Cybercriminals Exploit CAPTCHA Pages To Drive SMS Charges

Cybercriminals Exploit CAPTCHA Pages To Drive SMS Charges
A newly detailed scam is abusing fake CAPTCHA pages to trick people into sending international text messages that quietly add charges to their mobile bills.

Researchers at Infoblox say the campaign blends social engineering, telecom fraud, and traffic distribution systems to profit from each SMS a victim sends.

Fake CAPTCHA pages are already familiar in malware and phishing campaigns. However, this operation uses them for a different purpose to make victims send premium international SMS messages under the false claim that texting is required to prove they are human.

Infoblox said the scheme has been active since at least June 2020 and that the actors built the process to look routine and harmless.

How the Scam Works

According to Infoblox, the victim lands on a fake CAPTCHA page after being routed through a traffic distribution system (TDS), often via a deceptive or lookalike website.

The TDS helps the operators target users, rotate infrastructure, and hide the final scam pages from defenders and automated analysis systems.

CAPTCHA Pages Drive SMS (Source: infoblox)
CAPTCHA Pages Drive SMS (Source: infoblox)

Once on the page, the user is shown several simple CAPTCHA-style prompts, such as basic image or text questions.

However, each step is designed to trigger the phone’s SMS app with a prefilled message and a list of international numbers. Infoblox said the victim was not asked to solve a difficult test; the real purpose was to generate as many billable messages as possible.

CAPTCHA Pages Drive SMS (Source: infoblox)
CAPTCHA Pages Drive SMS (Source: infoblox)

The researchers observed one case in which each step included more than a dozen destination numbers, and the full process produced 60 SMS messages.

In that test, the charges could reach about $30, and the cost often appeared on the phone bill weeks later, long after the user had forgotten the CAPTCHA page.

CAPTCHA Pages Drive SMS (Source: infoblox)
CAPTCHA Pages Drive SMS (Source: infoblox)

This campaign stands out because it combines telecom fraud with the same ad-tech and redirect infrastructure often used in malware delivery, scareware, and other web-based scams.

Infoblox said the TDS layer acts as both a traffic broker and a shield, allowing operators to scale fraud while making malicious landing pages harder to detect.

The scam also uses back-button hijacking to prevent victims from leaving the page. Infoblox found JavaScript that manipulates browser history so pressing the back button either reloads the same fake CAPTCHA or sends the user to another scam page, trapping them in a loop.

That tactic has drawn broader attention beyond security research. Google announced a new spam policy in April 2026 targeting back button hijacking and said enforcement will begin on June 15, 2026, calling the behavior a malicious practice that interferes with normal navigation.

Follow us on Google News , LinkedIn and X to Get More Instant UpdatesSet Cyberpress as a Preferred Source in Google.

The post Cybercriminals Exploit CAPTCHA Pages To Drive SMS Charges appeared first on Cyber Security News.


Discover more from RSS Feeds Cloud

Subscribe to get the latest posts sent to your email.

Leave a Reply

Your email address will not be published. Required fields are marked *

Discover more from RSS Feeds Cloud

Subscribe now to keep reading and get access to the full archive.

Continue reading