{"id":29624,"date":"2025-02-15T11:06:25","date_gmt":"2025-02-15T11:06:25","guid":{"rendered":"https:\/\/gridinsoft.com\/blogs\/?p=29624"},"modified":"2025-02-15T11:07:45","modified_gmt":"2025-02-15T11:07:45","slug":"fake-captcha-pdf-phishing","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/fake-captcha-pdf-phishing\/","title":{"rendered":"Fake CAPTCHA Abuses PDF and SEO Poisoning"},"content":{"rendered":"<p><strong>Cybercrime actors misuse search ads to distribute fraudulent PDF files<\/strong>, that lead to fake CAPTCHA sites. This can end up with malware .<\/p>\n<h2>Phishing Campaign Abuses Webflow, SEO, and Fake CAPTCHA<\/h2>\n<p><a href=\"https:\/\/www.netskope.com\/blog\/new-phishing-campaign-abuses-webflow-seo-and-fake-captchas\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">A recent phishing campaign<\/a> has been targeting individuals searching for documents online, aiming to steal their credit card information. This operation has been active since mid-2024 and has affected numerous users across various industries. The most impacted sectors include technology, manufacturing, and banking, particularly in North America, Asia, and Southern Europe.<\/p>\n<p><strong>The attackers abuse search engines<\/strong> to lure victims into accessing malicious PDF files hosted on Webflow&#8217;s Content Delivery Network (CDN). These PDFs contain fake CAPTCHA images embedded with phishing links, leading unsuspecting users to provide sensitive information.<\/p>\n<h2>Technical Details of the Scam<\/h2>\n<p>Essentially, the attack is <a href=\"https:\/\/gridinsoft.com\/blogs\/google-search-malvertising-fake-ads\/\">based on search advertising<\/a>, specifically the abuse of search results. The attackers exploit Webflow&#8217;s CDN to host malicious PDFs. Webflow, a popular website builder, offers CDN storage for customer assets, which in this case is misused to store harmful PDF files.<\/p>\n<p>Next, Google&#8217;s algorithms come into play. When individuals search for specific keywords like book titles, documents, or charts, these malicious PDFs appear in the top search engine results. In our case, it\u2019s assets.website-files[.]com. The PDFs are crafted with multiple targeted keywords to increase their visibility.<\/p>\n<figure id=\"attachment_29634\" aria-describedby=\"caption-attachment-29634\" style=\"width: 1396px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/02\/Webflow-Fake-CAPTCHA-1.png\" alt=\"Fake CAPTCHA PDF Phishing\" width=\"1396\" height=\"1232\" class=\"size-full wp-image-29634\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/02\/Webflow-Fake-CAPTCHA-1.png 1396w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/02\/Webflow-Fake-CAPTCHA-1-300x265.png 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/02\/Webflow-Fake-CAPTCHA-1-1024x904.png 1024w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/02\/Webflow-Fake-CAPTCHA-1-768x678.png 768w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/02\/Webflow-Fake-CAPTCHA-1-860x759.png 860w\" sizes=\"auto, (max-width: 1396px) 100vw, 1396px\" \/><figcaption id=\"caption-attachment-29634\" class=\"wp-caption-text\">Phishing link in the search results (source: Netskope)<\/figcaption><\/figure>\n<p>Upon opening, <strong>the PDF displays a fake CAPTCHA image<\/strong>. However, it\u2019s just an image with a link. So, when users attempt to solve this CAPTCHA, they are redirected to a website that is protected with an actual Cloudflare Turnstile CAPTCHA. This step creates an illusion of legitimacy.<\/p>\n<figure id=\"attachment_29635\" aria-describedby=\"caption-attachment-29635\" style=\"width: 2048px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/02\/Webflow-Fake-CAPTCHA-3.png\" alt=\"Fake CAPTCHA in PDF file screenshot\" width=\"2048\" height=\"1052\" class=\"size-full wp-image-29635\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/02\/Webflow-Fake-CAPTCHA-3.png 2048w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/02\/Webflow-Fake-CAPTCHA-3-300x154.png 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/02\/Webflow-Fake-CAPTCHA-3-1024x526.png 1024w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/02\/Webflow-Fake-CAPTCHA-3-768x395.png 768w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/02\/Webflow-Fake-CAPTCHA-3-1536x789.png 1536w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/02\/Webflow-Fake-CAPTCHA-3-860x442.png 860w\" sizes=\"auto, (max-width: 2048px) 100vw, 2048px\" \/><figcaption id=\"caption-attachment-29635\" class=\"wp-caption-text\">Fake CAPTCHA in PDF file (source: Netskope)<\/figcaption><\/figure>\n<p>After completing this step, users are taken to a forum offering a file named after their search query. To download the document, users are prompted to sign up by providing their email address and full name. Subsequently, they are asked <strong>to enter their credit card details<\/strong> to complete the sign-up process. At this point, the user should be suspicious.<\/p>\n<p>Once users provide this information, an error message is displayed, prompting users to resubmit their credit card details multiple times. Nevertheless, the entered data was sent to the attackers as early as the first time. Eventually, they are redirected to an HTTP 500 error page, leaving them unaware that their information has been compromised.<\/p>\n<figure id=\"attachment_29637\" aria-describedby=\"caption-attachment-29637\" style=\"width: 1024px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/02\/Webflow-Fake-CAPTCHA-8-1024x452-1.webp\" alt=\"Error message screenshot\" width=\"1024\" height=\"452\" class=\"size-full wp-image-29637\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/02\/Webflow-Fake-CAPTCHA-8-1024x452-1.webp 1024w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/02\/Webflow-Fake-CAPTCHA-8-1024x452-1-300x132.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/02\/Webflow-Fake-CAPTCHA-8-1024x452-1-768x339.webp 768w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/02\/Webflow-Fake-CAPTCHA-8-1024x452-1-860x380.webp 860w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption id=\"caption-attachment-29637\" class=\"wp-caption-text\">Error message after trying to enter credit card info (source: Netskope)<\/figcaption><\/figure>\n<h2>Where can this data go?<\/h2>\n<p>Stolen data has only two paths: the first is for scammers to directly try to use it, and the second is to sell it <a href=\"https:\/\/gridinsoft.com\/darknet\">on the Darknet<\/a>. Depending on the chosen option, the time of receiving a \u201cread report\u201d in the form of online payment attempts with the entered card will be sooner or later. If payment attempts followed almost immediately after the leak &#8211; the fraudsters decided not to bother.<\/p>\n<p>On the other hand, if the attackers plan to resell the stolen data on thematic forums, there may be no feedback for a long time. Although this may suggest that nobody stole anything, I strongly recommend <strong>blocking the leaked card and reissuing it<\/strong>. If this is not possible, it is very important to disable the credit limit on the card as well as the ability to pay online without confirmation.<\/p>\n<h2>How To Stay Safe?<\/h2>\n<p>To avoid falling victim to such phishing scams, it is crucial to incorporate critical thinking. Be cautious if a PDF file presents a CAPTCHA, as this is unusual for PDFs and should raise a red flag. First, I strongly recommend <strong>avoiding clicking on links labeled as &#8220;Sponsored&#8221;<\/strong> in search engine results. These links almost always lead to malicious sites. Instead, consider use an ad blocker and a reputable anti-malware solution to enhance your protection against such threats.<\/p>\n<p>Continuing about protection against such threats, I would recommend using GridinSoft Anti-Malware. Foremost, it is a reliable solution that has an Internet Security module that is designed to protect against such scams. Secondly, it is a comprehensive solution that will provide all-round protection of your system from all kinds of cyber threats.<\/p>\n<p style=\"padding-top:15px;padding-bottom:15px;\"><a href=\"\/download\/antimalware\" rel=\"nofollow\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"\/blogs\/wp-content\/uploads\/2022\/07\/env02.webp\" alt=\"Fake CAPTCHA Abuses PDF and SEO Poisoning\" width=\"798\" height=\"336\" class=\"aligncenter size-full\" title=\"\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybercrime actors misuse search ads to distribute fraudulent PDF files, that lead to fake CAPTCHA sites. This can end up with malware . Phishing Campaign Abuses Webflow, SEO, and Fake CAPTCHA A recent phishing campaign has been targeting individuals searching for documents online, aiming to steal their credit card information. This operation has been active [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":29642,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[15],"tags":[229,131,826],"class_list":{"0":"post-29624","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security-news","8":"tag-captcha","9":"tag-phishing","10":"tag-scam"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/02\/Phishing-Campaign-Abuses-Webflow-SEO-and-Fake-CAPTCHA.webp","author_info":{"display_name":"Stephanie Adlam","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/adlam\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/29624","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=29624"}],"version-history":[{"count":13,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/29624\/revisions"}],"predecessor-version":[{"id":29639,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/29624\/revisions\/29639"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/29642"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=29624"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=29624"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=29624"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}