Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Shadowcaptcha Exploits WordPress Sites

August 28, 2025
Reading Time: 3 mins read
in Alerts
Shadowcaptcha Exploits WordPress Sites

A large-scale cybercrime campaign, ShadowCaptcha, is leveraging social engineering and sophisticated delivery methods to infect users with a variety of malicious payloads. First observed in August 2025 by the Israel National Digital Agency, this campaign stands out for its clever use of compromised WordPress sites to initiate a multi-stage attack. The core of the operation involves tricking unsuspecting victims into interacting with fake CAPTCHA verification pages. By blending social engineering with living-off-the-land binaries (LOLBins), ShadowCaptcha can gain and maintain a stealthy foothold on targeted systems. The campaign’s ultimate goal is to collect sensitive data, deploy cryptocurrency miners for illicit profits, or unleash devastating ransomware.

The initial vector of the ShadowCaptcha campaign is a compromised WordPress website that has been injected with malicious JavaScript code. When a user visits one of these infected sites, they are redirected to a convincing, but fake, Cloudflare or Google CAPTCHA page. This is where the ClickFix social engineering tactic comes into play. The fake CAPTCHA page presents instructions designed to mislead users into performing a specific action that will execute the malicious code. These instructions can take one of two paths: either guiding the victim to use the Windows Run dialog or instructing them to save the page as an HTML Application (HTA) and then run it using a legitimate Windows tool, mshta.exe.

The attack chain’s payload delivery is particularly insidious, utilizing legitimate Windows binaries to bypass security defenses. When a user follows the instructions to use the Windows Run dialog, the command executes an MSI installer or a remotely hosted HTA file. This action delivers information stealers like Lumma and Rhadamanthys. Alternatively, if the victim is tricked into saving and executing the HTA payload, they are infected with the Epsilon Red ransomware. This technique, previously documented by CloudSEK, cleverly relies on the user to unknowingly execute the malware. In some cases, the attack automatically copies a malicious command to the user’s clipboard using JavaScript, hoping they will paste and run it without realizing its true nature.

Beyond data theft and ransomware, ShadowCaptcha also deploys cryptocurrency miners to generate profits for the attackers. The campaigns have been observed delivering a crypto miner based on XMRig. In a display of technical sophistication, some variants are configured to fetch mining parameters from a Pastebin URL, allowing the attackers to modify mining settings on the fly. To further enhance their mining efficiency, the attackers drop a vulnerable driver, “WinRing0x64.sys,” to gain kernel-level access. This allows them to interact directly with CPU registers, optimizing the mining process and maximizing their illicit gains. The use of anti-debugger techniques and DLL side-loading also helps the attackers evade detection and maintain persistence on infected systems.

The reach of the ShadowCaptcha campaign is global, with a majority of the infected WordPress sites located in Australia, Brazil, Italy, Canada, Colombia, and Israel. These compromised sites span various sectors, including technology, hospitality, legal/finance, healthcare, and real estate. While the exact method of initial compromise for these WordPress sites remains unconfirmed, researchers have high confidence that the attackers exploited known vulnerabilities in plugins or gained access using stolen credentials. To protect against this evolving threat, organizations and individuals must train users to recognize ClickFix campaigns, implement network segmentation to prevent lateral movement, and ensure all WordPress sites are secured with timely updates and multi-factor authentication (MFA). ShadowCaptcha is a stark reminder of how social engineering has evolved into a sophisticated, full-spectrum cyber operation.

Reference:

  • Shadowcaptcha Uses WordPress Sites To Spread Ransomware Info Stealers And Crypto Miners
Tags: August 2025Cyber AlertsCyber Alerts 2025CyberattackCybersecurity
ADVERTISEMENT

Related Posts

Shadowcaptcha Exploits WordPress Sites

AI Systems Used for Ransomware Attacks

August 28, 2025
Shadowcaptcha Exploits WordPress Sites

Coordinated Scans Target Microsoft RDP

August 28, 2025
MixShell Hts US Supply Chain Firms

MixShell Hts US Supply Chain Firms

August 27, 2025
MixShell Hts US Supply Chain Firms

AI Attack Hides Prompts In Images

August 27, 2025
MixShell Hts US Supply Chain Firms

WhatsApp Desktop Code Execution Risk

August 27, 2025
Fake CoinMarketCap Journalists Scam

Fake CoinMarketCap Journalists Scam

August 26, 2025

Latest Alerts

AI Systems Used for Ransomware Attacks

Coordinated Scans Target Microsoft RDP

Shadowcaptcha Exploits WordPress Sites

MixShell Hts US Supply Chain Firms

AI Attack Hides Prompts In Images

WhatsApp Desktop Code Execution Risk

Subscribe to our newsletter

    Latest Incidents

    Swedish Towns Hit By Ransomware Attack

    Nevada Closes Offices After Cyberattack

    Doge Accused Of Mimicking SSN Info

    Auchan Retailer Reports Data Breach

    NJ Social Services Reports Data Breach

    Salesloft Breach Exposes OAuth Tokens

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial