![Captcha Trick on Webflow Captcha Trick on Webflow](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjE8fSEcKLmb_PCMSPO4kchN7GAhh2sBQE6GhXgNTAQY-Ncpk738Ztw6YJqwgK_gZW3LU4JJDq_lZ51xSUjO_nBdL7KGVmsUqiqNLRogXPDXy7tM5qbGG98TIt53psA34_6o6X06rN6_bf9ap4OZNvvlAgUCsWdtdzEsUuIqpPvlEqV7W4GE416_Jo2bstp/s728-rw-e365/pdfs.png)
A wide range of phishing campaigns have been observed that leverage fake PDF documents hosted on WebFlow Content Delivery Network (CDN) with the aim of stealing credit card information and committing financial fraud.
“Attackers will target victims searching search engine documents, provide access to malicious PDFs containing Captcha images with embedded phishing links, and provide sensitive information.”
![Cybersecurity](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6e4c8i_pkXRCFnrtqVIygOrARiVnU3_KUgU5mhPl5V4uj8R1KcQOxRLdZ0xm1Rf5AX_cviUAeiiRkTJCe8HXzOeB363590NBXAMv92N9e7zr4m7aKtDq-Q_gpP9QFWecL0oxcVtmqSg9qrGEGqlDbzwNNFKGJe2nlup4tuL7AZzTm0U501YxPGodOc2Fq/s728-rw-e100/zz-d.jpg)
This activity has been in progress since the second half of 2024, redirecting users to PDF files hosted on WebFlow CDN for users looking for book titles, documents and charts in search engines like Google. It involves that.
These PDF files have images embedding that mimic the Captcha challenge, bringing the user clicking onto the phishing page, this time hosting the actual CloudFlare TurnStile Captcha.
In doing so, the attacker lends the process to a veneer of legitimacy, thinks that he has tricked the victim into interacting with security checks, and aims to avoid detection by a static scanner.
Users completing the real Captcha Challenge will then be redirected to a page containing a “download” button to access the expected documents. However, when the victim tries to complete the step, they will be provided with a pop-up message asking them to enter their personal and credit card details.
![Captcha Trick on Webflow Captcha Trick on Webflow](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2DSHtO0F4CBsLkLQfgwhkR36Uw9W4KZewAgcfktckqx5EHGzRVS3J34weCkCV0e_j7LMM5UmFrdoFSti8hu1maxvEVvPwwdiwHKJZp0EzdyPZHWAlZhgBx6hXzfltp5y0_V5zBpy1ZjllaEbWKp3VnC2lRZBIDNp5P5QcHUpk5jllLDohyphenhyphenGEp0YC9vxeQ/s728-rw-e365/captcha.png)
“When you enter your credit card details, the attacker will send you an error message indicating that it is not accepted,” Michael Alcantara said. “If the victim submits his credit card details two or three more times, he will be redirected to the HTTP 500 error page.”
Developments include $2,000 in exchange for six months updates and bypass technology in the telegram and cybercrime market, as Slashnext details a new phishing kit named Astaroth (not to be confused with bank malware of the same name). is advertised in.
![Cybersecurity](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhc0hgq4JZKi-PJjUZ4kdb5ficmXr3IPOg6noFF558_qZ-gXm7vb0OzXU0NzsPAxaqca2tLI5j8NgJW731W0_CuPrUerOmSrZSt4IeANQp6VAQsIAQUzv6aJsxBD6poxHfELq0bcbeevSVy5AyOb9ganALMoA140nZoLOtSb0ck2AZ5rZgb9mWDEyVsbvqK/s728-rw-e100/saas-security-v1-d.png)
Similar to offering Phishing-as-a-Service (PHAAS), Cyber Crooks harvests credentials and two-factor authentication (2FA) codes via the Bogus login page, which mimics popular online services. Enables functionality.
“Astaroth utilizes Evilginx-style reverse proxy to intercept and manipulate traffic between victims and legitimate authentication services such as Gmail, Yahoo, Microsoft,” said security researcher Daniel Kelley states. “It acts as a middle man, captures login credentials, tokens and session cookies in real time, effectively bypassing 2FA.”
Source link