[-] KairuByte@lemmy.dbzer0.com 9 points 1 month ago

I meant “non tech literate” but I’ll own it at this point 🤣

[-] zdanger@lemmy.world 13 points 1 month ago

My brother ran into this while car shopping on a reputable Utah based Toyota dealership's website. It was a powershell script that downloaded and executed something from a base64 encoded Bitly URL. Bitly took down the URL so we couldn't see where it was redirecting.

It seems like attackers are embedding this in vulnerable legit websites

[-] joshcodes@programming.dev 7 points 1 month ago

Yeah, some wordpress themes have vulnerable bits that allow attackers to inject cross site scripting attacks into the page via various methods. Some have pivoted to using wordpress plugins which is a newer method I don't entirely understand yet.

[-] UnH1ng3d@lemmy.world 4 points 1 month ago

Thanks, that's very interesting to know. I assumed it was just a malicious site before.

[-] joshcodes@programming.dev 13 points 1 month ago

Oooo I'm researching this. We call some of them click fix and others clearfake but theyre all fake captcha. Its either from vulnerable wordpress themes or plugins so update ya sites for the love of Torvalds.

They're basically a method for infostealers to get downloaded onto the device. They're kinda nasty and some lead to ransomware if youre really unlucky. The usual payload is intended to leach off an individual and steal passwords, crypto addresses, etc, but as soon as they find out you're an organisation computer, they use your machine for initial access and potential further compromise.

Most people don't run these but I've seen at least 3 people who have and tbh usually antivirus stops the 2nd stage payload. So make sure Defender antivirus is turned on, and maybe consider blocking newly registered domains using ad block if you are more tech savvy. Remind your grandparents and young siblings to never do anything with Win+R or disable it on their pc if you know how. Infostealers are nasty and having one on the family pc will hurt every member of the family.

[-] nukeforyou@lemm.ee 8 points 1 month ago

Easily stopped by using Ad Blockers.. Now if only chrome wasnt trying to kill ad blockers

[-] Jolteon@lemmy.zip 4 points 1 month ago

Someone having a virus on their computer doesn't prevent them from giving Google ad revenue.

[-] JRaccoon@discuss.tchncs.de 6 points 1 month ago

I think Microsoft should add a warning before allowing pasting into the Run dialog for the first time. Similarly like they already have in Edge's console

[-] Brosplosion@lemm.ee 4 points 1 month ago

Hot take, win+r should be disabled by default and have an option to enable. Probably 99% or more of users will never use the run dialogue

[-] Natanael@infosec.pub 3 points 1 month ago

Linux does this better by defaulting to files not being executable, versus Windows needing the downloading software to apply a specific "downloaded file" flag to trigger a notice about potentially unsafe files.

You could make a lot of the commands available by default much less dangerous. Stuff like requiring using protected screens more (like UAC and ctrl+alt+del) for enabling the risky stuff.

Also, sandboxing by default would do even more to prevent the worst dangers.

[-] Aqarius@lemmy.world 3 points 1 month ago

Disagree, mostly because half the time I WinR is when I'm trying to fix someone else's PC, and getting to the settings is half the problem.

[-] sus@programming.dev 2 points 1 month ago* (last edited 1 month ago)

powershell has that too

[-] LovableSidekick@lemmy.world 5 points 1 month ago

Microsoft verification needed! Please insert penis in hole and pull lever.

[-] Telorand@reddthat.com 5 points 1 month ago

This tactic is so old, but it weaponizes the annoying ubiquity of capchas. People just want to get to where they're going, so they click the squares and do the dance to get past the seemingly arbitrary barriers.

This technique shows up on !cybersecurity@sh.itjust.works every few weeks as the initial attack vector for some new RAT.

[-] csm10495@sh.itjust.works 4 points 1 month ago

Lucky for me, my mom doesn't know what the windows key is.

[-] muhyb@programming.dev 4 points 1 month ago

Didn't work. Hmm, maybe I should install Wine first.

[-] Kolanaki@pawb.social 4 points 1 month ago* (last edited 1 month ago)

windows key+r to open the "run" dialog

lol nope!

[-] Treczoks@lemmy.world 3 points 1 month ago

Could someone just copy the clipboard content into a text editor so one could see what they are trying to do?

load more comments (1 replies)
[-] ayyy@sh.itjust.works 3 points 1 month ago

Honestly having Win-R enabled in home edition is a bad default.

[-] ChaoticNeutralCzech@feddit.org 2 points 1 month ago

Agree. It's usually used just to run cmd, which then does the same thing but also shows output and allows for interactive CLI. Linux does it right with Ctrl+Alt+T.

[-] werefreeatlast@lemmy.world 3 points 1 month ago* (last edited 1 month ago)

You click the link, it copies bad code, then asks you to paste the code on a privileged terminal window and hit run.

I saw this a week sometime ago and I had to explain it to all my family members. Evilness.

Easily defeated by not giving users root access.

load more comments (1 replies)
[-] swizzlestick@lemmy.zip 2 points 1 month ago

Anyone falling for this lacks a basic understanding of technology, and should not be near the Internet unsupervised until they do. Regardless of age - plenty of young folk blindly walking into shit too.

If you know people like this - please teach them. If you can't teach them, at least set them up with foolproof tools. A non-chromium browser and ublock origin is a good start. If you've got the know-how, a DNSBL like a pihole (for whole home blocking) or adaway/blokada (for Android) are good additional layers.

And get their data backed up 😬

[-] Hikermick@lemmy.world 2 points 1 month ago

I came across this yesterday. It was right after a run of the mill "I am not a robot" message.

[-] vk6flab@lemmy.radio 2 points 1 month ago

URL?

Knowing what it's doing would be useful and people who have the ability to reverse engineer this can work on a fix or filter.

[-] UnH1ng3d@lemmy.world 2 points 1 month ago

motorandwheels(dot)com

  • I think it would be best if it isn't clickable

I've also noticed, it doesn't always come up but let me know if it does for you.

[-] FeelzGoodMan420@eviltoast.org 1 points 1 month ago* (last edited 1 month ago)

I'm confused. Is this a malicious website that you came across? Is this website normally legit? Was this an ad popup? Do you use ublock origin? It would be great if you gave a little more information here. Otherwise we don't really know what you were doing or what we should avoid. If this is a real legit website then my guess is this was an ad popup.

Edit: virustotal for that website is clean. So either this was a popup (you should use ublock origin) or your PC is infected with malware and you may want to take action (idk for sure, just a guess.) Another possibility is that website was compromised.

[-] UnH1ng3d@lemmy.world 2 points 1 month ago

I've never visited the site before so I just assumed it was just malicious, but as @zdanger said, it might be a hijacked legit site.

I do use uBlock. It also didn't 'feel' like an ad. I now expect the site was compromised as you suggested.

[-] FeelzGoodMan420@eviltoast.org 1 points 1 month ago

Yea. If others can confirm it then seems like the site was hacked

[-] JRaccoon@discuss.tchncs.de 1 points 1 month ago

For me accessing that site in Firefox on Windows (even with uBO) does trigger the scam popup, but in any other browser I tried (Edge, Chrome, FF dev edition), it doesn't. Kinda interesting.

The popup does not manage to add anything to the clipboard. There are tons of JS errors in the console, so luckily the thing seems to be pretty broken right now.

load more comments (3 replies)
load more comments
view more: next ›
this post was submitted on 06 Apr 2025
120 points (100.0% liked)

PC Master Race

16954 readers
3 users here now

A community for PC Master Race.

Rules:

  1. No bigotry: Including racism, sexism, homophobia, transphobia, or xenophobia. Code of Conduct.
  2. Be respectful. Everyone should feel welcome here.
  3. No NSFW content.
  4. No Ads / Spamming.
  5. Be thoughtful and helpful: even with ‘stupid’ questions. The world won’t be made better or worse by snarky comments schooling naive newcomers on Lemmy.

Notes:

founded 2 years ago
MODERATORS