{"id":717,"date":"2026-04-27T09:12:01","date_gmt":"2026-04-27T09:12:01","guid":{"rendered":"https:\/\/thedigitalfortress.us\/?p=717"},"modified":"2026-04-27T09:12:01","modified_gmt":"2026-04-27T09:12:01","slug":"fake-captcha-irsf-scam-and-120-keitaro-campaigns-drive-global-sms-crypto-fraud","status":"publish","type":"post","link":"https:\/\/thedigitalfortress.us\/?p=717","title":{"rendered":"Fake CAPTCHA IRSF Scam and 120 Keitaro Campaigns Drive Global SMS, Crypto Fraud"},"content":{"rendered":"<div id=\"articlebody\">\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi-cI0h0qDxREUkTFlIqeT_9-QNxJHPv6SqDQXpMs00i8A26QWukWlxtk1iwdZvnar80HiymWGDY9148_CiWIdL2xj-t9xC9KDM-8WdGALuTRxhdZqDcaZf2MG9adEpZLkLqsaA2uMP-3e_E0Ru-A5JSv0_dvEjAAniYpsdS71SCxFVlmB1NhkL20oangQz\/s1700-e365\/sim-card.jpg\" style=\"clear: left; display: block; float: left;  text-align: center;\"><\/a><\/div>\n<p>Cybersecurity researchers have disclosed details of a telecommunications fraud campaign that uses fake CAPTCHA verification tricks to dupe unsuspecting users into sending international text messages that incur charges on their mobile bills, generating illicit revenue for the threat actors who lease the phone numbers.<\/p>\n<p>According to a new report published by Infoblox, the operation is believed to have been active since at least June 2020, using methods like social engineering and back button hijacking in web browsers. As many as 35 phone numbers spanning 17 countries have been observed as part of the international revenue share fraud (<a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/understanding-and-detecting-international-revenue-share-fraud\/\">IRSF<\/a>) campaign.<\/p>\n<p>\u00abThe fake CAPTCHA has multiple steps, and each message crafted by the site is preconfigured with over a dozen phone numbers, meaning the victim isn&#8217;t charged for just a single message \u2013 they&#8217;re charged for sending SMSs to over 50 international destinations,\u00bb researchers David Brunsdon and Darby Wise <a href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/hold-the-phone-international-revenue-share-fraud-driven-by-fake-captchas\/\">said<\/a> in an analysis.<\/p>\n<p>\u00abThis type of scam also benefits from delayed billing, as the &#8216;international SMS&#8217; charges often appear on the victim&#8217;s bill weeks later and the experience with the fake CAPTCHA has been long forgotten.\u00bb<\/p>\n<p>What makes the threat notable is the coming together of revenue share fraud and malicious traffic distribution systems (<a href=\"https:\/\/unit42.paloaltonetworks.com\/detect-block-malicious-traffic-distribution-systems\/\">TDSs<\/a>), with the activity using the infrastructure &#8212; traditionally responsible for routing traffic to malware or phishing pages though a redirection chain to evade detection \u2013 to conduct SMS scams at scale.<\/p>\n<p>IRSF schemes involve fraudsters illegally acquiring international premium rate numbers (IPRN) or number ranges and artificially inflating the volume of international calls or messages to those numbers to receive a share of the revenue generated from these calls from termination charges obtained by the number range holder for inbound traffic to the number ranges.<\/p>\n<p>In this context, a termination fee refers to the inter-carrier charges paid by an originating telecom operator to a terminating operator for completing a call on their network. It&#8217;s the exploitation of these \u00abrevenue sharing\u00bb agreements that drives IRSF, as the originating carrier ends up paying termination fees to the destination network for the incoming calls to the high-cost destinations, a portion of which is split with the fraudsters.<\/p>\n<p>Infoblox said the observed campaign specifically registers phone numbers in countries with high termination fees or lax regulations, such as Azerbaijan, Kazakhstan, or certain premium-rate number ranges in Europe, and colludes with local telecom providers to pull off the scam.<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/ai-security-guide-d-1\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjRxP56rpa2W0O_0yc0xgs5l2r4FRV4Wiuq3IqWuFdsd_4g1c3oRVXoHtW9gxo8ObuxmyjqkAf3cD6N1JbVDos7QX99ZHtmeVrg-FUzSnMZLTl1ZFyiSkpqQiw6BcHXz52jr3s42xWEDFOpwWK6HgXOqscGMNkhA5pZK7h6zVV4dpDaLfgy17TidZXVrtUB\/s728-e100\/nudge-d-1.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>The entire campaign plays out like this: a user is redirected to a bogus web page using a commercial TDS, which serves a CAPTCHA that instructs them to send an SMS to \u00abconfirm you are human.\u00bbThis, in turn, triggers a multi-stage \u00abverification\u00bb chain, with each step triggering a separate SMS message to the server-designated numbers by programmatically launching the SMS apps on both Android and iOS devices with the phone numbers and message content pre-filled.<\/p>\n<p>In the process, as many as 60 SMS messages are sent to 15 unique numbers after four steps of CAPTCHA, which could end up costing a user $30. While it may be a relatively small amount, the DNS threat intelligence firm warned that they could quickly add up for the threat actor when carried out at scale. The list of phone numbers spans 17 countries, such as Azerbaijan, the Netherlands, Belgium, Poland, Spain, and Turkey.<\/p>\n<p><a name=\"more\"\/><\/p>\n<p>The campaign heavily relies on cookies to track progression through the fake verification flow, using values stored in certain cookies (e.g., \u00absuccessRate\u00bb) to determine the next course of action.If a user is deemed not suitable for the campaign, the page is designed to redirect them to an entirely different CAPTCHA page that&#8217;s likely part of a separate campaign or controlled by a different actor.<\/p>\n<p>Another novel strategy adopted by the scam operators is the use of back button hijacking, which relies on JavaScript to alter the browsing history such that any attempt made by the site visitor to navigate away from the CAPTCHA page by hitting the browser&#8217;s back button redirects the user back to the fake page, effectively trapping them in a navigation loop unless they opt to fully exit the browser.<\/p>\n<table align=\"center\" cellpadding=\"0\" cellspacing=\"0\" class=\"tr-caption-container\" style=\"margin-left: auto; margin-right: auto;\">\n<tbody>\n<tr>\n<td style=\"text-align: center;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhb670rc1sgExTGEIDHKJ6qv6NcuizV6WFdQnwMLiSgQ514UTbQWxdNar84VUydenV4eTFF8Jai6l0gj6q6WP-vNJy1AfforY6Gk6flf9A_Vf845IMJ_Vg89hoKrX75XyQOwf7h14jLaXyVk9xGTiL7FSUu6RXQO7YN5_ApukhXs4L2JhBRRA20v1Lyh7cS\/s1700-e365\/time.jpg\" style=\"display: block; margin-left: auto; margin-right: auto;  text-align: center;\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhb670rc1sgExTGEIDHKJ6qv6NcuizV6WFdQnwMLiSgQ514UTbQWxdNar84VUydenV4eTFF8Jai6l0gj6q6WP-vNJy1AfforY6Gk6flf9A_Vf845IMJ_Vg89hoKrX75XyQOwf7h14jLaXyVk9xGTiL7FSUu6RXQO7YN5_ApukhXs4L2JhBRRA20v1Lyh7cS\/s1700-e365\/time.jpg\" alt=\"\" border=\"0\" data-original-height=\"525\" data-original-width=\"249\" style=\"width: 300px !important; margin: 0 auto;\"\/><\/a><\/td>\n<\/tr>\n<tr>\n<td class=\"tr-caption\" style=\"text-align: center;\">Redirection chain leading to a fake CAPTCHA page<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>\u00abThis operation defrauds both individuals and telecommunication carriers simultaneously. Individual victims face unexpected premium SMS charges on their bills and would have difficulty identifying and reporting the fraud when it originates from such an unexpected source,\u00bb Infoblox concluded. \u00abTelecom carriers pay revenue share to the perpetrators while likely absorbing the losses from customer disputes or chargebacks.\u00bb<\/p>\n<h3>How Threat Actors Abuse Keitaro TDS<\/h3>\n<p>The disclosure comes as the company, in collaboration with <a href=\"https:\/\/blog.confiant.com\/p\/tracking-software-weaponized-by-criminals\">Confiant<\/a>, published a three-part analysis detailing how the Keitaro TDS (aka Keitaro Tracker) is being abused, in some instances by acquiring stolen or cracked licenses (as in the case of TA2726), by a wide range of threat actors for <a href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/no-reach-no-risk-the-keitaro-abuse-in-modern-cybercrime-distribution\/\">malicious activities<\/a>, including malware delivery, cryptocurrency theft, and investment scams that claim to employ artificial intelligence (AI) to automate trading and promise huge returns.<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/fast-response-not-fast-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjgi9mu68zRUz1nCLLKmkAA2aBtNfP_JOTXulZoB6yImso1Onk7oM_LI0kdROu8fq5S5oDyMtd1j50W44Ye_8Sl3zQZiE8A9tmFr6kejGKjGh74uoxluF-RyBq_unDQlzjXZHCqQeuYXBoogda5zf0w-zXd6v0rIM7fEw6TcFf_QGWBu5Mop-djkEaOUa5A\/s728-e100\/tl-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>The scam makes use of\u00a0<a href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-keitaro-abuse-a-persistent-stream-of-ai-driven-investment-scams\/\">Facebook Ads to lure victims<\/a> to the fraudulent AI\u2011powered platforms, in some cases even resorting to fabricating celebrity endorsements pushed via fake news articles and deepfake videos to promote the investment scheme. The use of synthetic videos has been attributed to a threat actor dubbed FaiKast.<\/p>\n<p>\u00abKeitaro is first and foremost a self-hosted advertising performance tracker designed to conditionally route visitors using flows,\u00bb the companies <a href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/patterns-pirates-and-provider-action-what-we-learned-working-with-keitaro\/\">said<\/a>. \u00abThreat actors repurpose this mechanism, transforming a Keitaro server into an all-in-one tool that acts as a traffic distribution system, tracker, and cloaking layer.\u00bb<\/p>\n<table cellpadding=\"0\" cellspacing=\"0\" class=\"tr-caption-container\" style=\"float: left;\">\n<tbody>\n<tr>\n<td style=\"text-align: center;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEifCyrPBPC8Z0FjnPf2YJXZfJdutqVmyu5WT9462jx4taSmdlFaNCoJODzIXWfdXX_JJVquk5deivoO13Mk83GzNG3GHqufLQ1-qP9nWI3C6CPRkCxupHNn1BkA00IvQqpmEVoMOFa4mjV5iplBJeunX7URHjhaMJdaWtCVrQFKtaHBzF5pB4QlCxlSf_fx\/s1700-e365\/chart.png\" style=\"clear: left; display: block; margin-left: auto; margin-right: auto;  text-align: center;\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEifCyrPBPC8Z0FjnPf2YJXZfJdutqVmyu5WT9462jx4taSmdlFaNCoJODzIXWfdXX_JJVquk5deivoO13Mk83GzNG3GHqufLQ1-qP9nWI3C6CPRkCxupHNn1BkA00IvQqpmEVoMOFa4mjV5iplBJeunX7URHjhaMJdaWtCVrQFKtaHBzF5pB4QlCxlSf_fx\/s1700-e365\/chart.png\" alt=\"\" border=\"0\" data-original-height=\"638\" data-original-width=\"900\"\/><\/a><\/td>\n<\/tr>\n<tr>\n<td class=\"tr-caption\" style=\"text-align: center;\">Distribution of observed spam campaigns utilizing Keitaro<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>In all, more than 120 distinct campaigns have abused Keitaro&#8217;s TDS for link delivery over a four-month period between October 2025 and January 2026. Infoblox noted that its customers recorded about 226,000 DNS queries spanning 13,500 domains associated with Keitaro\u2011related activity during the timeframe. Following responsible disclosure, Keitaro has stepped in to cancel over a dozen accounts linked to these activities.<\/p>\n<p>\u00abBy combining an older but still highly effective investment fraud theme with modern AI technologies, actors have been able to launch large\u2011scale, highly convincing cyber campaigns,\u00bb Infoblox and Confiant said. \u00abApproximately 96% of Keitaro\u2011linked spam traffic promoted cryptocurrency wallet\u2011drainer schemes, primarily via fake airdrop\/giveaway lures centered on AURA, SOL (Solana token), Phantom (wallet), and Jupiter (DEX\/aggregator).\u00bb<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity researchers have disclosed details of a telecommunications fraud campaign that uses fake CAPTCHA verification tricks to dupe unsuspecting users into sending international text messages that incur charges on their&hellip;<\/p>\n","protected":false},"author":1,"featured_media":718,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[693,1413,143,418,150,250,597,1414,1415,595,1416],"class_list":["post-717","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-campaigns","tag-captcha","tag-crypto","tag-drive","tag-fake","tag-fraud","tag-global","tag-irsf","tag-keitaro","tag-scam","tag-sms"],"_links":{"self":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/717","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=717"}],"version-history":[{"count":0,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/717\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/media\/718"}],"wp:attachment":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=717"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=717"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=717"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}