Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New ShadowCaptcha Attack Exploiting Hundreds of WordPress Sites to Tricks Victims into Executing Malicious Commands

Posted on August 27, 2025August 28, 2025 By CWS

A complicated world cybercrime marketing campaign dubbed “ShadowCaptcha” has emerged as a major menace to organizations worldwide, leveraging faux Google and Cloudflare CAPTCHA pages to trick victims into executing malicious instructions.

Found by researchers on the Israel Nationwide Digital Company in August 2025, this large-scale operation has been energetic for a minimum of one yr, exploiting a whole lot of compromised WordPress web sites to ship multi-stage malware payloads.

The marketing campaign employs a misleading approach generally known as ClickFix, the place attackers inject malicious JavaScript into compromised WordPress websites that redirect customers to attacker-controlled infrastructure internet hosting faux CAPTCHA verification pages.

These convincingly designed pages mimic authentic Cloudflare or Google safety checks, prompting unsuspecting customers to repeat and execute PowerShell instructions underneath the guise of finishing a safety verification course of.

Retrospective evaluation has revealed the marketing campaign’s in depth attain, with over 100 compromised WordPress websites serving as preliminary an infection vectors and a whole lot of malware samples spanning a number of households and variants.

Gov.li analysts recognized the marketing campaign’s opportunistic nature, focusing on organizations throughout all sectors no matter dimension or business vertical.

The assault operates via a classy multi-stage supply mechanism that mixes social engineering with living-off-the-land binaries (LOLBins) to keep up persistence whereas evading detection.

As soon as victims execute the disguised malicious instructions, the malware establishes a foothold inside focused methods and proceeds with its major aims.

Multi-Faceted Monetization Technique

ShadowCaptcha’s an infection mechanism demonstrates outstanding versatility in its monetization method.

The malware focuses on three major income streams: credential harvesting and browser information exfiltration for id theft, deployment of cryptocurrency miners to generate illicit earnings from contaminated methods, and potential ransomware deployment for speedy monetary achieve.

Pretend captcha (Supply – Gov.li)

This multi-pronged technique maximizes the attackers’ return on funding whereas creating sustained unauthorized entry to compromised networks.

The marketing campaign’s capacity to adapt its payload based mostly on system traits and safety posture makes it notably harmful, as it could possibly pivot between completely different assault modes to keep away from detection whereas sustaining persistent entry to beneficial company sources.

Enhance your SOC and assist your staff shield your enterprise with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Attack, Commands, Executing, Exploiting, Hundreds, Malicious, ShadowCaptcha, Sites, Tricks, Victims, WordPress

Post navigation

Previous Post: Hundreds of Salesforce Customers Hit by Widespread Data Theft Campaign
Next Post: Attacker Context and Historical iOS Zero-Click Similarities

Related Posts

Lazarus Hackers Weaponized 234 Packages Across npm and PyPI to Infect Developers Cyber Security News
Incident Response Planning – Preparing for Data Breaches Cyber Security News
Bluetooth Vulnerabilities Let Hackers Spy on Your Headphones and Earbuds Cyber Security News
Chrome Vulnerabilities Let Attackers Execute Malicious Code Remotely Cyber Security News
Gunra Ransomware New Linux Variant Runs Up To 100 Encryption Threads With New Partial Encryption Feature Cyber Security News
Lionishackers Threat Actors Exfiltrating and Selling Corporate Databases on Dark Web Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Understand Supply Chain Attacks
  • Top 10 Best Web Application Penetration Testing Companies in 2025
  • Top 10 Best Attack Surface Management (ASM) Software Solutions In 2025
  • Attackers Abuse Velociraptor Forensic Tool to Deploy Visual Studio Code for C2 Tunneling
  • Critical Citrix 0-Day Vulnerability Exploited Since May, Leaving Global Entities Exposed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Understand Supply Chain Attacks
  • Top 10 Best Web Application Penetration Testing Companies in 2025
  • Top 10 Best Attack Surface Management (ASM) Software Solutions In 2025
  • Attackers Abuse Velociraptor Forensic Tool to Deploy Visual Studio Code for C2 Tunneling
  • Critical Citrix 0-Day Vulnerability Exploited Since May, Leaving Global Entities Exposed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News