BusinessCybersecurityNewswireTechnology

2025 Cyber Threats: Fake CAPTCHAs to RATs Exposed

▼ Summary

– Cybercriminals are increasingly using sophisticated social engineering and legitimate tools to evade detection, leading to a near-tripling of affected customers from 6% to 17% in early 2025.
– Attackers are moving faster, with the average time between compromise and lateral movement dropping below 60 minutes, often using Remote Desktop Protocol and RMM tools to maintain access.
– Social engineering tactics like fake CAPTCHA scams and help desk impersonation now account for 39% of initial access methods, surpassing traditional BEC schemes.
– The ClickFix campaign has surged by 1,400%, tricking users into executing malicious PowerShell commands that download Remote Access Trojans like NetSupport or Lumma Stealer.
– While ransomware incidents have dropped sharply, defenders must prioritize user training, network segmentation, and tighter controls over scripting and tunneling tools to counter evolving threats.

Cybercriminals are refining their tactics with alarming precision, leveraging deception and trusted tools to infiltrate networks before defenders can react. A recent report highlights a dramatic surge in security incidents, with affected customers nearly tripling from 6% in late 2024 to 17% by early 2025. The majority of breaches originate at the initial access stage, where attackers exploit human error and system vulnerabilities to gain a foothold. Once inside, they move swiftly, often achieving lateral movement in under an hour, sometimes as quickly as 15 minutes.

Remote Desktop Protocol (RDP) remains the top choice for attackers navigating compromised systems, while remote monitoring and management (RMM) tools help them maintain persistent access. In many cases, multiple RMM applications were found running on the same host, masking malicious activity as routine IT operations. Tunneling utilities like Plink and Ngrok further obscure their movements, bypassing firewalls with ease.

Fernando Martinez Sidera, a lead threat researcher, notes that social engineering has evolved beyond basic phishing and business email compromise (BEC). Attackers now craft highly targeted scams, such as fake CAPTCHA prompts, to trick users into executing malicious code. These schemes often lead to the deployment of remote access trojans (RATs) like NetSupport, Quasar, or Lumma Stealer, which provide attackers with full control over infected systems.

BEC incidents have declined from 74% to 57% of initial access methods, but this drop coincides with a sharp rise in CAPTCHA-based scams and help desk impersonation. Social engineering now accounts for 39% of breaches, a threefold increase in just months. One notable campaign, ClickFix, manipulates users into pasting malicious PowerShell commands disguised as security prompts. This tactic saw a staggering 1,400% surge in activity within six months.

Malware trends reflect attackers’ preference for stealth over disruption. Lumma Stealer, a Windows-targeting infostealer, dominated early 2025 by harvesting browser data, credentials, and cryptocurrency wallets. RATs like AsyncRAT and Remcos also remained prevalent, enabling attackers to maintain persistent access and escalate attacks. Meanwhile, ransomware and unauthorized access incidents plummeted by 78% and 94%, respectively, suggesting cybercriminals are prioritizing data theft over overt destruction.

To counter these threats, organizations must prioritize user awareness training, particularly around emerging social engineering tactics. Restricting PowerShell usage, tightening script execution policies, and monitoring tunneling tools can curb attackers’ operational flexibility. Network segmentation and endpoint security reviews are also critical to limiting lateral movement and containing breaches before they escalate.

The landscape is shifting rapidly, and defenders must adapt just as quickly. By understanding these evolving tactics, businesses can stay one step ahead of increasingly sophisticated adversaries.

(Source: HelpNet Security)

Topics

cybercriminal tactics evolution 95% social engineering surge 90% remote desktop protocol rdp usage 85% remote monitoring management rmm tools 80% captcha-based scams 75% clickfix campaign 70% lumma stealer malware 65% decline ransomware incidents 60% user awareness training importance 55% network segmentation 50%