{"id":14148,"date":"2026-04-25T23:08:00","date_gmt":"2026-04-25T23:08:00","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=14148"},"modified":"2026-04-25T23:08:01","modified_gmt":"2026-04-25T23:08:01","slug":"pretend-captcha-pages-exploit-clicks-to-ship-expensive-worldwide-texts","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=14148","title":{"rendered":"Pretend CAPTCHA Pages Exploit Clicks to Ship Expensive Worldwide Texts"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p>Community safety agency Infoblox has disclosed particulars on a long-running fraud operation that has been quietly draining financial institution accounts since not less than June 2020. This rip-off makes use of <a rel=\"nofollow\" target=\"_blank\" target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/fake-captcha-verification-pages-lumma-stealer-malware\/\" data-type=\"post\" data-id=\"120682\">pretend CAPTCHA pages<\/a> to hold out a selected kind of cybercrime referred to as Worldwide Income Share Fraud, or IRSF. <\/p>\n<p>Whereas most individuals see CAPTCHA as a boring however needed option to show they&#8217;re human, the scammers behind this marketing campaign have transformed this course of right into a profit-making software by tricking customers into sending high-cost worldwide textual content messages.<\/p>\n<h3 id=\"the-attack-chain\" class=\"wp-block-heading\"><strong>The Assault Chain<\/strong><\/h3>\n<p>In keeping with cybersecurity researchers at Infoblox Risk Intelligence, the assault begins when an individual by chance visits a <a rel=\"nofollow\" target=\"_blank\" target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/malware-infects-linux-macos-typosquatted-go-packages\/\" data-type=\"post\" data-id=\"126887\">typosquatted<\/a> area. These are lookalike addresses designed to imitate well-known telecommunications manufacturers. When the person lands on the flawed web page, they&#8217;re compelled in direction of a fancy Site visitors Distribution System (<a rel=\"nofollow\" target=\"_blank\" target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/hackers-arpa-top-level-domain-phishing-scams\/\">TDS<\/a>). <\/p>\n<p>In a latest remark from March 2026, researchers tracked this path because it moved by a number of nodes, together with a business promoting community in Germany, earlier than reaching a touchdown web page managed by the scammers, resembling <code>zawsterriscom<\/code>.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a rel=\"nofollow\" target=\"_blank\" target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Fake-CAPTCHA-Scam-Tricks-Users-Into-Expensive-International-SMS-Fraud-3.png\"><img loading=\"lazy\" decoding=\"async\" width=\"409\" height=\"879\" src=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Fake-CAPTCHA-Scam-Tricks-Users-Into-Expensive-International-SMS-Fraud-3.png\" alt=\"\" class=\"wp-image-144345\" srcset=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Fake-CAPTCHA-Scam-Tricks-Users-Into-Expensive-International-SMS-Fraud-3.png 409w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Fake-CAPTCHA-Scam-Tricks-Users-Into-Expensive-International-SMS-Fraud-3-140x300.png 140w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Fake-CAPTCHA-Scam-Tricks-Users-Into-Expensive-International-SMS-Fraud-3-380x817.png 380w\" sizes=\"auto, (max-width: 409px) 100vw, 409px\"\/><\/a><figcaption class=\"wp-element-caption\">Redirection chain that results in a pretend CAPTCHA web page (Supply: Infoblox)<\/figcaption><\/figure>\n<\/div>\n<h3 id=\"technical-methods-of-deception\" class=\"wp-block-heading\"><strong>Technical Strategies of Deception<\/strong><\/h3>\n<p>When the sufferer visits the pretend <a rel=\"nofollow\" target=\"_blank\" target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/fake-captcha-scam-microsoft-tools-amatera-stealer\/\">CAPTCHA<\/a>, they&#8217;re requested easy questions on their system kind (iOS or Android) or community velocity (4G or WiFi), which is in contrast to how CAPTCHA checks truly work. And, that\u2019s the place the trick lies; each time the sufferer clicks a solution, a JavaScript operate referred to as <code>makeTrackerDownload.php<\/code> is triggered, which forces their telephone to open its SMS app with a pre-filled message and an extended record of worldwide telephone numbers.<\/p>\n<p>By the point the four-step verification is full, the sufferer might have despatched 60 messages to over 50 completely different locations. These messages are routed to 35 telephone numbers throughout 17 completely different nations with excessive termination charges, like Azerbaijan, Kazakhstan, and Myanmar.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a rel=\"nofollow\" target=\"_blank\" target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Fake-CAPTCHA-Scam-Tricks-Users-Into-Expensive-International-SMS-Fraud.png\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"711\" src=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Fake-CAPTCHA-Scam-Tricks-Users-Into-Expensive-International-SMS-Fraud.png\" alt=\"\" class=\"wp-image-144343\" style=\"width:653px;height:auto\" srcset=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Fake-CAPTCHA-Scam-Tricks-Users-Into-Expensive-International-SMS-Fraud.png 800w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Fake-CAPTCHA-Scam-Tricks-Users-Into-Expensive-International-SMS-Fraud-300x267.png 300w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Fake-CAPTCHA-Scam-Tricks-Users-Into-Expensive-International-SMS-Fraud-768x683.png 768w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Fake-CAPTCHA-Scam-Tricks-Users-Into-Expensive-International-SMS-Fraud-380x338.png 380w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\"\/><\/a><figcaption class=\"wp-element-caption\">Pretend CAPTCHA course of (Supply: Infoblox)<\/figcaption><\/figure>\n<\/div>\n<h3 id=\"trapping-the-victim\" class=\"wp-block-heading\"><strong>Trapping the Sufferer<\/strong><\/h3>\n<p>To make sure the sufferer doesn&#8217;t depart earlier than the job is completed, the menace actors use a method referred to as again button hijacking, which <a rel=\"nofollow\" target=\"_blank\" target=\"_blank\" rel=\"noopener\" href=\"https:\/\/developers.google.com\/search\/blog\/2026\/04\/back-button-hijacking\">Google lately banned<\/a>. Through the use of a selected coding technique to govern the browser historical past, the hackers entice the person in a loop. If the particular person tries to click on again to a secure website, the script merely refreshes the rip-off web page. <\/p>\n<p>This persistent interplay permits the scammers to maximise their income throughout a number of carriers. Researchers famous that the fees, which might complete $30 or extra per session, typically don&#8217;t seem on a telephone invoice for weeks, and the sufferer has most likely forgotten the web site by the point they see the monetary injury.<\/p>\n<h3 id=\"attribution\" class=\"wp-block-heading\"><strong>Attribution<\/strong><\/h3>\n<p>Infoblox researchers have attributed this exercise to an affiliate of a European Click2SMS community, which makes use of infrastructure hosted on AS15699, also called Adam Ecotech. Additional <a rel=\"nofollow\" target=\"_blank\" target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/hold-the-phone-international-revenue-share-fraud-driven-by-fake-captchas\/\">investigation<\/a> discovered that the identical methods used to unfold malware and scareware at the moment are getting used to industrialise telephone fraud. <\/p>\n<p>Nonetheless, be careful for such scams, as a reputable safety test won&#8217;t ever require you to ship a textual content message to show your identification.<\/p>\n<p>(Picture by kuu akura on <a rel=\"nofollow\" target=\"_blank\" target=\"_blank\" rel=\"noopener\" href=\"https:\/\/unsplash.com\/photos\/text-icon-pnK6Q-QTHM4?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash<\/a>)<\/p>\n<p>\n\t\t\t<\/div>\n<p><template id="JRqLiCytIt3RAm3ZiaaY"></template><\/script><br \/>\n<br \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Community safety agency Infoblox has disclosed particulars on a long-running fraud operation that has been quietly draining financial institution accounts since not less than June 2020. This rip-off makes use of pretend CAPTCHA pages to hold out a selected kind of cybercrime referred to as Worldwide Income Share Fraud, or IRSF. Whereas most individuals see [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":14150,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[8814,8815,4490,776,67,5100,2269,8067,8816],"class_list":["post-14148","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-captcha","tag-clicks","tag-costly","tag-exploit","tag-fake","tag-international","tag-pages","tag-send","tag-texts"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/14148","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=14148"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/14148\/revisions"}],"predecessor-version":[{"id":14149,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/14148\/revisions\/14149"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/14150"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=14148"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=14148"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=14148"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-04-26 13:15:28 UTC -->