Hackers are targeting Windows users with a new strain of malware called Lumma Stealer, which spreads through deceptive human verification pages that mimic Google CAPTCHA. These phishing sites, often hosted on various platforms using Content Delivery Networks (CDNs), trick users into clicking a button that copies a PowerShell script to their clipboard. When executed, this script downloads Lumma Stealer from a remote server. The malware is packaged as a file named “dengo.zip,” which must be unzipped and run on the user's machine to become active. Researchers from Cloudsek have identified an increase in malicious sites using this method. To protect against such threats, it is recommended to keep Windows and antivirus software updated, avoid clicking on suspicious links, and refrain from executing unknown commands.