Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Fake CAPTCHA Pages Fuel Infostealer Attacks

December 17, 2024
Reading Time: 2 mins read
in Alerts
Fake CAPTCHA Pages Fuel Infostealer Attacks

Cybersecurity researchers have uncovered a large-scale malvertising campaign dubbed DeceptionAds, which uses fake CAPTCHA verification pages to deliver information stealers like Lumma malware. The campaign primarily targets visitors of pirated movie and clickbait websites, generating over 1 million daily ad impressions across more than 3,000 sites. Users are redirected to fraudulent CAPTCHA pages, where they are tricked into copying and executing Base64-encoded PowerShell commands, resulting in malware deployment that steals credentials and other sensitive data.

At the heart of this operation lies the abuse of legitimate ad networks and tracking services. Threat actors rely on Monetag, a monetization platform, to distribute malicious traffic while using BeMob ad-tracking services to cloak the final payload. The traffic flows through a Traffic Distribution System (TDS), redirecting unsuspecting visitors to fake CAPTCHA pages hosted on platforms like Oracle Cloud, Scaleway, Bunny CDN, and Cloudflare R2. This multi-layered approach complicates content moderation efforts and enables attackers to evade detection effectively.

Guardio Labs, which uncovered the campaign, noted that the threat actors registered as publishers with Monetag and leveraged BeMob’s reputation to bypass scrutiny. Following responsible disclosure, Monetag and BeMob removed over 200 accounts associated with the malicious activity. However, signs of the campaign resurfaced as of December 5, 2024, indicating the resilience of these operations and the continued exploitation of ad networks for malicious purposes.

The DeceptionAds campaign highlights the need for robust content moderation and stricter account validation to prevent fake registrations and misuse of legitimate platforms. It also underscores how fragmented responsibilities across ad networks, publishers, and hosting providers allow such campaigns to thrive. As attackers refine their tactics, collaboration across the cybersecurity ecosystem is critical to mitigate these threats and protect users from deceptive malvertising schemes.

Reference:

  • New DeceptionAds Campaign Uses Fake CAPTCHA Pages to Deliver Infostealer Malware
Tags: CAPTCHACyber AlertsCyber Alerts 2024Cyber threatsDecember 2024DeceptionAdsLumma malwareMalvertisingMalwarePowerShell
ADVERTISEMENT

Related Posts

Russian APT28 Deploys Outlook Backdoor

SAP S4hana Exploited Vulnerability

September 5, 2025
Russian APT28 Deploys Outlook Backdoor

Virustotal Finds Undetected SVG Files

September 5, 2025
Russian APT28 Deploys Outlook Backdoor

Russian APT28 Deploys Outlook Backdoor

September 5, 2025
Lazarus Hackers Exploit ZeroDay, Deploy Rats

Lazarus Hackers Exploit ZeroDay, Deploy Rats

September 4, 2025
Lazarus Hackers Exploit ZeroDay, Deploy Rats

CISA Flags TP Link Router Flaws

September 4, 2025
Lazarus Hackers Exploit ZeroDay, Deploy Rats

Google Patches 120 Flaws In Android

September 4, 2025

Latest Alerts

SAP S4hana Exploited Vulnerability

Virustotal Finds Undetected SVG Files

Russian APT28 Deploys Outlook Backdoor

CISA Flags TP Link Router Flaws

Lazarus Hackers Exploit ZeroDay, Deploy Rats

Google Patches 120 Flaws In Android

Subscribe to our newsletter

    Latest Incidents

    North Korean Hackers Fake Interviews

    Bridgestone Confirms Cyberattack

    Cybersecurity Firms Hit By Breach

    Salesloft Drift Attacks Hits Vendors

    Jaguar Land Rover Hit By Cyber Incident

    Hackers Use Grok Ai To Spread Malware

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial