Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Shadowcaptcha Exploits WordPress Sites

August 28, 2025
Reading Time: 3 mins read
in Alerts
Shadowcaptcha Exploits WordPress Sites

A large-scale cybercrime campaign, ShadowCaptcha, is leveraging social engineering and sophisticated delivery methods to infect users with a variety of malicious payloads. First observed in August 2025 by the Israel National Digital Agency, this campaign stands out for its clever use of compromised WordPress sites to initiate a multi-stage attack. The core of the operation involves tricking unsuspecting victims into interacting with fake CAPTCHA verification pages. By blending social engineering with living-off-the-land binaries (LOLBins), ShadowCaptcha can gain and maintain a stealthy foothold on targeted systems. The campaign’s ultimate goal is to collect sensitive data, deploy cryptocurrency miners for illicit profits, or unleash devastating ransomware.

The initial vector of the ShadowCaptcha campaign is a compromised WordPress website that has been injected with malicious JavaScript code. When a user visits one of these infected sites, they are redirected to a convincing, but fake, Cloudflare or Google CAPTCHA page. This is where the ClickFix social engineering tactic comes into play. The fake CAPTCHA page presents instructions designed to mislead users into performing a specific action that will execute the malicious code. These instructions can take one of two paths: either guiding the victim to use the Windows Run dialog or instructing them to save the page as an HTML Application (HTA) and then run it using a legitimate Windows tool, mshta.exe.

The attack chain’s payload delivery is particularly insidious, utilizing legitimate Windows binaries to bypass security defenses. When a user follows the instructions to use the Windows Run dialog, the command executes an MSI installer or a remotely hosted HTA file. This action delivers information stealers like Lumma and Rhadamanthys. Alternatively, if the victim is tricked into saving and executing the HTA payload, they are infected with the Epsilon Red ransomware. This technique, previously documented by CloudSEK, cleverly relies on the user to unknowingly execute the malware. In some cases, the attack automatically copies a malicious command to the user’s clipboard using JavaScript, hoping they will paste and run it without realizing its true nature.

Beyond data theft and ransomware, ShadowCaptcha also deploys cryptocurrency miners to generate profits for the attackers. The campaigns have been observed delivering a crypto miner based on XMRig. In a display of technical sophistication, some variants are configured to fetch mining parameters from a Pastebin URL, allowing the attackers to modify mining settings on the fly. To further enhance their mining efficiency, the attackers drop a vulnerable driver, “WinRing0x64.sys,” to gain kernel-level access. This allows them to interact directly with CPU registers, optimizing the mining process and maximizing their illicit gains. The use of anti-debugger techniques and DLL side-loading also helps the attackers evade detection and maintain persistence on infected systems.

The reach of the ShadowCaptcha campaign is global, with a majority of the infected WordPress sites located in Australia, Brazil, Italy, Canada, Colombia, and Israel. These compromised sites span various sectors, including technology, hospitality, legal/finance, healthcare, and real estate. While the exact method of initial compromise for these WordPress sites remains unconfirmed, researchers have high confidence that the attackers exploited known vulnerabilities in plugins or gained access using stolen credentials. To protect against this evolving threat, organizations and individuals must train users to recognize ClickFix campaigns, implement network segmentation to prevent lateral movement, and ensure all WordPress sites are secured with timely updates and multi-factor authentication (MFA). ShadowCaptcha is a stark reminder of how social engineering has evolved into a sophisticated, full-spectrum cyber operation.

Reference:

  • Shadowcaptcha Uses WordPress Sites To Spread Ransomware Info Stealers And Crypto Miners
Tags: August 2025Cyber AlertsCyber Alerts 2025CyberattackCybersecurity
ADVERTISEMENT

Related Posts

BatShadow Unleashes Go Vampire Bot

BatShadow Unleashes Go Vampire Bot

October 10, 2025
BatShadow Unleashes Go Vampire Bot

Hackers Exploit Service Finder Flaw

October 10, 2025
Redis Use After Free Bug Enables RCE

FileFix Attack Evades Security Tools

October 10, 2025
Hackers Abuse WordPress for Phishing

Hackers Abuse WordPress for Phishing

October 10, 2025
Hackers Abuse WordPress for Phishing

Severe Framelink Figma MCP Code Flaw

October 10, 2025
Hackers Abuse WordPress for Phishing

Android Spyware ClayRat Imitates Apps

October 10, 2025

Latest Alerts

BatShadow Unleashes Go Vampire Bot

Hackers Exploit Service Finder Flaw

FileFix Attack Evades Security Tools

Hackers Abuse WordPress for Phishing

Severe Framelink Figma MCP Code Flaw

Android Spyware ClayRat Imitates Apps

Subscribe to our newsletter

    Latest Incidents

    Crimson Collective Hits AWS Instances

    GitHub Copilot Chat Flaw Leaks Repo Data

    Microsoft 365 Outage Hits Services

    Dozens Hit in Oracle-Linked Hacks

    BK Technologies Admits Cyber Breach

    Chinese Hackers Hit Williams Connolly

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial