A sophisticated spearphishing campaign has emerged targeting humanitarian organizations and Ukrainian government agencies, leveraging weaponized PDF attachments and fake Cloudflare verification pages to distribute a dangerous WebSocket-based remote access trojan.
The operation, first uncovered in early October 2025, demonstrates a remarkable level of operational planning and infrastructure compartmentalization, with the threat actors maintaining their campaign for six months before executing their strike.
The campaign specifically targeted members of the International Red Cross, Norwegian Refugee Council, UNICEF, and regional government administrations across Ukraine, using emails impersonating the Ukrainian President’s Office.
When recipients opened the malicious PDF and clicked the embedded link, they were directed to a convincing fake Cloudflare DDoS protection gateway that appeared to be a legitimate security verification page.
.webp)
The attackers had registered the domain zoomconference.app to mimic a legitimate Zoom conference service, hosting the malicious infrastructure on Russian-owned VPS servers in Finland.
The sophistication of this operation extends beyond its initial deception tactics. SentinelLABS researchers identified that the attackers maintained their infrastructure for only 24 hours before shutting down the public-facing domains while preserving their backend command-and-control servers, demonstrating professional-grade operational security.
The campaign infrastructure timeline revealed the attackers began operations in March 2025, with SSL certificates issued in September, suggesting meticulous preparation before the October strike.
The ClickFix Infection Mechanism and Multi-Stage Payload Delivery
The core of PhantomCaptcha’s effectiveness lies in its implementation of the ClickFix social engineering technique, a method increasingly adopted by threat actors since mid-2024.
After the fake Cloudflare page loads, victims encounter a simulated reCAPTCHA interface with an “I’m not a robot” checkbox.
Clicking this checkbox triggers a popup containing instructions written in Ukrainian, directing users to copy a token and paste it into the Windows Run dialog using the keyboard shortcut Windows+R.
This seemingly innocuous action executes malicious PowerShell code that initiates the infection chain.
.webp)
The underlying mechanism relies on a JavaScript function named copyToken() that downloads and executes a PowerShell script.
The attackers distributed three stages of payloads, beginning with a heavily obfuscated 500KB PowerShell downloader that obscured simple download functionality through massive code obfuscation techniques.
The second stage performed comprehensive system reconnaissance, collecting computer names, domain information, usernames, process IDs, and hardware identifiers through system UUID retrieval, encrypting this data using a hardcoded XOR key before transmission.
The final payload delivered a WebSocket-based remote access trojan capable of receiving arbitrary commands encoded in Base64-formatted JSON messages.
This lightweight backdoor connected to remote servers and executed commands using PowerShell’s Invoke-Expression cmdlet, granting attackers complete remote command execution capabilities and data exfiltration access.
The malware disabled PowerShell command history logging to prevent forensic analysis, representing a deliberate effort to cover operational tracks while maintaining persistent access to compromised systems.
Follow us on Google News, LinkedIn, and X to Get More Instant Updates, Set CSN as a Preferred Source in Google.
The post New PhantomCaptcha RAT Weaponized PDFs to Deliver Malware Using ‘ClickFix’-Style Cloudflare Captcha Pages appeared first on Cyber Security News.



.webp)
.webp)