Hackers Use Fake CAPTCHAs, USBs to Spread CORNFLAKE and XMRig

Fake CAPTCHA Pages Used to Deploy CORNFLAKE.V3 Backdoor in Global Malware Campaigns

  • Attackers use fake CAPTCHA pages to lure users into infecting systems with a backdoor named CORNFLAKE.V3.
  • The threat group tracked as UNC5518 sells access which other groups monetize through additional Malware deployment.
  • CORNFLAKE.V3 is capable of executing multiple payloads, gathering data, and maintaining persistence on hosts.
  • Malware campaigns also use infected USB drives to spread cryptocurrency mining software like XMRig.
  • Disabling the Windows Run dialog and monitoring suspicious script execution may help reduce risk of infection.

A new cyberattack method uses fake CAPTCHA pages to spread a versatile backdoor named CORNFLAKE.V3, according to research published on August 21, 2025. The campaign, observed by Google-owned Mandiant, targets users worldwide by exploiting social engineering tactics to gain unauthorized access and monetize infected systems.

- Advertisement -

The attack group, known as UNC5518, tricks users into running a malicious script by prompting them to copy and execute a command via the Windows Run dialog box. Mandiant identified two other groups, UNC5774 and UNC4108, that utilize the access provided by UNC5518 to launch further attacks, including payload delivery and system control tools.

The infection begins when a user interacts with a manipulated search result or ad, leading to a fake CAPTCHA page. After the user executes the supplied script, the computer downloads additional malware. The CORNFLAKE.V3 backdoor then checks if it is running in a virtual machine and establishes communication with external servers, often routing traffic through Cloudflare tunnels to avoid detection.

CORNFLAKE.V3 has versions in JavaScript and PHP. It delivers various types of files, including executables and PowerShell scripts, and collects basic system information. Persistence is achieved through changes to the Windows Registry. Delivered payloads can include utilities for network reconnaissance, credential harvesting, and another backdoor called WINDYTWIST.SEA, which provides remote shell access.

A related campaign continues to use infected USB drives to install cryptocurrency miners, like XMRig for Monero and other coins, since September 2024. Attackers trick users into running shortcuts on compromised drives, which initiates a chain of scripts and payloads with tools such as DIRTYBULK, CUTFAIL, and PUMPBENCH.

- Advertisement -

Researchers recommend disabling the Windows Run dialog, conducting regular security awareness drills, and improving monitoring for suspicious PowerShell and script execution. Mandiant notes that initial access through USB drives remains highly effective due to its low cost and ability to bypass many standard defenses. Full details and reports are available in Google’s threat blog and the community blog.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Trump Raises Global Tariffs to 15% After Court Loss

President Trump raised a proposed global tariff from 10% to 15%, effective immediately, following...

Ethereum’s FOCIL Aims to Force Censorship-Resistant Transactions

The FOCIL proposal is the headlining feature of Ethereum's upcoming Hegota upgrade, scheduled for...

Trump’s New Tariffs Draw Bipartisan Criticism as ‘Tax’

President Trump announced a new 10% global tariff in response to the Supreme Court...

XRP, SOL ETF Inflows Defy Bitcoin, Ethereum Outflows

Spot ETFs for XRP and Solana (SOL) recorded net inflows of $4.05 million and...

AI AdGazer Predicts Which Ads You’ll Actually Watch

Researchers have created AdGazer, an AI model trained on eye-tracking data to predict human...

Must Read

8 Best Bitcoin Offshore Hosting Providers

In this blog post, we'll list the top 8 best bitcoin offshore hosting providers that accept Bitcoin and other cryptocurrencies.As Bitcoin continues to grow...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!