Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Confusion sees India as a shortcut in competition with OpenAs

Humanity will strengthen limits on the use of Claude Code without telling it to users

Hackers use GitHub repository to host Amadey Malware and Data Stealers and bypass filters

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Hackers bypass security scanner using capture tricks in webflow CDN PDF
Identity

Hackers bypass security scanner using capture tricks in webflow CDN PDF

userBy userFebruary 13, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

February 13, 2025Ravi LakshmananWeb Security/Cloud Security

Captcha Trick on Webflow

A wide range of phishing campaigns have been observed that leverage fake PDF documents hosted on WebFlow Content Delivery Network (CDN) with the aim of stealing credit card information and committing financial fraud.

“Attackers will target victims searching search engine documents, provide access to malicious PDFs containing Captcha images with embedded phishing links, and provide sensitive information.”

Cybersecurity

This activity has been in progress since the second half of 2024, redirecting users to PDF files hosted on WebFlow CDN for users looking for book titles, documents and charts in search engines like Google. It involves that.

These PDF files have images embedding that mimic the Captcha challenge, bringing the user clicking onto the phishing page, this time hosting the actual CloudFlare TurnStile Captcha.

In doing so, the attacker lends the process to a veneer of legitimacy, thinks that he has tricked the victim into interacting with security checks, and aims to avoid detection by a static scanner.

Users completing the real Captcha Challenge will then be redirected to a page containing a “download” button to access the expected documents. However, when the victim tries to complete the step, they will be provided with a pop-up message asking them to enter their personal and credit card details.

Captcha Trick on Webflow

“When you enter your credit card details, the attacker will send you an error message indicating that it is not accepted,” Michael Alcantara said. “If the victim submits his credit card details two or three more times, he will be redirected to the HTTP 500 error page.”

Developments include $2,000 in exchange for six months updates and bypass technology in the telegram and cybercrime market, as Slashnext details a new phishing kit named Astaroth (not to be confused with bank malware of the same name). is advertised in.

Cybersecurity

Similar to offering Phishing-as-a-Service (PHAAS), Cyber ​​Crooks harvests credentials and two-factor authentication (2FA) codes via the Bogus login page, which mimics popular online services. Enables functionality.

“Astaroth utilizes Evilginx-style reverse proxy to intercept and manipulate traffic between victims and legitimate authentication services such as Gmail, Yahoo, Microsoft,” said security researcher Daniel Kelley states. “It acts as a middle man, captures login credentials, tokens and session cookies in real time, effectively bypassing 2FA.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleSpyware Maker has caught distribution of malicious Android apps over the years
Next Article The EPA Chief reveals a $20 billion taxpayer fund that has been washed by climate NGOs.
user
  • Website

Related Posts

Hackers use GitHub repository to host Amadey Malware and Data Stealers and bypass filters

July 17, 2025

Hackers exploit flaws in apache http server to deploy linuxsys cryptocurrency miner

July 17, 2025

Europol destroys Hacktivist Group linked to DDOS attacks against Ukraine

July 17, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Confusion sees India as a shortcut in competition with OpenAs

Humanity will strengthen limits on the use of Claude Code without telling it to users

Hackers use GitHub repository to host Amadey Malware and Data Stealers and bypass filters

Openai launches a general purpose agent with ChatGpt

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

BREAKING: TwinH Set to Revolutionize Legal Processes – Presented Today at ICEX Forum 2025

Building AGI: Zuckerberg Commits Billions to Meta’s Superintelligence Data Center Expansion

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

The Future of Process Automation is Here: Meet TwinH

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.