Forget MFA fatigue, attackers are exploiting 'click tolerance' to trick users into infecting themselves with malware
Briefly

Recent findings from HP Wolf Security reveal that cybercriminals are exploiting users' familiarity with verification tests to install malware. The concept of 'click tolerance' has emerged, referring to users' acclimatization to extensive authentication steps. Hackers have created fake CAPTCHAs to direct users to fraudulent sites where they unknowingly execute malicious code by following fake prompts. Ian Pratt, head of security at HP, highlights that this tactic bypasses traditional security measures, as users are effectively tricked into running the malware themselves without downloading any files.
The attackers used fake CAPTCHAs to redirect users to sites that prompted them to complete fake authentication steps, ultimately leading to self-inflicted malware installation.
HP's report emphasizes that while these tactics aren’t new, the sophistication and scale of this campaign signifies a concerning evolution in exploiting user complacency.
"It's a really good way of bypassing a lot of security products because effectively the user typed it into the run box," Pratt explained.
The rise of 'click tolerance' among users has led to increased susceptibility to malware attacks during authentication processes.
Read at ITPro
[
|
]