CAPTCHA prompts have become a familiar sight online. CAPTCHA prompts are designed to differentiate human users from automated bots, keeping websites secure. Unfortunately, cybercriminals are now using fake CAPTCHAs as a new vector for attacks. Recently, organizations have experienced incidents involving malicious CAPTCHAs that trick users into unintentionally running harmful commands on their computers. Here is what you need to know to stay safe.

Um, the user did what?

A recent WatchPoint security incident involved a sophisticated form of attack using deceptive CAPTCHA prompts. In this type of attack, a fake CAPTCHA asks users to complete unusual steps—like opening a Windows command prompt or running a PowerShell command—actions a legitimate CAPTCHA would never require. When users follow these malicious instructions, they unknowingly execute scripts that install malware, steal sensitive information, or gain remote access to their computers.

SentinelOne, WatchPoint's MDR platform, caught and isolated the attack immediately. Less sophisticated AV may not detect this as malicious behavior as there are no files immediately dropped classifying this type of attack as fileless.

Select the images of Hackers

Specifically, these fake CAPTCHAs typically instruct users to:

These pasted commands usually trigger malware downloads, provide attackers with remote access, or compromise sensitive data.

Fake CAPTCHA attacks first appeared in the late twenty teens, but in late 2024 and into 2025 they have surged in popularity among hackers. Security media outlets started reporting more of these attacks being seen in the wild in early 2025.

Jan 23, 202 Ravie Lakshmanan - The Hacker News

Why It Matters

These attacks are dangerous precisely because they exploit trust. Users have grown accustomed to solving CAPTCHAs to verify their identity on various websites, making them less suspicious of CAPTCHA requests. Attackers leverage this familiarity to deceive even vigilant users.

Once executed, these malicious scripts can lead to severe consequences, including:

How to Recognize Fake CAPTCHAs

Legitimate CAPTCHAs will never:

Any CAPTCHA prompt asking you to perform these actions should immediately raise suspicion.

Security Best Practices

To prevent falling victim to malicious CAPTCHA attacks, follow these simple guidelines:

Fake Captcha Internal Communication Template

To help spread awareness within your organization, feel free to use the following email as a communication template:


Subject: Security Awareness: Beware of Malicious CAPTCHA Prompts

Team,

Recently, we had an incident involving fake CAPTCHAs prompting users to execute commands on their computer. To avoid this:

Remember: R for Run and tell IT.

Your awareness helps keep us secure. If something feels off, reach out to us right away.

Thank you,
[Your IT Security Team]


Final Thoughts

Cyber threats evolve constantly, and staying informed is your strongest defense. By recognizing and avoiding suspicious CAPTCHA prompts, you can help maintain the security of your organization’s data and IT infrastructure. Always trust your instincts—if something doesn’t feel right, pause and verify with IT support.

Stay safe, stay vigilant!

Would you ever hang a bright neon sign outside your business reading, "Hey burglars, doors unlocked, come on in!"? Of course not. Yet astonishingly, many businesses do just that digitally, leaving their firewall ports wide open and welcoming cybercriminals with open arms. Recently, even the FBI stepped in to issue a stern (and somewhat embarrassing) Open Port Warning about the dangers of leaving these digital doors unlocked. And while cybersecurity is serious business, sometimes the simplicity of the problem borders on comedy, until it’s not funny at all.

The FBI’s "Friendly" Reminder

In the recent cybersecurity advisory (Alert Code: AA25-050A), the FBI and CISA (Cybersecurity and Infrastructure Security Agency) issues a joint advisory sounding the alarm about cybercriminals actively targeting networks through open firewall ports. Think of it like leaving your office windows wide open overnight, one forgotten latch and intruders can waltz right in. The FBI is urging businesses to close these vulnerabilities immediately, before your open ports become a hacker's personal playground filled with data breaches, ransomware, and other digital nightmares.

CISA and FBI Warn of Open Ports

An Open Port is an Open Invitation

Let's be honest: leaving your ports open is like tossing your car keys into the front seat and walking away. Sure, your car might be there in the morning, but the odds aren't exactly in your favor. The puzzling thing? Checking for open ports is straightforward, yet countless businesses overlook it, creating massive and entirely unnecessary risks. The potential cost isn't just financial; imagine explaining to your clients that your "secure" network was basically a revolving door for hackers. Ouch.

Like many other cyber security topics, business leaders choose to ignore them even with plenty of coverage on the subject. Here are just a few of the articles written about this particular warning.

Forbes: "FBI Says Backup Now—Advisory Warns Of Dangerous Ongoing Attacks"

This article highlights the FBI's warning about the ongoing and dangerous nature of Ghost ransomware attacks, emphasizing the importance of immediate data backups.

Read the full article

WaterISAC: "(TLP:CLEAR) CISA, FBI, and MS-ISAC Release Advisory on Ghost (Cring) Ransomware"

This piece provides an overview of the joint advisory, detailing the indicators of compromise (IOCs), tactics, techniques, and procedures (TTPs) associated with Ghost ransomware.

Read the full article

Security Boulevard: "[CISA AA25-050A] #StopRansomware: Ghost (Cring) Ransomware"

This article discusses the CISA advisory on Ghost ransomware and introduces an attack graph released by AttackIQ to help organizations validate their security controls against this threat.

Read the full article

SafeBreach: "SafeBreach Coverage for US CERT AA25-050A [Ghost (Cring) Ransomware]"

This blog post outlines how SafeBreach has added coverage against attacks by Ghost threat actors targeting organizations across more than 70 countries.

Read the full article

NeptuneWorx: "Summary: Understanding CISA's Cybersecurity Advisory AA25-050A"

This summary provides insights into the CISA advisory, emphasizing the importance of proactive cybersecurity measures and understanding the threat landscape.

Read the full article

How often are these open ports leading to ransomware attacks?

We don’t have the hard statistics yet for 2025, but over the past several weeks at WatchPoint we have been getting more requests than usual for help with ransomware attacks. These were non-WatchPoint clients of course and generally referrals from existing clients, but of the last three, two were caused by open ports. There was a dip in ransomware attacks that coincided with the start of the war in Ukraine, but now we appear to be back in the throughs of a full-on assault from cyber attackers.

Good News: Checking Ports is a Breeze

Here’s the good news—checking your ports isn't complicated or time-consuming. In fact, it's as quick and painless as checking your smartphone’s battery. With a few clicks, we can run a port scan and immediately see if you are unintentionally offering hackers a warm welcome to your network. Given how simple this task is, there’s really no excuse not to do it unless you enjoy making life easy for cybercriminals.

How WatchPoint IT Makes Life Easier

At WatchPoint IT, our mission is to make cybersecurity feel less like rocket science and more like routine maintenance—easy, stress-free, and efficient. Our free port scanning service quickly identifies which of your digital doors are wide open. Additionally, we won’t leave you hanging. We provide continuous monitoring and alerts to immediately flag any new vulnerabilities, keeping your digital assets safe 24/7.

Here's What You'll Receive from Our Free Scan:

Urgent? Absolutely. Difficult? Not Even a Little.

Cybersecurity can seem daunting, packed with acronyms, jargon, and endless threats. But when it comes to securing your network, think of it as simply locking your front door. With the FBI’s urgent warning fresh in our minds, there’s no better time than now to act.

Don’t wait until you’re already compromised. Connect with WatchPoint IT today, run your free port scan, and let’s lock those digital doors tighter than Fort Knox. Because in cybersecurity, being proactive isn't just smart, it's essential.

Stay smart, stay secure!

Ready to lock things down? Visit WatchPoint IT today and let us know you would like a free port scan. Your future self will thank you.

A third of all data loss is caused by problems with backups.

Losing access to your business’s data – even temporarily – is a nightmare worthy of a horror movie.

The basic function of data backup tools is to create copies of your data and store them in a safe place. If something goes wrong, recovery tools will use these copies to restore your lost files.

So, if your business already uses backup and recovery tools, you would think your data is safe… but this isn’t necessarily true.

A new report shows that some backup tools aren’t as reliable as they should be. In fact, a third of all data losses are caused by backup-related issues. When people try to recover data, they discover it’s been lost, corrupt or was never backed up in the first place.

It’s not just corrupted backups that you should be aware of.

One of the biggest threats to businesses right now is ransomware. This is a type of malicious software (or "malware") that locks you out of your files unless you pay a ransom to regain access.

The report found that half of businesses using backup tools still ended up paying ransoms to retrieve their files, because it was faster than trying to use their own recovery tools. Even worse? Only a small number of businesses that paid ransoms were able to fully recover their data.

Backup tools are supposed to keep your data safe, so why are they unreliable for so many businesses?

Often, it’s because they haven’t been set up properly. And even when they are, they still need to be verified regularly to make sure they are still backing up your files.

Also, older backup and recovery tools can’t keep up with today’s sophisticated cyber-attacks. Ransomware will target the backup files as well as the production files to make it impossible to recover them. Backup files need to be properly encrypted and separated from the production data. Setting up and maintaining a reliable backup system is straightforward if you have been doing it for 25 years. IT experts (like us) can make sure your tools are running correctly every day. Every single day our backups are verified to ensure your system can be recovered no matter the disaster situation.

We put extra safeguards in place such as continuous data protection (CDP). CDP continuously saves changes to your files, allowing you to go back in time and restore your data as it was just before an attack or loss.

But my files are in the cloud

You may think because your files are saved in Microsoft, Google, DropBox or any number of other cloud services your files are safe, and Microsoft is taking care of the backups. This is not the case, and you still need a separate encrypted and secure backup. Whether your files are all in the cloud, on-premises or a combination of the two, backup is critical.

This is something we do for businesses like yours every day. Reach out if you are concerned about your existing backup solution or if you have any questions. Contact us at (319) 535-5350 or [email protected] to setup an appointment.

They Could Be Ransomware Scams

Picture this: You’re having a busy day at work when the phone rings. On the other end of the line is someone claiming to be from Microsoft Teams support. They sound professional, helpful even. But before you follow their instructions, ask yourself: could this be a scam?

The latest trend in cybercrime involves scammers posing as “help desk” staff to trick employees into granting access to their devices. It’s part of a larger ransomware strategy designed to lock businesses out of their own data until they cough up a hefty ransom. These attacks are devastating and growing in sophistication.

The New Face of Ransomware

Recently, a notorious cybercrime group took this scam to a whole new level. Here’s how their operation works:

  1. Flood the Inbox: First, they overwhelm an employee’s inbox with spam, making it virtually unusable.
  2. The Hero Act: Then, they swoop in with a phone call, posing as IT support ready to "fix" the problem.
  3. Gaining Access: They’ll ask the employee to install remote desktop software like AnyDesk or use built-in tools such as Windows Quick Assist.
  4. Network Infiltration: Once inside, they navigate the network, collect sensitive data, and deploy ransomware.

But it doesn’t stop there. These scammers are also leveraging Microsoft Teams to gain trust. They’ll create fake Teams accounts with usernames like “Help Desk” and domains such as “securityadminhelper.onmicrosoft.com.” Then, they send one-on-one messages to employees, claiming they need access to their devices to resolve an issue.

Why Ransomware Is a Business Nightmare

Ransomware attacks are more than just an inconvenience; they’re a direct threat to your operations, reputation, and bottom line. Here’s what’s at stake:

How to Protect Your Business

Education and vigilance are your first lines of defense. Share this information with your team and encourage a healthy skepticism toward unsolicited calls or messages. Here are a few specific steps to safeguard your business:

  1. Verify Before Trusting: Teach employees to verify any requests for software installation or access with your IT department first.
  2. Secure Microsoft Teams: If your business uses Teams, make sure it’s configured securely. Restrict external chats to trusted domains and enable chat logging.
  3. Leverage Professional Help: Cybersecurity is complex, and it’s okay to ask for help. Experts can audit your setup and strengthen your defenses against these evolving threats.

Don’t Wait Until It’s Too Late

Ransomware is serious business, but it doesn’t have to become your business’s problem. By staying informed and proactive, you can protect your operations, your customers, and your reputation. If you’re unsure whether your systems are as secure as they could be, we’re here to help. Get in touch today to discuss your cybersecurity strategy and ensure your business is prepared for whatever comes next.

When someone leaves your business, you might be so wrapped up in the rush of everyday tasks, you forget to delete their login details, which can affect your security login processes.

It’s easy to overlook. You’ll get around to it later, right?

But unused login details could be a ticking time bomb for security breaches, leaving the doors wide open to cyber criminals. It can also be an unnecessary drain on your budget if you’re paying for old subscriptions you no longer need.

A recent report found that almost half of businesses had accounts that were no longer actively managed, which can undermine your security login protocols.

If you’ve forgotten about an account, you’re not monitoring it. And this leaves your business vulnerable to attacks.

These risks aren’t just hypothetical, either. Many cloud security breaches happen because unused login details and accounts have been compromised.

So, what do you need to do?

Take the time to audit all accounts and login details used by your business. Make sure you no longer have accounts open for ex-employees (and check that their access has been fully revoked, not just left inactive) to avoid security login issues.

The same goes for any software or service that you’ve stopped using in your business. You might not realize you’re still paying for a service you haven’t touched in months – or even years.

Going forward, make sure you have a clear process for when people leave, and regularly review the applications and services your business uses.

If you’re not sure where to start, let us help you perform a security review and make sure you’re not leaving your business exposed to unnecessary threats. Contact us at (319) 535-5350 or [email protected] to setup an appointment.

Copyright© 2024 WatchPoint, All Rights Reserved
319.535.5350
Cedar Rapids, Iowa