Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Global SMS Scams Exploit Fake CAPTCHA and Keitaro Tools

Global SMS Scams Exploit Fake CAPTCHA and Keitaro Tools

Posted on April 27, 2026 By CWS

Cybersecurity experts have uncovered a telecommunications fraud operation that exploits fake CAPTCHA systems to trick users into sending international text messages. These messages incur charges on mobile bills, generating revenue for cybercriminals who lease the phone numbers involved.

Details of the Fraudulent Operation

The operation, active since at least June 2020, uses social engineering and browser manipulation techniques. According to Infoblox, it involves around 35 phone numbers across 17 countries. These scams deploy a fake CAPTCHA requiring multiple SMS messages to various international numbers, leading to significant charges for unsuspecting victims.

The scam’s delayed billing feature often results in victims being unaware of fraudulent charges until weeks later. This scheme combines revenue share fraud with traffic distribution systems (TDS), traditionally used for malware or phishing, to execute large-scale SMS scams.

Mechanics of the International SMS Scam

International revenue share fraud (IRSF) involves fraudsters obtaining high-cost international premium rate numbers. They artificially boost call or message volumes to these numbers, collecting a share of the termination charges paid by telecom operators.

This campaign registers phone numbers in countries with high termination fees, such as Azerbaijan and Kazakhstan, and collaborates with local telecom providers to maximize profits. Users are redirected to fake web pages using commercial TDS, where they’re prompted to send SMS messages under the guise of CAPTCHA verification.

Keitaro TDS Exploitation

Infoblox and Confiant have also reported on the misuse of Keitaro TDS, a system intended for advertising performance tracking. Cybercriminals repurpose it to facilitate malware delivery, cryptocurrency theft, and fraudulent investment schemes.

Over 120 campaigns have leveraged Keitaro for malicious activities, with a significant portion promoting cryptocurrency scams. These scams often use fake endorsements and deepfake videos to lure victims into fraudulent AI-powered investment platforms.

Conclusion and Future Outlook

The widespread exploitation of TDS systems like Keitaro underscores the evolving nature of cyber threats. As these scams become more sophisticated, the importance of robust cybersecurity measures and awareness among users and telecom providers cannot be overstated.

Future efforts will likely focus on enhancing detection and prevention strategies to combat such scams, ensuring the protection of both consumers and telecommunications infrastructure.

The Hacker News Tags:CAPTCHA scam, Confiant, crypto fraud, cyber threat, Cybersecurity, fake CAPTCHA, Infoblox, international SMS fraud, Keitaro abuse, Keitaro TDS, malicious traffic, SMS scams, telecom scams, telecom security, telecommunications fraud

Post navigation

Previous Post: Critical Nessus Agent Flaw on Windows Allows System-Level Code Execution
Next Post: Firefox Bug Enables Tor User Tracking

Related Posts

Emerging Cyber Threats and AI Exploit Engines Emerging Cyber Threats and AI Exploit Engines The Hacker News
Two Chrome Extensions Caught Stealing ChatGPT and DeepSeek Chats from 900,000 Users Two Chrome Extensions Caught Stealing ChatGPT and DeepSeek Chats from 900,000 Users The Hacker News
Hackers Actively Exploiting 7-Zip Symbolic Link–Based RCE Vulnerability (CVE-2025-11001) Hackers Actively Exploiting 7-Zip Symbolic Link–Based RCE Vulnerability (CVE-2025-11001) The Hacker News
Microsoft Discloses Exchange Server Flaw Enabling Silent Cloud Access in Hybrid Setups Microsoft Discloses Exchange Server Flaw Enabling Silent Cloud Access in Hybrid Setups The Hacker News
NFC Fraud, Curly COMrades, N-able Exploits, Docker Backdoors & More NFC Fraud, Curly COMrades, N-able Exploits, Docker Backdoors & More The Hacker News
Malicious PyPI Package soopsocks Infects 2,653 Systems Before Takedown Malicious PyPI Package soopsocks Infects 2,653 Systems Before Takedown The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • US Intensifies Efforts Against Southeast Asia Cybercrimes
  • Vidar Malware Uses JPEGs to Hide Payloads
  • Firefox Bug Enables Tor User Tracking
  • Global SMS Scams Exploit Fake CAPTCHA and Keitaro Tools
  • Critical Nessus Agent Flaw on Windows Allows System-Level Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • US Intensifies Efforts Against Southeast Asia Cybercrimes
  • Vidar Malware Uses JPEGs to Hide Payloads
  • Firefox Bug Enables Tor User Tracking
  • Global SMS Scams Exploit Fake CAPTCHA and Keitaro Tools
  • Critical Nessus Agent Flaw on Windows Allows System-Level Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark