CAPTCHA Scam: How Fake “I’m Not a Robot” Pages Hijack Your Device
You’ve clicked the “I’m not a robot” box hundreds of times. It’s so routine you barely notice it anymore. That’s exactly why it’s become one of the most dangerous traps on the internet.
A scam known as the CAPTCHA scam — or ClickFix — is exploiting your trust in this everyday security check. You land on a website, a familiar verification box appears, and a few clicks later you’ve unknowingly installed malware that can drain bank accounts, steal passwords, and hand attackers full remote access to your device.
The numbers are alarming. According to ESET’s 2025 threat report, ClickFix attacks surged 517% from 2024 to 2025, making it the second most common cyberattack method of the year. In March 2025 alone, security defenses blocked more than 600,000 attempted CAPTCHA scam attacks across hundreds of websites worldwide. By March 2026, Microsoft recorded 11.9 million CAPTCHA-gated phishing attacks in a single month — a 125% spike from the prior two months and the highest level recorded in over a year.
This isn’t a scam that targets only the tech-naive. It’s caught security researchers, university employees, healthcare workers, and business professionals. If you use the internet, you’re a target.
🛡️ Think you may have clicked through a fake CAPTCHA?
Use ScamSave’s free AI Scam Triage tool — describe what happened and get an instant assessment. No signup required for your first three checks. Members get unlimited access plus daily scam alerts from the FTC, FBI, and cybersecurity agencies.
→ Try the Free Scam Triage Tool at scamsave.com | Membership from $6.99/month
What Is a CAPTCHA Scam?
CAPTCHA stands for Completely Automated Public Turing test to tell Computers and Humans Apart. Real CAPTCHAs — like Google’s familiar reCAPTCHA checkbox — run entirely in your browser. They quietly analyze browsing patterns in the background to verify you’re human. They never ask you to download anything, run commands, or open applications on your device.
Fake CAPTCHAs mimic this interface — often pixel-perfectly — but include hidden steps designed to get you to infect your own device with malware. The scam works because it weaponizes a habit you’ve already formed: seeing a CAPTCHA, following instructions, moving on.
The most widespread variant is called ClickFix. It turns CAPTCHA familiarity into a malware delivery mechanism that bypasses many traditional security controls — because the victim is the one executing the attack.
How the CAPTCHA Scam Works: Step by Step
Step 1: You Land on a Compromised or Malicious Page
The attack can start from almost anywhere:
- A compromised legitimate website you’ve visited safely many times before
- A malvertising ad on a trusted site (the ad is malicious, the site isn’t)
- A phishing email with a link that appears to lead somewhere familiar
- A search result for pirated content — free movies, music, software
- A typosquatted domain that looks like a real company (e.g., a fake Spectrum or SSA login page)
- A social media link that redirects through a traffic distribution system
Step 2: The Fake CAPTCHA Appears
A pop-up appears that looks exactly like a standard Google reCAPTCHA or Cloudflare verification box. The branding, colors, fonts, and layout are copied from the real thing. Some versions are indistinguishable from legitimate CAPTCHAs without expert analysis.
You click the checkbox. So far, nothing unusual.
Step 3: Clipboard Hijacking Happens in the Background
At the moment you clicked, a JavaScript function running silently in the background copied a malicious command to your device’s clipboard. You didn’t see it happen. You don’t know it’s there. The command looks like a harmless verification code but contains obfuscated PowerShell or shell commands that download and execute malware.
Step 4: “Additional Verification” Instructions Appear
The page now tells you there’s one more step to complete verification. Instructions vary but typically read:
“Press Windows + R to open the Run dialog. Press Ctrl + V to paste the verification code. Press Enter to complete.”
Some pages include step-by-step tutorial videos. Some display what appears to be a harmless verification hash (something like I am not a robot - reCAPTCHA Verification Hash: 328459) — while the actual malicious command executes silently below it.
Step 5: Malware Executes
You pressed Enter. The malicious command runs. In the background, malware is downloaded and installed — often within seconds. The process takes place in memory, leaving little trace on disk and bypassing many conventional antivirus tools.
You’re returned to the website. Everything appears normal. The CAPTCHA is “complete.” You move on with your day — while attackers now have access to your device.
What Happens After Your Device Is Infected
The malware deployed by CAPTCHA scams is among the most damaging in use today. Security researchers have identified the following active payloads in 2025 and 2026 CAPTCHA scam campaigns:
Information Stealers (Infostealers)
These silently harvest everything stored on or accessible through your device:
- Saved browser passwords across Chrome, Firefox, Edge, and Safari
- Session cookies (allowing attackers to bypass two-factor authentication)
- Email login credentials
- Banking and financial account credentials
- Cryptocurrency wallet data and seed phrases
- Steam and gaming account credentials
- Autofill data including addresses and payment card numbers
Active infostealer variants deployed via CAPTCHA scams include Lumma Stealer, StealC, Rhadamanthys, and Vidar Stealer — all documented in 2025 campaigns by Microsoft, Trend Micro, and independent security researchers.
Remote Access Trojans (RATs)
Beyond stealing stored data, some CAPTCHA scam payloads install RATs — tools that give attackers real-time remote control of your device. With a RAT installed, attackers can:
- Watch your screen in real time
- Log every keystroke as you type it
- Activate your camera or microphone
- Access files on your hard drive
- Install additional malware
- Use your device to attack others
Active RAT variants documented in CAPTCHA scam campaigns include AsyncRAT, XWorm, and ScreenConnect.
The SMS Pump Variant
A newer CAPTCHA scam variant documented by Malwarebytes in April 2026 doesn’t install malware at all — instead, it tricks victims into sending SMS messages to dozens of international phone numbers with high termination fees. Each interaction can generate roughly $30 in unexpected charges on your phone bill, with a cut flowing back to the scammer via telecom revenue-sharing agreements. The pages use back-button hijacking to prevent victims from leaving.
Where Fake CAPTCHAs Show Up
CAPTCHA scams have been documented across a wide range of delivery vectors. They can appear virtually anywhere online:
- Streaming and pirated content sites — a play button click launches a CAPTCHA scam in a new tab
- Malvertising — legitimate websites inadvertently serve malicious ads that redirect to fake CAPTCHA pages
- Phishing emails — links in emails about package deliveries, account issues, or unpaid invoices
- Compromised legitimate websites — including university sites, business platforms, and news sites
- Fake brand pages — impersonating Spectrum, the SSA, Microsoft, Google, and other trusted names
- SEO poisoning — fake CAPTCHA pages that rank highly in search results for software downloads or media
- Social media ads — particularly on platforms with less rigorous ad screening
In one documented 2025 case analyzed by Microsoft, victims were directed to a fake CAPTCHA page hosted on a spoofed Social Security Administration domain — combining government impersonation with CAPTCHA malware delivery.
Who Is Being Targeted
CAPTCHA scams are not targeted at a specific demographic or industry. Documented 2025 campaigns hit:
- Individual consumers seeking free content, software, or media
- Healthcare organizations — hospitals, clinics, and medical practices
- Banking and financial services employees
- Telecommunications companies
- Government agencies — including specific campaigns targeting Portuguese government, finance, and transportation sectors
- Universities and educational institutions — including documented compromises at major research universities
- Marketing and media firms
In early 2025, Microsoft Defender Experts observed thousands of devices per month being compromised by ClickFix attacks — even on machines with enterprise endpoint detection and response (EDR) solutions installed. The scam works precisely because the victim is the one executing the attack, bypassing security tools designed to block external threats.
Red Flags: How to Identify a Fake CAPTCHA
The single most important rule: A real CAPTCHA will never ask you to run a command, press keyboard shortcuts, open an application, download a file, or send an SMS message. If a “CAPTCHA” asks you to do any of these things, it is a fake.
Watch for these specific red flags:
- Instructions to press Windows + R (opens the Run dialog) — no legitimate CAPTCHA requires this
- Instructions to press Ctrl + V then Enter after a verification step
- A prompt to “open PowerShell” or “open Terminal” to complete verification
- A request to download a file, font, or update to display the CAPTCHA
- Instructions to send an SMS to prove you’re human — legitimate CAPTCHAs run entirely in-browser
- A pop-up claiming your browser is outdated and needs a CAPTCHA-related fix
- Step-by-step video instructions for completing the verification — real CAPTCHAs don’t need tutorials
- A CAPTCHA appearing on a page you weren’t expecting it — such as a streaming site or media download
- Urgency language — “Complete verification within 60 seconds or access will be denied”
- A “Fix It” or “Alternate Verification” button that triggers additional steps
What to Do If You Clicked Through a Fake CAPTCHA
If you saw a fake CAPTCHA but did NOT follow the additional instructions (you didn’t press Windows + R, didn’t paste anything, didn’t press Enter):
You are likely safe. The malicious command was copied to your clipboard but never executed. Clear your clipboard (copy any harmless text to overwrite it), close the browser tab, and do not return to the site. Run a malware scan as a precaution.
If you followed the instructions and pressed Enter:
Act immediately. Assume your device has been compromised.
- Disconnect from the internet immediately — unplug Ethernet or disable Wi-Fi. This limits what the malware can exfiltrate and cuts off remote access.
- Do not use the device for any logins or transactions. Every keystroke may be logged.
- Contact IT security if this was a work device. Your IT team needs to know immediately — the malware may spread through your network.
- From a separate, clean device, change your passwords — prioritize email accounts, banking and financial accounts, and any accounts where you use the same password.
- Enable two-factor authentication on critical accounts if not already active — but do not use the compromised device to do so.
- Run a full malware scan using a reputable security tool (Malwarebytes, Windows Defender, or your organization’s endpoint tool). Note that some CAPTCHA scam payloads are fileless, running in memory — which means standard scans may miss them.
- Consider a full system wipe for high-value targets. If this device contained banking credentials, business logins, or cryptocurrency wallets, a factory reset is the only guaranteed way to remove all traces of a RAT or persistent infostealer.
- Monitor your financial accounts for unauthorized transactions and your email for unusual login activity or password reset requests you didn’t initiate.
- Check your phone bill if you followed any SMS-related CAPTCHA instructions. Dispute unexpected international charges immediately with your carrier.
How ScamSave Can Help You Prevent and Recover
CAPTCHA scams are among the hardest for non-technical users to recognize — because the attack is designed to look exactly like something legitimate. ScamSave helps at every stage.
Prevention: Know the Current Attack Playbook
ScamSave members receive daily scam alerts directly from the FTC, FBI, CISA, and leading cybersecurity researchers — including alerts specifically covering emerging malware delivery methods like ClickFix. When a new CAPTCHA scam variant surfaces (like the SMS pumping variant documented in April 2026, or the SSA-impersonation CAPTCHA campaign from 2025), members hear about it before it reaches them. Knowing what to look for is the most powerful protection available.
Triage: Not Sure If What You Clicked Was Real?
ScamSave’s AI Scam Triage tool lets you describe exactly what you saw — the instructions, the website, what you clicked — and get an instant expert assessment of whether it was a fake CAPTCHA and what risk you may be facing. The first three checks are free. Members get unlimited access.
Recovery: A Step-by-Step Plan When You Need It Most
If you followed the instructions and are worried your device has been compromised, ScamSave’s Scam Recovery Center generates a personalized step-by-step recovery plan based on your specific situation. It covers device isolation, credential security, financial account monitoring, reporting to the right agencies, and identity protection — all in the right order, with direct links to every resource you need. No searching while you’re panicking.
“ScamSave taught me how to protect my privacy and I learned about scams I didn’t even know existed. The step-by-step recovery guide walked me through everything after a phishing attack hit my accounts.” — Bob R., ScamSave Member
→ Start with the Free Scam Triage Tool | Enroll Annual — $49.99/year | Monthly — $6.99/month
How to Protect Yourself Going Forward
Internalize the one rule that stops this scam cold. A real CAPTCHA runs in your browser. It will never ask you to press keyboard shortcuts, open an application, run a command, or send a text message. Any “verification” that requires Windows + R, PowerShell, or a Terminal prompt is an attack. Full stop.
Slow down at verification prompts. The scam depends on your CAPTCHA autopilot — the habit of clicking through without reading. CAPTCHA scams are deliberately designed to look routine. Before following any CAPTCHA instructions beyond a simple checkbox click or image selection, stop and read what you’re being asked to do.
Use an ad blocker. A significant percentage of CAPTCHA scam exposures happen through malvertising — malicious ads served on legitimate websites. Ad blockers like uBlock Origin block the ads that redirect to fake CAPTCHA pages before they load.
Keep browser extensions and security software current. Microsoft Defender, Malwarebytes, and browser extensions like uBlock Origin all have signatures for known fake CAPTCHA domains. Keeping them updated ensures you benefit from the latest protections.
Be especially cautious on content streaming and download sites. These are the most common delivery vector for CAPTCHA scams targeting consumers. Any time a streaming site asks you to complete a “verification” before watching, treat it with suspicion.
Disable JavaScript for unfamiliar sites (optional, advanced). The clipboard hijacking that powers CAPTCHA scams is triggered by JavaScript. Disabling JavaScript on unknown sites in your browser settings prevents the clipboard copy from occurring — though it will break some legitimate site functionality.
Use a password manager. Even if an infostealer harvests your stored browser passwords, a password manager that requires a separate master password provides an additional barrier to account takeover.
How the CAPTCHA Scam Connects to Other Fraud
CAPTCHA scams are one piece of a broader ecosystem of social engineering attacks that manipulate users into acting against their own security. The same urgency-and-familiarity tactics appear across multiple scam types:
- Tech Support Scams — fake error messages that claim your computer is infected and instruct you to call a number or run a command
- Phishing Emails — links that lead to fake CAPTCHA gates before credential-harvesting pages
- Package Delivery Scams — smishing texts with links that can lead to fake CAPTCHA pages
- How Overseas Scammers Operate — Inside the $63B Fraud Factory
- Text Message Scams — How to Tell If a Text Message Is a Scam
Frequently Asked Questions
Is clicking the “I’m not a robot” checkbox itself dangerous?
No — clicking the checkbox alone does not install malware. The malicious command is silently copied to your clipboard when you interact with the fake CAPTCHA, but it cannot execute unless you manually paste it and press Enter. The danger is entirely in the second set of instructions. If you’ve only checked the box, you are likely safe.
Can Macs be targeted by CAPTCHA scams?
Yes. While the most documented variant targets Windows via the Run dialog and PowerShell, CAPTCHA scam campaigns have been specifically adapted for macOS. Microsoft documented a 2025 campaign that served different malicious clipboard commands to Windows and macOS users — automatically — based on the device detected. Mac users should apply the same skepticism to unexpected CAPTCHA instructions.
Can this happen on a phone?
Yes, through the SMS pumping variant. Fake CAPTCHAs on mobile devices can prompt you to send SMS messages that generate international charges. On Android, some variants also attempt to trigger downloads. The keyboard-shortcut-based ClickFix technique is primarily a desktop/laptop threat.
What if I ran the command but my antivirus didn’t flag anything?
Many CAPTCHA scam payloads are fileless — they run in memory rather than writing files to disk, specifically to evade file-based antivirus scanning. If you executed the command, do not assume you are safe because your antivirus reported nothing. Change passwords from a clean device, monitor your accounts, and consider a full system wipe for high-risk devices.
How do I know if a website is compromised?
You often can’t tell by looking. Compromised legitimate sites look exactly as they normally do — only the ad slot or a small piece of injected code has been modified. The safest approach is to treat any unexpected CAPTCHA — especially one with instructions beyond a checkbox — as suspicious regardless of where you encounter it.
What should I do if I gave my work computer the command?
Contact your IT or security team immediately. Do not wait. The malware may have already begun lateral movement across your organization’s network, and every minute of delay increases the potential scope of the breach. Disconnect the device from the network before contacting them.
🛡️ Stay Ahead of Threats Like This One
ScamSave members receive daily scam alerts from the FTC, FBI, CISA, and leading cybersecurity researchers so you know about new tactics before they reach your screen. Membership also includes:
- Unlimited AI Scam Triage — describe any suspicious site, prompt, or interaction and get an instant assessment
- Expert guides on 100+ scams — including malware, identity protection, and financial fraud playbooks
- Step-by-step Scam Recovery — personalized plans built by CISSP-certified experts
- Discounts on identity protection and security tools
Enroll Annual — $49.99/year | Enroll Monthly — $6.99/month
Not ready to enroll? Start with the free AI Scam Triage — no account required for your first 3 checks.

