New CAPTCHA ‘ClickFix’ Scam Hijacks Your Data Instantly (But You Can Avoid It)

Cybercriminals trick users into copying malicious PowerShell commands disguised as CAPTCHA fixes, with attacks up 517%

Al Landes Avatar
Al Landes Avatar

By

Image: Reith & Associates

Key Takeaways

Key Takeaways

  • ClickFix scams trick users into running malicious commands through fake CAPTCHA prompts
  • Attacks surged 517% making ClickFix the second most common cybercrime method
  • Malware steals browser passwords and cryptocurrency wallets through Windows Run dialog

Verification fatigue is real—you’ve clicked “I’m not a robot” so many times it’s become muscle memory. Cybercriminals know this, and they’re exploiting your CAPTCHA exhaustion with a devastatingly simple trick called ClickFix. This scam masquerades as legitimate verification but actually tricks you into installing malware through basic Windows commands you probably use regularly.

Here’s how the con works: You encounter what looks like a broken CAPTCHA on a compromised website or while downloading that “free” software. Instead of clicking boxes, a pop-up instructs you to press Windows + R, then paste some text and hit Enter to “fix” the verification. What you’re actually doing is opening your computer’s Run dialog and executing malicious PowerShell commands that download infostealers like LummaStealer or remote access trojans. The clipboard injection happens automatically—you’re literally copying and pasting malicious code onto your system.

The numbers are staggering. According to ESET’s 2025 threat report, ClickFix attacks surged 517% from 2024 to 2025, making it the second most common attack method after traditional phishing. This technique spreads through:

  • Compromised legitimate websites
  • Fake GitHub pages
  • Cracked game downloads
  • Social media lures

Once executed, the malware pillages your browser passwords, cryptocurrency wallets, and personal files faster than you can say “verification complete.”

Alexandra, a Toronto student and former PC shop worker, spotted this scam during class and posted a Reddit PSA that went viral. Her classmates were completely unaware of the danger, despite being digital natives. Reddit users called the technique “diabolical” and noted its effectiveness on average users who wouldn’t think twice about following simple copy-paste instructions. It’s social engineering at its most insidious—leveraging our trained responses to everyday digital tasks.

Protection is straightforward but requires breaking ingrained habits. Never use Windows + R commands from websites, even if they claim it’s for verification. Real CAPTCHAs don’t require system-level access to your computer. When something feels off—like unusually complex “verification” steps—trust that instinct. Your digital security skepticism is often the best antivirus you have.

Share this

At Gadget Review, our guides, reviews, and news are driven by thorough human expertise and use our Trust Rating system and the True Score. AI assists in refining our editorial process, ensuring that every article is engaging, clear and succinct. See how we write our content here →