Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New PhantomCaptcha RAT Weaponized PDFs to Deliver Malware Using ‘ClickFix’-Style Cloudflare Captcha Pages

Posted on October 24, 2025October 24, 2025 By CWS

A complicated spearphishing marketing campaign has emerged focusing on humanitarian organizations and Ukrainian authorities companies, leveraging weaponized PDF attachments and pretend Cloudflare verification pages to distribute a harmful WebSocket-based distant entry trojan.

The operation, first uncovered in early October 2025, demonstrates a exceptional degree of operational planning and infrastructure compartmentalization, with the risk actors sustaining their marketing campaign for six months earlier than executing their strike.

The marketing campaign particularly focused members of the Worldwide Purple Cross, Norwegian Refugee Council, UNICEF, and regional authorities administrations throughout Ukraine, utilizing emails impersonating the Ukrainian President’s Workplace.

When recipients opened the malicious PDF and clicked the embedded hyperlink, they had been directed to a convincing pretend Cloudflare DDoS safety gateway that seemed to be a respectable safety verification web page.

PDF doc web page (Supply – SentinelLABS)

The attackers had registered the area zoomconference.app to imitate a respectable Zoom convention service, internet hosting the malicious infrastructure on Russian-owned VPS servers in Finland.

The sophistication of this operation extends past its preliminary deception techniques. SentinelLABS researchers recognized that the attackers maintained their infrastructure for under 24 hours earlier than shutting down the public-facing domains whereas preserving their backend command-and-control servers, demonstrating professional-grade operational safety.

The marketing campaign infrastructure timeline revealed the attackers started operations in March 2025, with SSL certificates issued in September, suggesting meticulous preparation earlier than the October strike.

The ClickFix An infection Mechanism and Multi-Stage Payload Supply

The core of PhantomCaptcha’s effectiveness lies in its implementation of the ClickFix social engineering approach, a technique more and more adopted by risk actors since mid-2024.

After the pretend Cloudflare web page masses, victims encounter a simulated reCAPTCHA interface with an “I’m not a robotic” checkbox.

Clicking this checkbox triggers a popup containing directions written in Ukrainian, directing customers to repeat a token and paste it into the Home windows Run dialog utilizing the keyboard shortcut Home windows+R.

This seemingly innocuous motion executes malicious PowerShell code that initiates the an infection chain.

An infection paths (Supply – SentinelLABS)

The underlying mechanism depends on a JavaScript perform named copyToken() that downloads and executes a PowerShell script.

The attackers distributed three phases of payloads, starting with a closely obfuscated 500KB PowerShell downloader that obscured easy obtain performance via large code obfuscation strategies.

The second stage carried out complete system reconnaissance, gathering laptop names, area data, usernames, course of IDs, and {hardware} identifiers via system UUID retrieval, encrypting this knowledge utilizing a hardcoded XOR key earlier than transmission.

The ultimate payload delivered a WebSocket-based distant entry trojan able to receiving arbitrary instructions encoded in Base64-formatted JSON messages.

This light-weight backdoor related to distant servers and executed instructions utilizing PowerShell’s Invoke-Expression cmdlet, granting attackers full distant command execution capabilities and knowledge exfiltration entry.

The malware disabled PowerShell command historical past logging to stop forensic evaluation, representing a deliberate effort to cowl operational tracks whereas sustaining persistent entry to compromised methods.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:CAPTCHA, ClickFixStyle, Cloudflare, Deliver, Malware, Pages, PDFs, PhantomCaptcha, RAT, Weaponized

Post navigation

Previous Post: Why Executives and Practitioners See Risk Differently
Next Post: Hackers Exploited 73 0-Day Vulnerabilities and Earned $1,024,750

Related Posts

PoisonSeed Phishing Kit Bypasses MFA to Acquire Credentials from Individuals and Organizations Cyber Security News
Supply Chain Security Mitigating Third-Party Risks Cyber Security News
The Most Active RAT Uses New Stagers and Loaders to Bypass Defenses Cyber Security News
Fire Ant Hackers Exploiting Vulnerabilities in VMware ESXi and vCenter Cyber Security News
Malicious Chrome Extension as Ethereum Wallet Enables Full Wallet Takeover Cyber Security News
Facebook, Netflix, Microsoft Hijacked to Insert Fake Phone Number Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Malicious Document Reader App in Google Play With 50K Downloads Installs Anatsa Malware
  • New GhostFrame Super Stealthy Phishing Kit Attacks Millions of Users Worldwide
  • QuasarRAT Core Functionalities Along with Encrypted Configuration and Obfuscation Techniques Exposed
  • CISO Conversations: Keith McCammon, CSO and Co-founder at Red Canary
  • Resemble AI Raises $13 Million for AI Threat Detection

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Malicious Document Reader App in Google Play With 50K Downloads Installs Anatsa Malware
  • New GhostFrame Super Stealthy Phishing Kit Attacks Millions of Users Worldwide
  • QuasarRAT Core Functionalities Along with Encrypted Configuration and Obfuscation Techniques Exposed
  • CISO Conversations: Keith McCammon, CSO and Co-founder at Red Canary
  • Resemble AI Raises $13 Million for AI Threat Detection

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark