Thursday, September 11, 2025
HomeCyber SecurityThis Home windows PowerShell Phish Has Scary Potential – Krebs on Safety

This Home windows PowerShell Phish Has Scary Potential – Krebs on Safety


Many GitHub customers this week obtained a novel phishing e mail warning of important safety holes of their code. Those that clicked the hyperlink for particulars have been requested to tell apart themselves from bots by urgent a mix of keyboard keys that causes Microsoft Home windows to obtain password-stealing malware. Whereas it’s unlikely that many programmers fell for this rip-off, it’s notable as a result of much less focused variations of it are prone to be much more profitable in opposition to the common Home windows person.

A reader named Chris shared an e mail he obtained this week that spoofed GitHub’s safety crew and warned: “Hey there! We’ve detected a safety vulnerability in your repository. Please contact us at https://github-scanner[.]com to get extra data on find out how to repair this problem.”

This Home windows PowerShell Phish Has Scary Potential – Krebs on Safety

Visiting that hyperlink generates an internet web page that asks the customer to “Confirm You Are Human” by fixing an uncommon CAPTCHA.

This malware assault pretends to be a CAPTCHA supposed to separate people from bots.

Clicking the “I’m not a robotic” button generates a pop-up message asking the person to take three sequential steps to show their humanity. Step 1 includes concurrently urgent the keyboard key with the Home windows icon and the letter “R,” which opens a Home windows “Run” immediate that may execute any specified program that’s already put in on the system.

Executing this sequence of keypresses prompts the built-in Home windows Powershell to obtain password-stealing malware.

Step 2 asks the person to press the “CTRL” key and the letter “V” on the identical time, which pastes malicious code from the positioning’s digital clipboard.

Step 3 — urgent the “Enter” key — causes Home windows to launch a PowerShell command, after which fetch and execute a malicious file from github-scanner[.]com referred to as “l6e.exe.”

PowerShell is a strong, cross-platform automation instrument constructed into Home windows that’s designed to make it less complicated for directors to automate duties on a PC or throughout a number of computer systems on the identical community.

Based on an evaluation on the malware scanning service Virustotal.com, the malicious file downloaded by the pasted textual content is known as Lumma Stealer, and it’s designed to snarf any credentials saved on the sufferer’s PC.

This phishing marketing campaign could not have fooled many programmers, who little question natively perceive that urgent the Home windows and “R” keys will open up a “Run” immediate, or that Ctrl-V will dump the contents of the clipboard.

However I guess the identical strategy would work simply nice to trick a few of my much less tech-savvy associates and family into operating malware on their PCs. I’d additionally guess none of those folks have ever heard of PowerShell, not to mention had event to deliberately launch a PowerShell terminal.

Given these realities, it could be good if there have been a easy method to disable or at the least closely prohibit PowerShell for regular finish customers for whom it might change into extra of a legal responsibility.

Nevertheless, Microsoft strongly advises in opposition to nixing PowerShell as a result of some core system processes and duties could not perform correctly with out it. What’s extra, doing so requires tinkering with delicate settings within the Home windows registry, which generally is a dicey enterprise even for the realized.

Nonetheless, it wouldn’t damage to share this text with the Home windows customers in your life who match the less-savvy profile. As a result of this explicit rip-off has a substantial amount of room for development and creativity.

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular

Recent Comments