Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Flaws in CITRIX patches of three netterlers confirm aggressive misuse of CVE-2025-7775

Security researchers map hundreds of Teslamate servers spilling Tesla vehicle data

Google Gemini AI Image Model Gets “Banana” Upgrade

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Shadowcaptcha exploits wordpress sites to spread ransomware, information steelers and cryptominers
Identity

Shadowcaptcha exploits wordpress sites to spread ransomware, information steelers and cryptominers

userBy userAugust 26, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Abuse WordPress sites to spread ransomware

It has been observed that a new, massive campaign uses over 100 compromised WordPress sites to direct site visitors to fake Captcha verification pages that provide information steelers, ransomware, and cryptocurrency miners using ClickFix social engineering tactics.

The large-scale cybercrime campaign, first detected in August 2025, is known as Shadowcaptcha by the National Digital Agency of Israel.

“campaign […] We blend social engineering, living off binaries (lolbins), and multi-stage payload distribution to gain and maintain scaffolding for your target system.”

“The ultimate goal of ShadowCaptcha is to collect sensitive information through credential harvesting and browser data removal, deploying cryptocurrency miners to generate illegal profits and even triggering ransomware outbreaks.”

The attack starts with an unsuspecting user visiting a compromised WordPress website injected with malicious JavaScript code responsible for starting a redirect chain that takes you to a fake CloudFlare or Google Captcha page.

From there, the attack chain will be two depending on the ClickFix command that appears on the web page. One uses the Windows Run dialog, and the other guides the victim to save the page as an HTML application (HTA) and runs it using MSHTA.EXE.

Cybersecurity

The execution flow triggered through the Windows Run dialog culminates in Lumma and Rhadamanthys Stealers deployments via MSI installer launching using MSIEXEC.EXE or remote host HTA files running using MSHTA.EXE.

It’s worth pointing out that it was documented last month by CloudSek by tricking users with Clickfix lures and downloading malicious HTA files to spread Epsilon Red ransomware.

“A compromised Clickfix page automatically runs obfuscated JavaScript using “navigator.clipboard.writeText” to copy malicious commands to the user’s clipboard without interacting, relying on the user to paste and run,” the researchers said.

Attacks are characterized by the use of anti-bugger technology to prevent web pages from being inspected using browser developer tools, but also relies on DLL sideloading to execute malicious code under the guise of a legitimate process.

Shadowcaptcha’s selection campaign observed delivering XMRIG-based cryptocurrency miners. Some variants take the mining configuration from the Paspevin URL rather than hardcoding with malware, allowing you to adjust the parameters on the fly.

If a minor payload is deployed, the attacker will interact with the CPU registers with the aim of dropping vulnerable drivers (“winring0x64.sys”) to provide kernel-level access and improving mining efficiency.

Of the infected WordPress sites, the majority of them are located in Australia, Brazil, Italy, Canada, Colombia and Israel, spanning the technology, hospitality, legal/financial, healthcare and real estate sectors.

To mitigate the risk poses of ShadowCaptcha, it is essential to be aware of ClickFix campaigns, train your WordPress site to prevent lateral movement using segment networks, keep your WordPress site up to date, and use Multifactor Authentication (MFA) protection to protect your WordPress site.

“Shadowcaptcha shows how social engineering attacks evolved into full-spectrum cyber manipulation,” the researchers said. “By running the built-in Windows tools for users and tricking them into layering obfuscated scripts and vulnerable drivers, operators gain stealth persistence and can pivot between data theft, crypto mining, or ransomware.”

This disclosure details the evolution of Help TDS, a traffic distribution (or direction) system that GoDaddy has been active since 2017 and linked to malicious schemes like Vextrio Viper. HELP TDS provides partners and affiliates with PHP code templates injected into WordPress sites, and ultimately directed to users towards malicious destinations based on targeting criteria.

Identity Security Risk Assessment

“This operation specializes in technical support fraud that utilizes exit prevention technology to capture victims on fraudulent Microsoft Windows security alert pages using full-screen browser operations and exit prevention technology.

Notable malware campaigns leveraging TDS help in recent years include Dollyway, Balada Injector and DNS TXT redirects. Scam pages use JavaScript to force browsers to full screen mode, display malicious alerts, and have the challenge of fake Captcha before rendering them to avoid automated security scanners.

It is said that the TDS operator developed a malicious WordPress plugin between late 2024 and August 2025, known as “woocommerce_inputs”, enabling redirection functionality, and steadily adding credential harvesting, geographic filtering, and advanced evasion techniques. The plugin is estimated to be installed on more than 10,000 sites around the world.

Malicious plugins will impersonate WooCommerce to avoid detection by site owners. It is only installed by an attacker after breaching a WordPress site via stolen administrator credentials.

“The plugin serves both as a traffic monetization tool and as a qualification harvesting mechanism, demonstrating the continuous evolution from simple redirection capabilities to providing sophisticated malware as a service,” GoDaddy said.

“By offering off-the-shelf solutions that include C2 infrastructure, standardized PHP injection templates and fully functional malicious WordPress plugins, TDS lowers the entry barrier for cybercriminals trying to monetize pervasive websites.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleHorizon Academy and Horizon Europe Roadshow in Canada
Next Article UK launches public consultations on firefighter PFA
user
  • Website

Related Posts

Flaws in CITRIX patches of three netterlers confirm aggressive misuse of CVE-2025-7775

August 26, 2025

Targeting Mixed Shell Malware Supply Chain Makers Delivered via Contact Form

August 26, 2025

HookAndroidTrojan adds ransomware overlays and extends to 107 remote commands

August 26, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Flaws in CITRIX patches of three netterlers confirm aggressive misuse of CVE-2025-7775

Security researchers map hundreds of Teslamate servers spilling Tesla vehicle data

Google Gemini AI Image Model Gets “Banana” Upgrade

Competition for atomic layer devices

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Web 3.0’s Promise: What Sir Tim Berners-Lee Envisions for the Future of the Internet

TwinH’s Paves Way at Break The Gap 2025

Smarter Healthcare Starts Now: The Power of Integrated Medical Devices

The Genius of Frustration: Tim Berners-Lee on Creating the Internet We Know

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.