exclusive
content

Cybersecurity experts have flagged a deceptive malware campaign that uses fake CAPTCHA pop-up windows to install a new threat dubbed LightPerlGirl. The attack tricks users into manually executing disguised PowerShell commands, making it harder for security tools to detect the intrusion.

Researchers at Todyl identified the threat after spotting unusual PowerShell activity on a partner’s compromised device. The campaign hijacks legitimate but previously breached WordPress sites to deliver a fake security check, mimicking trusted services like Cloudflare.

Instead of exploiting software vulnerabilities, the attackers rely on social engineering, prompting users to copy and run a command via the Windows Run dialog. This manual step helps the malware bypass traditional security barriers.

LightPerlGirl, named after a signature in its code (“Copyright (c) LightPerlGirl 2025”) and embedded Russian strings, operates in multiple stealthy stages. The initial script contacts a command-and-control server to fetch a secondary payload, which includes three core functions:

This technique-heavy campaign shows how modern threats combine trusted interface mimicry with technical sophistication. The malware’s persistence mechanism ensures it stays active across reboots, maintaining covert access via its C2 infrastructure.

The attack underlines a broader shift in cyber threats—away from traditional exploits and toward manipulation of users through familiar interfaces, making them unwitting participants in compromising their systems.

Cybersecurity teams are urged to bolster endpoint protections and raise awareness around deceptive pop-ups, as attackers refine their methods to slip past even the most modern defense tools.

Stay ahead of emerging cybersecurity threats. For the latest insights and updates on cloud security, follow SOC News.

News Source: CybersecurityNews.com

How much could a data breach cost your business? The Cost of a Data Breach Report offers a detailed investigation of factors that influence financial impacts to organizations. Discover what security measures can mitigate costs based on analysis of over 500 real security incidents

Download Now

Organizations are rapidly building AI applications, and cybercriminals are eager to exploit them. These apps introduce a new stack with models, plugins, inference, and training datasets accessing sensitive data. To accelerate innovation, organizations are embracing no-code and low-code platforms. The proliferation of AI agents is transforming operations, enhancing customer engagement, and driving growth.

These agents surpass traditional chatbots by making decisions and acting as proactive partners. However, this rapid adoption introduces unique security risks. Vulnerabilities can arise from insufficient safeguards, misconfigurations, or lack of cybersecurity expertise. Threat actors target these ecosystems, exploiting gaps in memory and decision-making processes.

Join us to explore securing your AI ecosystem, including agents built using no-code and low-code platforms, and learn strategies to safeguard AI agents.

Watch A Practical Guide to Securing Enterprise AI Now

a-practical-guide-to-securing-enterprise-ai-20032025