Fake CAPTCHA scam turns a quick click into a costly phone bill
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得通读全文,抓住主要信息。 文章讲的是研究人员发现了一种诈骗活动,利用虚假的CAPTCHA页面欺骗移动用户发送大量国际短信。这种诈骗属于IRSF,通过复杂的国际短信定价结构获利。骗子诱导用户点击按钮,打开短信应用并预填多个国际号码,导致高额费用。用户可能面临账单问题,而电信运营商也会受损。 接下来,我需要将这些要点浓缩成简洁的句子。确保涵盖诈骗手段、影响以及防范建议。同时注意不要使用“文章内容总结”等开头。 最后,检查字数是否在100字以内,并确保语言流畅自然。 </think> 研究人员发现一种网络诈骗活动,利用虚假的CAPTCHA页面诱使移动用户发送大量国际短信。该活动通过复杂的国际短信定价结构获利,受害者可能面临高额费用。 2026-4-28 10:46:1 Author: www.malwarebytes.com(查看原文) 阅读量:25 收藏

Researchers have documented a long‑running campaign that uses fake CAPTCHA pages to trick mobile users into sending dozens of international SMS messages in the background.

If you’ve spent any time on today’s web, CAPTCHAs may seem like background noise: click a few traffic lights, prove you’re human, move on. Something scammers have learned to abuse in ClickFix campaigns where they lure victims into infecting their own machines.

Recently, though, researchers found a twist where “prove you’re human” quietly turns into “run up an international phone bill.” The research describes an International Revenue Share Fraud (IRSF) campaign. IRSF, also known as SMS pumping fraud, abuses the complex pricing structures of international calls and SMS traffic to generate revenue by inflating message volume to particular destinations.

Instead of installing malware on the victim’s device, the scam exploits how telecom billing and affiliate networks work, turning ordinary web traffic into premium SMS revenue for cybercriminals.

How it works

A typical flow for the scam looks like this:

  • Victims arrive via malvertising or TDS redirects, often from typosquatted telecom domains, onto a page that looks like a basic image‑selection or quiz CAPTCHA.
  • To “continue,” they’re prompted to tap a button that opens their SMS app with a prefilled message and recipient list.
  • This isn’t one SMS to one number. The fake CAPTCHA runs through multiple steps, and each message is preconfigured with more than a dozen international numbers across 17 countries known for high termination fees, including Azerbaijan, Myanmar, and Egypt.

On a typical consumer plan, that can translate to roughly $30 in international SMS charges per person, with a slice of the termination fees flowing back to the attacker via revenue‑sharing agreements.

To keep you from simply backing out, the pages deploy dedicated back‑button hijacking. JavaScript rewrites browser history and bounces you back to the scam when you try to leave.  The researchers also found the campaign was plugged into a Click2SMS‑style affiliate network that advertises “all kinds of traffic allowed” and carrier billing, effectively packaging IRSF as another monetization option for shady publishers.

This operation defrauds both individuals and telecom carriers. Victims face unexpected premium SMS charges on their bills and may struggle to trace the cause. Carriers pay revenue shares to the perpetrators and may absorb losses from customer disputes or chargebacks.


Mobile protection, anywhere, anytime.


How to protect yourself

Never send an SMS to “prove you’re human.” Legitimate CAPTCHAs run entirely in your browser. They won’t open your SMS or dialer app.

Check your mobile bill regularly for small, unfamiliar international SMS charges, not just big spikes. If you see anything suspicious, dispute it quickly and ask your provider to block international or premium SMS if you don’t need it.

Use a mobile protection app that blocks known malicious sites, like these domains involved in this campaign:

  • sweeffg[.]online
  • colnsdital[.]com
  • zawsterris[.]com
  • megaplaylive[.]com
  • ruelomamuy[.]com
Malwarebytes blocks ruelomamuy[.]com
Malwarebytes blocks ruelomamuy[.]com

Scammers know more about you than you think. 

Malwarebytes Mobile Security protects you from phishing, scam texts, malicious sites, and more. With real-time AI-powered Scam Guard built right in. 

Download for iOS → Download for Android → 

About the author

Was a Microsoft MVP in consumer security for 12 years running. Can speak four languages. Smells of rich mahogany and leather-bound books.


文章来源: https://www.malwarebytes.com/blog/news/2026/04/fake-captcha-scam-turns-a-quick-click-into-a-costly-phone-bill
如有侵权请联系:admin#unsafe.sh