Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New ShadowCaptcha Attack Exploiting Hundreds of WordPress Sites to Tricks Victims into Executing Malicious Commands

Posted on August 27, 2025August 28, 2025 By CWS

A complicated world cybercrime marketing campaign dubbed “ShadowCaptcha” has emerged as a major menace to organizations worldwide, leveraging faux Google and Cloudflare CAPTCHA pages to trick victims into executing malicious instructions.

Found by researchers on the Israel Nationwide Digital Company in August 2025, this large-scale operation has been energetic for a minimum of one yr, exploiting a whole lot of compromised WordPress web sites to ship multi-stage malware payloads.

The marketing campaign employs a misleading approach generally known as ClickFix, the place attackers inject malicious JavaScript into compromised WordPress websites that redirect customers to attacker-controlled infrastructure internet hosting faux CAPTCHA verification pages.

These convincingly designed pages mimic authentic Cloudflare or Google safety checks, prompting unsuspecting customers to repeat and execute PowerShell instructions underneath the guise of finishing a safety verification course of.

Retrospective evaluation has revealed the marketing campaign’s in depth attain, with over 100 compromised WordPress websites serving as preliminary an infection vectors and a whole lot of malware samples spanning a number of households and variants.

Gov.li analysts recognized the marketing campaign’s opportunistic nature, focusing on organizations throughout all sectors no matter dimension or business vertical.

The assault operates via a classy multi-stage supply mechanism that mixes social engineering with living-off-the-land binaries (LOLBins) to keep up persistence whereas evading detection.

As soon as victims execute the disguised malicious instructions, the malware establishes a foothold inside focused methods and proceeds with its major aims.

Multi-Faceted Monetization Technique

ShadowCaptcha’s an infection mechanism demonstrates outstanding versatility in its monetization method.

The malware focuses on three major income streams: credential harvesting and browser information exfiltration for id theft, deployment of cryptocurrency miners to generate illicit earnings from contaminated methods, and potential ransomware deployment for speedy monetary achieve.

Pretend captcha (Supply – Gov.li)

This multi-pronged technique maximizes the attackers’ return on funding whereas creating sustained unauthorized entry to compromised networks.

The marketing campaign’s capacity to adapt its payload based mostly on system traits and safety posture makes it notably harmful, as it could possibly pivot between completely different assault modes to keep away from detection whereas sustaining persistent entry to beneficial company sources.

Enhance your SOC and assist your staff shield your enterprise with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Attack, Commands, Executing, Exploiting, Hundreds, Malicious, ShadowCaptcha, Sites, Tricks, Victims, WordPress

Post navigation

Previous Post: Hundreds of Salesforce Customers Hit by Widespread Data Theft Campaign
Next Post: Attacker Context and Historical iOS Zero-Click Similarities

Related Posts

Threat Actors Weaponizing SVG Files to Embed Malicious JavaScript Cyber Security News
New ‘Curly COMrades’ APT Hackers Attacking Targeting Critical Organizations in Countries Cyber Security News
Kali Linux 2025.3 Released With New Features and 10 New Hacking Tools Cyber Security News
OpenSSL Vulnerabilities Let Attackers Execute Malicious Code and Recover Private Key Remotely Cyber Security News
Microsoft Releases Emergency Fix for BitLocker Recovery Issue Cyber Security News
PickleScan 0-Day Vulnerabilities Enable Arbitrary Code Execution via Malicious PyTorch Models Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • LastPass Warns of Fake Maintenance Messages Targeting Users’ Master Passwords
  • CISA Releases BRICKSTORM Malware Report with New YARA Rules for VMware vSphere
  • EU Plans Phase Out of High Risk Telecom Suppliers, in Proposals Seen as Targeting China
  • North Korea-Linked Hackers Target Developers via Malicious VS Code Projects
  • Sprocket Security Appoints Eric Sheridan as Chief Technology Officer

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • LastPass Warns of Fake Maintenance Messages Targeting Users’ Master Passwords
  • CISA Releases BRICKSTORM Malware Report with New YARA Rules for VMware vSphere
  • EU Plans Phase Out of High Risk Telecom Suppliers, in Proposals Seen as Targeting China
  • North Korea-Linked Hackers Target Developers via Malicious VS Code Projects
  • Sprocket Security Appoints Eric Sheridan as Chief Technology Officer

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark