Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New ShadowCaptcha Attack Exploiting Hundreds of WordPress Sites to Tricks Victims into Executing Malicious Commands

Posted on August 27, 2025August 28, 2025 By CWS

A complicated world cybercrime marketing campaign dubbed “ShadowCaptcha” has emerged as a major menace to organizations worldwide, leveraging faux Google and Cloudflare CAPTCHA pages to trick victims into executing malicious instructions.

Found by researchers on the Israel Nationwide Digital Company in August 2025, this large-scale operation has been energetic for a minimum of one yr, exploiting a whole lot of compromised WordPress web sites to ship multi-stage malware payloads.

The marketing campaign employs a misleading approach generally known as ClickFix, the place attackers inject malicious JavaScript into compromised WordPress websites that redirect customers to attacker-controlled infrastructure internet hosting faux CAPTCHA verification pages.

These convincingly designed pages mimic authentic Cloudflare or Google safety checks, prompting unsuspecting customers to repeat and execute PowerShell instructions underneath the guise of finishing a safety verification course of.

Retrospective evaluation has revealed the marketing campaign’s in depth attain, with over 100 compromised WordPress websites serving as preliminary an infection vectors and a whole lot of malware samples spanning a number of households and variants.

Gov.li analysts recognized the marketing campaign’s opportunistic nature, focusing on organizations throughout all sectors no matter dimension or business vertical.

The assault operates via a classy multi-stage supply mechanism that mixes social engineering with living-off-the-land binaries (LOLBins) to keep up persistence whereas evading detection.

As soon as victims execute the disguised malicious instructions, the malware establishes a foothold inside focused methods and proceeds with its major aims.

Multi-Faceted Monetization Technique

ShadowCaptcha’s an infection mechanism demonstrates outstanding versatility in its monetization method.

The malware focuses on three major income streams: credential harvesting and browser information exfiltration for id theft, deployment of cryptocurrency miners to generate illicit earnings from contaminated methods, and potential ransomware deployment for speedy monetary achieve.

Pretend captcha (Supply – Gov.li)

This multi-pronged technique maximizes the attackers’ return on funding whereas creating sustained unauthorized entry to compromised networks.

The marketing campaign’s capacity to adapt its payload based mostly on system traits and safety posture makes it notably harmful, as it could possibly pivot between completely different assault modes to keep away from detection whereas sustaining persistent entry to beneficial company sources.

Enhance your SOC and assist your staff shield your enterprise with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Attack, Commands, Executing, Exploiting, Hundreds, Malicious, ShadowCaptcha, Sites, Tricks, Victims, WordPress

Post navigation

Previous Post: Hundreds of Salesforce Customers Hit by Widespread Data Theft Campaign
Next Post: Attacker Context and Historical iOS Zero-Click Similarities

Related Posts

25 Best Managed Security Service Providers (MSSP) Cyber Security News
Threat Actors Selling New Undetectable RAT As ’ScreenConnect FUD Alternative’ Cyber Security News
CISA Warns of Cisco Firewall 0-Day Vulnerabilities Actively Exploited in the Wild Cyber Security News
DPRK IT Workers Using Code-Sharing Platforms to Secure New Remote Jobs Cyber Security News
Red Hat Confirms Data Breach After Hackers Claim to Steal 570GB of Private GitHub Repositories Cyber Security News
Facebook, Netflix, Microsoft Hijacked to Insert Fake Phone Number Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft: Russia, China Increasingly Using AI to Escalate Cyberattacks on the US
  • Microsoft Windows 11 October Update Breaks Localhost (127.0.0.1) Connections
  • Hackers Using TikTok Videos to Deploy Self-Compiling Malware That Leverages PowerShell for Execution
  • Threat Actors Leveraging ClickFake Interview Attack to Deploy OtterCandy Malware
  • Hackers Using AI to Automate Vulnerability Discovery and Malware Generation

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft: Russia, China Increasingly Using AI to Escalate Cyberattacks on the US
  • Microsoft Windows 11 October Update Breaks Localhost (127.0.0.1) Connections
  • Hackers Using TikTok Videos to Deploy Self-Compiling Malware That Leverages PowerShell for Execution
  • Threat Actors Leveraging ClickFake Interview Attack to Deploy OtterCandy Malware
  • Hackers Using AI to Automate Vulnerability Discovery and Malware Generation

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News