Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Advances in solid-state laser technology for sustainable nuclear fusion

Fake CAPTCHA IRSF scam and 120 Keitaro campaign triggers global SMS, crypto fraud

A freshman at Stanford University who wants to rule the world. . . I will try harder after reading this book.

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Fake CAPTCHA IRSF scam and 120 Keitaro campaign triggers global SMS, crypto fraud
Identity

Fake CAPTCHA IRSF scam and 120 Keitaro campaign triggers global SMS, crypto fraud

By April 27, 2026No Comments6 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Cybersecurity researchers have revealed details of a telecom fraud campaign that uses fake CAPTCHA verification tricks to trick unsuspecting users into sending international text messages, charging them to their cell phone bills and generating illegal revenue for attackers who lease phone numbers.

The operation is believed to have been active since at least June 2020, using techniques such as social engineering and web browser back button hijacking, according to a new report published by Infoblox. As many as 35 phone numbers across 17 countries have been observed as part of the International Revenue Sharing Fraud (IRSF) campaign.

Researchers David Brunsdon and Darby Wise said in their analysis: “The fake CAPTCHA has multiple steps, and each message created by the site is pre-populated with more than a dozen phone numbers. This means that rather than victims being charged for a single message, they are charged for sending an SMS to more than 50 international destinations.”

“This type of fraud also benefits from billing delays, as ‘international SMS’ charges often appear on victims’ bills weeks later, and the fake CAPTCHA experience is long forgotten.”

What makes this threat notable is the combination of revenue sharing fraud and a malicious traffic distribution system (TDS). This infrastructure, traditionally responsible for routing traffic to malware and phishing pages through redirect chains to evade detection, is being used to carry out large-scale SMS fraud.

IRSF schemes involve fraudsters illegally acquiring international premium rate numbers (IPRNs) or number ranges, artificially inflating the volume of international calls or messages to those numbers, and receiving a portion of the revenue generated from the call charges that the number range holder receives for incoming traffic to the number range.

In this context, termination charges refer to inter-carrier charges paid by the originating carrier to the terminating carrier to complete a call on the network. IRSF is driven by the abuse of these “revenue-sharing” arrangements, where the originating carrier ends up paying a termination fee to the destination network for calls to high-value destinations, a portion of which is split 50-50 with the fraudster.

According to Infoblox, the campaigns observed specifically register phone numbers from countries with high cancellation fees and weak regulations, such as Azerbaijan, Kazakhstan, or certain premium number ranges in Europe, and collude with local telecom providers to carry out the fraud.

The entire campaign will unfold as follows. Users are redirected to a fake web page using a commercial TDS and provide a CAPTCHA that instructs them to send an SMS to “verify that you are a human”. This triggers a multi-step “verification” chain, with each step triggering a separate SMS message to the number specified by the server by programmatically launching an SMS app on both Android and iOS devices pre-filled with the phone number and message content.

In the process, up to 60 SMS messages are sent to 15 unique numbers after going through four CAPTCHA steps, potentially costing the user $30 in the end. While this amount may be relatively small, the DNS threat intelligence firm warned that it could quickly add up for threat actors if performed at scale. The list of phone numbers spans 17 countries including Azerbaijan, Netherlands, Belgium, Poland, Spain, and Turkey.

This campaign relies heavily on cookies to track the progress of the fake verification flow, using the values ​​stored in certain cookies (e.g. ‘successRate’) to determine the next action. If the user is deemed ineligible for the campaign, the page is designed to redirect the user to an entirely different CAPTCHA page, likely part of another campaign or controlled by another attacker.

Another new strategy employed by scammers is the use of back button hijacking. It relies on JavaScript to modify browsing history, and when a site visitor attempts to navigate away from a CAPTCHA page by pressing the browser’s back button, it redirects the user to a fake page, effectively trapping the user in a navigation loop unless they choose to exit the browser completely.

“This operation defrauds both individuals and carriers at the same time. Individual victims face unexpectedly high SMS charges on their bills, and fraud will be difficult to identify and report when it comes from such an unexpected source,” Infoblox concluded. “Carriers are likely to pay revenue sharing to perpetrators while absorbing losses from customer disputes and chargebacks.”

How threat actors exploit Keitaro TDS

This disclosure indicates that the company, in collaboration with Confiant, has announced that Keitaro TDS (also known as Keitaro TDS) This comes after Tracker published a three-part analysis detailing how they are being exploited by a wide range of threat actors for malicious activities, including the distribution of malware, theft of cryptocurrencies, and investment scams that claim to use artificial intelligence (AI) to automate transactions and promise huge profits, in some cases by acquiring stolen or cracked licenses (as in the case of TA2726).

The scams use Facebook ads to drive victims to fraudulent AI-powered platforms and, in some cases, resort to fabricating celebrity endorsements through fake news articles and deepfake videos to promote investment schemes. The use of synthetic videos is believed to be by a threat actor known as FaiKast.

“Keitaro is first and foremost a self-hosted ad performance tracker designed to conditionally route visitors using flows,” the companies said. “Threat actors reuse this mechanism to transform the Keitaro server into an all-in-one tool that acts as a traffic distribution system, tracker, and cloaking layer.”

Over a four-month period from October 2025 to January 2026, over 120 different campaigns in total exploited Keitaro’s TDS for link distribution. Infoblox noted that its customers logged approximately 226,000 DNS queries across 13,500 domains related to Keitaro-related activity during the period. Following responsible disclosure, Keitaro stepped in to cancel more than a dozen accounts associated with these activities.

Infoblox and Confiant said, “By combining an old but highly effective investment fraud theme with modern AI technology, attackers were able to launch a large-scale and highly convincing cyber campaign.” “Approximately 96% of the spam traffic linked to Keitaro was facilitating cryptocurrency wallet draining schemes via fake airdrops/giveaway lures primarily centered around AURA, SOL (Solana token), Phantom (wallet), and Jupiter (DEX/aggregator).”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleA freshman at Stanford University who wants to rule the world. . . I will try harder after reading this book.
Next Article Advances in solid-state laser technology for sustainable nuclear fusion

Related Posts

Researchers discover pre-Stuxnet ‘fast16’ malware targeting engineering software

April 25, 2026

CISA adds four exploited flaws to KEV, sets federal deadline for May 2026

April 25, 2026

FIRESTARTER backdoor hits federal Cisco Firepower devices, survives security patch

April 24, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Advances in solid-state laser technology for sustainable nuclear fusion

Fake CAPTCHA IRSF scam and 120 Keitaro campaign triggers global SMS, crypto fraud

A freshman at Stanford University who wants to rule the world. . . I will try harder after reading this book.

Created by Tim Cook | Tech Crunch

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.