{"id":14836,"date":"2025-09-22T12:43:41","date_gmt":"2025-09-22T12:43:41","guid":{"rendered":"https:\/\/newestek.com\/?p=14836"},"modified":"2025-09-22T12:43:41","modified_gmt":"2025-09-22T12:43:41","slug":"ai-powered-phishing-scams-now-use-fake-captcha-pages-to-evade-detection","status":"publish","type":"post","link":"https:\/\/newestek.com\/?p=14836","title":{"rendered":"AI-powered phishing scams now use fake captcha pages to evade detection"},"content":{"rendered":"<div>\n<div id=\"remove_no_follow\">\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<section class=\"wp-block-bigbite-multi-title\">\n<div class=\"container\"><\/div>\n<\/section>\n<p>In an attempt to evade security tools, cybercriminals are now leveraging AI to craft sophisticated phishing campaigns using fake captcha pages. The pages appear legitimate to users, effectively bypassing security filters and capturing sensitive information.<\/p>\n<p>Identified by Trend Micro, these AI-generated <a href=\"https:\/\/www.csoonline.com\/article\/3829416\/fake-captcha-attacks-are-increasing-say-experts.html?utm=hybrid_search\" target=\"_blank\">captcha<\/a> pages are designed to mimic the appearance and functionality of genuine verification systems. The fake captcha pages have been hosted on such platforms since January, and there has been a renewed spike in these types of phishing campaigns in August.<\/p>\n<h2 class=\"wp-block-heading\" id=\"minimal-coding-maximum-impact\">Minimal coding, maximum impact<\/h2>\n<p>Platforms such as Lovable, Netlify, and Vercel that are designed to simplify development and lower barriers to entry to build and host applications are now being exploited by attackers.<\/p>\n<p>\u201cOn Lovable, attackers can use <a href=\"https:\/\/www.infoworld.com\/article\/3960574\/vibe-code-or-retire.html?_conv_v=vi:1*sc:9*cs:1758538893*fs:1757918145*pv:44*exp:%7B%7D*seg:%7B%7D*ps:1758515828&amp;_conv_s=sh:1758538893448-0.27943612606771295*si:9*pv:4&amp;_conv_sptest=null\" target=\"_blank\">vibe coding<\/a> to generate a fake captcha or phishing page, while Netlify and Vercel make it simple to integrate AI coding assistants in the CI\/CD pipeline to churn out fake captcha pages,\u201d <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/25\/i\/ai-development-platforms-enable-fake-captcha-pages.html\" target=\"_blank\" rel=\"noreferrer noopener\">said<\/a> Trend Micro.<\/p>\n<p>Other than ease of deployment requiring minimal technical skills, free hosting lowers the cost of launching phishing operations. Also, with domains ending *.vercel.app or *.netlify.app, attackers also inherit credibility from the platform\u2019s reputation, which the attackers can leverage.<\/p>\n<p>\u201cUnlike traditional phishing pages, the AI-generated ones are a step up in speed and scale rather than using some new technical trick,\u201d said <a href=\"https:\/\/www.primuspartners.in\/team\/devroop-dhar\">Devroop Dhar<\/a>, MD and co-founder at Primus Partners. \u201cThey can iterate and create brand-looking pages very quickly. Phishing sites used to take time to create, but now can be generated and cloned across many domains in minutes. That increases the volume of attacks and the chance that an employee will see a convincing fake.\u201d<\/p>\n<p>Dhar added that it also drops the skill lever way down as attackers grab a template, tweak a few things, and are suddenly able to create a phishing kit that looks professional.<\/p>\n<p>Trend Micro has identified 52 malicious sites on Vercel.app, compared with 43 on Lovable.app and 3 on Netlify.app. Lovable has been the primary target for such abuse, but Vercel is currently hosting even more fake CAPTCHA pages.<\/p>\n<h2 class=\"wp-block-heading\" id=\"the-attack-playbook\">The attack playbook<\/h2>\n<p>The phishing campaigns follow a familiar playbook at the outset. Victims typically receive spam emails that carry urgent, action-oriented messages such as \u201cPassword Reset Required\u201d or \u201cUSPS Change of Address Notification\u201d.<\/p>\n<p>Clicking on the embedded link doesn\u2019t take the user directly to a credential-stealing site but instead loads what appears to be a harmless captcha verification page. This actively engages the victim, making them feel they are completing a legitimate security check, which lowers their suspicion and makes it less likely they will recognize the page as fraudulent.<\/p>\n<p>Secondly, the automated scanners crawling the page encounter only a captcha, not the underlying credential-harvesting form, reducing the likelihood of the scam being flagged, noted Trend Micro.<\/p>\n<p>Once the captcha is completed, the victim is redirected to the actual phishing page, where their credentials and other sensitive data can be stolen, such as Microsoft 365 credentials.<\/p>\n<h2 class=\"wp-block-heading\" id=\"strengthening-defenses\">Strengthening defenses<\/h2>\n<p>Enterprises are rethinking defenses as AI-driven phishing campaigns push past legacy filters. Passkeys and phishing-resistant MFA are gaining traction, particularly in financial services and tech. But to combat the growing threat of AI-driven phishing attacks, organizations must adopt a multi-layered security approach.<\/p>\n<p>\u201cThe most effective strategies now blend behavioural detection with platform accountability. Tools must be able to simulate clicks and follow redirects, and hosting providers must build safeguards that prevent abuse,\u201d said <a href=\"https:\/\/greyhoundresearch.com\/svg\/\" target=\"_blank\" rel=\"noreferrer noopener\">Sanchit Vir Gogia<\/a>, CEO and chief analyst at Greyhound Research.<\/p>\n<p>Yet detection alone is not enough. The ultimate resilience lies in reducing the value of stolen credentials altogether through phishing-resistant authentication. Gogia added that organizations must modernise training from checkbox exercises to realistic immersion. That includes phishing simulations with CAPTCHA fronts, policies that block newly registered domains, and strict governance of identity logins. The goal is not to prevent every click, but to shorten the time from incident to containment.<\/p>\n<p>\u201cYou need to be aware if the page suddenly redirects to a login form or starts pulling data from untrustworthy domains. Those patterns are harder to hide for attackers. One should also keep an eye on outbound traffic. Stolen data leaving the network is often the first sign,\u201d added Dhar.<\/p>\n<p>User awareness remains the frontline. Training employees to spot suspicious CAPTCHA challenges, verify URLs before interacting, rely on <a href=\"https:\/\/www.csoonline.com\/article\/3825453\/password-managers-under-increasing-threat-as-infostealers-triple-and-adapt.html?utm=hybrid_search\">password managers<\/a> that won\u2019t autofill on fake pages, and promptly report anomalies remains critical.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>In an attempt to evade security tools, cybercriminals are now leveraging AI to craft sophisticated phishing campaigns using fake captcha pages. The pages appear legitimate to users, effectively bypassing security filters and capturing sensitive information. Identified by Trend Micro, these AI-generated captcha pages are designed to mimic the appearance and functionality of genuine verification systems. The fake captcha pages have been hosted on such platforms&#8230; <\/p>\n<p class=\"more\"><a class=\"more-link\" href=\"https:\/\/newestek.com\/?p=14836\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-14836","post","type-post","status-publish","format-standard","hentry","category-uncategorized","is-cat-link-borders-light is-cat-link-rounded"],"_links":{"self":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/14836","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=14836"}],"version-history":[{"count":0,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/14836\/revisions"}],"wp:attachment":[{"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=14836"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=14836"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=14836"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}