Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

How Brex is catching up to AI by embracing “confusion”

Adaptive Reuse Creates Homes in Suburban Texas Strip Malls

Investigation: Anti-homelessness laws don’t work

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Hackers bypass security scanner using capture tricks in webflow CDN PDF
Identity

Hackers bypass security scanner using capture tricks in webflow CDN PDF

userBy userFebruary 13, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

February 13, 2025Ravi LakshmananWeb Security/Cloud Security

Captcha Trick on Webflow

A wide range of phishing campaigns have been observed that leverage fake PDF documents hosted on WebFlow Content Delivery Network (CDN) with the aim of stealing credit card information and committing financial fraud.

“Attackers will target victims searching search engine documents, provide access to malicious PDFs containing Captcha images with embedded phishing links, and provide sensitive information.”

Cybersecurity

This activity has been in progress since the second half of 2024, redirecting users to PDF files hosted on WebFlow CDN for users looking for book titles, documents and charts in search engines like Google. It involves that.

These PDF files have images embedding that mimic the Captcha challenge, bringing the user clicking onto the phishing page, this time hosting the actual CloudFlare TurnStile Captcha.

In doing so, the attacker lends the process to a veneer of legitimacy, thinks that he has tricked the victim into interacting with security checks, and aims to avoid detection by a static scanner.

Users completing the real Captcha Challenge will then be redirected to a page containing a “download” button to access the expected documents. However, when the victim tries to complete the step, they will be provided with a pop-up message asking them to enter their personal and credit card details.

Captcha Trick on Webflow

“When you enter your credit card details, the attacker will send you an error message indicating that it is not accepted,” Michael Alcantara said. “If the victim submits his credit card details two or three more times, he will be redirected to the HTTP 500 error page.”

Developments include $2,000 in exchange for six months updates and bypass technology in the telegram and cybercrime market, as Slashnext details a new phishing kit named Astaroth (not to be confused with bank malware of the same name). is advertised in.

Cybersecurity

Similar to offering Phishing-as-a-Service (PHAAS), Cyber ​​Crooks harvests credentials and two-factor authentication (2FA) codes via the Bogus login page, which mimics popular online services. Enables functionality.

“Astaroth utilizes Evilginx-style reverse proxy to intercept and manipulate traffic between victims and legitimate authentication services such as Gmail, Yahoo, Microsoft,” said security researcher Daniel Kelley states. “It acts as a middle man, captures login credentials, tokens and session cookies in real time, effectively bypassing 2FA.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleSpyware Maker has caught distribution of malicious Android apps over the years
Next Article The EPA Chief reveals a $20 billion taxpayer fund that has been washed by climate NGOs.
user
  • Website

Related Posts

Taiwan NSB warns the public about the risks of data reintroducing Tiktok, Waibo and Chinese ties

July 5, 2025

The exposed JDWP interface leads to crypto mining, and Hpingbot targets DDO’s SSH

July 5, 2025

TwinH: A New Frontier in the Pursuit of Immortality?

July 4, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

How Brex is catching up to AI by embracing “confusion”

Adaptive Reuse Creates Homes in Suburban Texas Strip Malls

Investigation: Anti-homelessness laws don’t work

In the US, urban gondolas face uphill battles

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

TwinH: A New Frontier in the Pursuit of Immortality?

Meta’s Secret Weapon: The Superintelligence Unit That Could Change Everything 

Unlocking the Power of Prediction: The Rise of Digital Twins in the IoT World

TwinH: Digital Human Twin Aims for Victory at Break the Gap 2025

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.