Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New ShadowCaptcha Attack Exploiting Hundreds of WordPress Sites to Tricks Victims into Executing Malicious Commands

Posted on August 27, 2025August 28, 2025 By CWS

A complicated world cybercrime marketing campaign dubbed “ShadowCaptcha” has emerged as a major menace to organizations worldwide, leveraging faux Google and Cloudflare CAPTCHA pages to trick victims into executing malicious instructions.

Found by researchers on the Israel Nationwide Digital Company in August 2025, this large-scale operation has been energetic for a minimum of one yr, exploiting a whole lot of compromised WordPress web sites to ship multi-stage malware payloads.

The marketing campaign employs a misleading approach generally known as ClickFix, the place attackers inject malicious JavaScript into compromised WordPress websites that redirect customers to attacker-controlled infrastructure internet hosting faux CAPTCHA verification pages.

These convincingly designed pages mimic authentic Cloudflare or Google safety checks, prompting unsuspecting customers to repeat and execute PowerShell instructions underneath the guise of finishing a safety verification course of.

Retrospective evaluation has revealed the marketing campaign’s in depth attain, with over 100 compromised WordPress websites serving as preliminary an infection vectors and a whole lot of malware samples spanning a number of households and variants.

Gov.li analysts recognized the marketing campaign’s opportunistic nature, focusing on organizations throughout all sectors no matter dimension or business vertical.

The assault operates via a classy multi-stage supply mechanism that mixes social engineering with living-off-the-land binaries (LOLBins) to keep up persistence whereas evading detection.

As soon as victims execute the disguised malicious instructions, the malware establishes a foothold inside focused methods and proceeds with its major aims.

Multi-Faceted Monetization Technique

ShadowCaptcha’s an infection mechanism demonstrates outstanding versatility in its monetization method.

The malware focuses on three major income streams: credential harvesting and browser information exfiltration for id theft, deployment of cryptocurrency miners to generate illicit earnings from contaminated methods, and potential ransomware deployment for speedy monetary achieve.

Pretend captcha (Supply – Gov.li)

This multi-pronged technique maximizes the attackers’ return on funding whereas creating sustained unauthorized entry to compromised networks.

The marketing campaign’s capacity to adapt its payload based mostly on system traits and safety posture makes it notably harmful, as it could possibly pivot between completely different assault modes to keep away from detection whereas sustaining persistent entry to beneficial company sources.

Enhance your SOC and assist your staff shield your enterprise with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Attack, Commands, Executing, Exploiting, Hundreds, Malicious, ShadowCaptcha, Sites, Tricks, Victims, WordPress

Post navigation

Previous Post: Hundreds of Salesforce Customers Hit by Widespread Data Theft Campaign
Next Post: Attacker Context and Historical iOS Zero-Click Similarities

Related Posts

20+ Malicious Apps on Google Play Actively Attacking Users to Steal Login Credentials Cyber Security News
Allianz Life Insurance Data Breach Cyber Security News
AI Tools Like GPT Direct Users to Phishing Sites Instead of Legitimate Ones Cyber Security News
GitGuardian Launches MCP Server to Bring Secrets Security into Developer Workflows Cyber Security News
Critical Chrome Use After Free Vulnerability Let Attackers Execute Arbitrary Code Cyber Security News
Famous Chollima Hackers Attacking Windows and MacOS Users With GolangGhost RAT Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • WhatsApp, Chrome 0-Day, AI Ransomware, and Cyber Attacks
  • Microsoft Confirms Recent Windows 11 24H2 Security Update Not Causing SSD/HDD Failures
  • How to Understand Supply Chain Attacks
  • Top 10 Best Web Application Penetration Testing Companies in 2025
  • Top 10 Best Attack Surface Management (ASM) Software Solutions In 2025

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • WhatsApp, Chrome 0-Day, AI Ransomware, and Cyber Attacks
  • Microsoft Confirms Recent Windows 11 24H2 Security Update Not Causing SSD/HDD Failures
  • How to Understand Supply Chain Attacks
  • Top 10 Best Web Application Penetration Testing Companies in 2025
  • Top 10 Best Attack Surface Management (ASM) Software Solutions In 2025

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News