stealth rootkit via captchas

Security researchers have uncovered a sinister new threat lurking in the digital shadows. Dubbed OBSCURE#BAT by Securonix, this malware campaign is targeting users primarily in the US, Canada, Germany, and the UK through fake CAPTCHA verification pages.

It’s clever. Too clever. The attack begins when unsuspecting users encounter typosquatted domains featuring Cloudflare CAPTCHA pages that look legitimate but are actually malicious traps.

Once victims interact with these fake CAPTCHAs, they’re unknowingly downloading archives containing heavily obfuscated batch scripts. The initial payload seems innocuous, but it’s just the tip of the iceberg. PowerShell commands execute in the background, dropping additional scripts and modifying the Windows Registry. The whole operation is practically invisible to the average user.

What makes OBSCURE#BAT particularly nasty is its use of the open-source r77 rootkit. This isn’t amateur hour. The malware installs both kernel-level (“puma.ko”) and userland (“lib64/libs.so”) rootkit components that hide malicious files, processes, and registry entries from security tools. The campaign employs social engineering techniques to trick users into executing malicious batch scripts through clipboard manipulation.

It even registers a fake driver called “ACPIx86.sys” to blend in with legitimate system processes. Talk about wearing a disguise.

Persistence is the name of the game. The malware creates scheduled tasks, injects itself into critical system processes like winlogon.exe, and abuses Windows services to guarantee it sticks around after reboots. Good luck finding it without specialized tools.

While hiding in your system, OBSCURE#BAT monitors clipboard activity and command history, collecting valuable data before encrypting and sending it to command and control servers. Similar to other attacks, it utilizes Cloudflare Tunnel connections to establish secure command-and-control infrastructure.

And it does this while actively interfering with security software’s ability to detect it. With keylogging capabilities similar to other infostealer trojans, it can silently capture every keystroke you make, including passwords and sensitive financial information.

Detection is complicated by the malware’s multi-stage infection chain and memory-resident components that avoid disk-based detection. Traditional antivirus? Pretty much useless.

The attackers have thought of everything, including patching the Antimalware Scan Interface to bypass detection. They’re not messing around, and neither should your security team.

You May Also Like

Microsoft Issues Urgent Warning: StilachiRAT Targeting Remote Desktop Protocol Sessions for Data Theft

Microsoft’s urgent warning: StilachiRAT malware silently hijacks RDP sessions, clones security tokens, and steals crypto wallets while reinstalling itself if removed. Your digital front door might already be wide open.

Staggering Surge: Nearly One Million Devices Compromised in GitHub Malvertising Scandal

A staggering 1 million devices infected after a single click on video frames. Microsoft intervened against Storm-0408’s sophisticated GitHub malvertising campaign that weaponized illegal streaming sites. Your device could be next.

Unmasking the Silent Threats: What Rootkits Are and How They Hijack Your System

Invisible digital predators live inside your computer, controlling everything you do. Learn how rootkits bypass security, steal your data, and remain undetected. Your device may already be compromised.

DocSwap: The Android Malware Disguised as a Document Viewer Threatening Global Security

North Korean hackers deploy DocSwap, a sinister Android malware masquerading as a document viewer. With 57 malicious commands and terrifying capabilities including silent keylogging and remote audio recording, this threat could hijack your digital life. Your phone might already be compromised.