Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New ShadowCaptcha Attack Exploiting Hundreds of WordPress Sites to Tricks Victims into Executing Malicious Commands

Posted on August 27, 2025August 28, 2025 By CWS

A complicated world cybercrime marketing campaign dubbed “ShadowCaptcha” has emerged as a major menace to organizations worldwide, leveraging faux Google and Cloudflare CAPTCHA pages to trick victims into executing malicious instructions.

Found by researchers on the Israel Nationwide Digital Company in August 2025, this large-scale operation has been energetic for a minimum of one yr, exploiting a whole lot of compromised WordPress web sites to ship multi-stage malware payloads.

The marketing campaign employs a misleading approach generally known as ClickFix, the place attackers inject malicious JavaScript into compromised WordPress websites that redirect customers to attacker-controlled infrastructure internet hosting faux CAPTCHA verification pages.

These convincingly designed pages mimic authentic Cloudflare or Google safety checks, prompting unsuspecting customers to repeat and execute PowerShell instructions underneath the guise of finishing a safety verification course of.

Retrospective evaluation has revealed the marketing campaign’s in depth attain, with over 100 compromised WordPress websites serving as preliminary an infection vectors and a whole lot of malware samples spanning a number of households and variants.

Gov.li analysts recognized the marketing campaign’s opportunistic nature, focusing on organizations throughout all sectors no matter dimension or business vertical.

The assault operates via a classy multi-stage supply mechanism that mixes social engineering with living-off-the-land binaries (LOLBins) to keep up persistence whereas evading detection.

As soon as victims execute the disguised malicious instructions, the malware establishes a foothold inside focused methods and proceeds with its major aims.

Multi-Faceted Monetization Technique

ShadowCaptcha’s an infection mechanism demonstrates outstanding versatility in its monetization method.

The malware focuses on three major income streams: credential harvesting and browser information exfiltration for id theft, deployment of cryptocurrency miners to generate illicit earnings from contaminated methods, and potential ransomware deployment for speedy monetary achieve.

Pretend captcha (Supply – Gov.li)

This multi-pronged technique maximizes the attackers’ return on funding whereas creating sustained unauthorized entry to compromised networks.

The marketing campaign’s capacity to adapt its payload based mostly on system traits and safety posture makes it notably harmful, as it could possibly pivot between completely different assault modes to keep away from detection whereas sustaining persistent entry to beneficial company sources.

Enhance your SOC and assist your staff shield your enterprise with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Attack, Commands, Executing, Exploiting, Hundreds, Malicious, ShadowCaptcha, Sites, Tricks, Victims, WordPress

Post navigation

Previous Post: Hundreds of Salesforce Customers Hit by Widespread Data Theft Campaign
Next Post: Attacker Context and Historical iOS Zero-Click Similarities

Related Posts

Hackers are Weaponizing Invoices to Deliver XWorm That Steals Login Credentials Cyber Security News
Zero Trust Architecture Building Resilient Defenses for 2025 Cyber Security News
New Ghost Calls Attack Abuses Web Conferencing for Covert Command & Control Cyber Security News
GitHub Copilot RCE Vulnerability via Prompt Injection Leads to Full System Compromise Cyber Security News
CISA Releases Two Advisories Covering Vulnerabilities, and Exploits Surrounding ICS Cyber Security News
ASUS MyASUS Flaw Lets Hackers Escalate to SYSTEM-Level Access Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • EU Plans Phase Out of High Risk Telecom Suppliers, in Proposals Seen as Targeting China
  • North Korea-Linked Hackers Target Developers via Malicious VS Code Projects
  • Sprocket Security Appoints Eric Sheridan as Chief Technology Officer
  • One Identity Upgrades Identity Manager for Stronger Security
  • Gootloader with Low Detection Rate Bypasses Most Security Tools

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • EU Plans Phase Out of High Risk Telecom Suppliers, in Proposals Seen as Targeting China
  • North Korea-Linked Hackers Target Developers via Malicious VS Code Projects
  • Sprocket Security Appoints Eric Sheridan as Chief Technology Officer
  • One Identity Upgrades Identity Manager for Stronger Security
  • Gootloader with Low Detection Rate Bypasses Most Security Tools

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark