Fake CAPTCHA campaign uses SMS pumping fraud to run up mobile bills


A fake CAPTCHA campaign is tricking mobile users into sending international SMS messages that can add unexpected charges to their phone bills.

The scam does not install malware or take full control of the phone. Instead, it uses social engineering, web redirects, and telecom billing rules to turn a routine “prove you are human” step into revenue for fraud operators.

Researchers say one completed flow can trigger up to 60 international SMS messages across 15 numbers, with possible charges of about $30 on a standard consumer plan.

How the fake CAPTCHA scam works

The attack starts when users land on a fake CAPTCHA page after clicking through malvertising, traffic distribution systems, or typosquatted telecom-looking domains.

The page looks like a normal verification step. It may show image-selection prompts or simple quiz-style screens that users already associate with legitimate CAPTCHA checks.

When the user taps the continue button, the phone’s SMS app opens with a message and recipient list already filled in. The user still has to send the message, but the page makes the action look like part of the verification process.

At a glance

CategoryDetails
Threat typeFake CAPTCHA and SMS pumping fraud
Fraud modelInternational Revenue Share Fraud
Main targetMobile users browsing the web
Delivery pathMalvertising, TDS redirects, and typosquatted domains
Observed scale35 phone numbers across 17 countries
Possible SMS volumeUp to 60 messages after four fake CAPTCHA steps
Possible costAbout $30 per victim on a typical consumer plan
Malware requiredNo

Why victims may not notice right away

The scam works partly because international SMS charges may not appear immediately. A victim may forget about the fake CAPTCHA by the time the bill arrives weeks later.

The charge may also look small enough to miss during a quick bill review. That helps the operation stay quiet, especially when many victims each lose a relatively small amount.

For the attackers, the money comes from scale. A few dollars from one phone bill may not seem large, but thousands of completed CAPTCHA flows can create meaningful revenue.

What International Revenue Share Fraud means

International Revenue Share Fraud, also called IRSF, abuses the way telecom operators pay fees to complete international calls or messages.

Fraudsters lease or control phone numbers in destinations with higher termination fees. When victims send messages to those numbers, telecom billing systems generate fees, and part of that money can flow back through revenue-sharing arrangements.

In this campaign, fake CAPTCHA pages create artificial SMS traffic to those numbers. The victim pays the charge, while the fraud operator profits from the inflated message volume.

How users reach the fake CAPTCHA pages

  • A user visits a typo-style domain that resembles a telecom brand or another familiar service.
  • The site redirects the user through a Traffic Distribution System.
  • The redirect chain sends suitable users to a fake CAPTCHA page.
  • The page asks the user to confirm they are human by sending an SMS.
  • The SMS app opens with the message and recipients already filled in.
  • The user sends messages across multiple fake CAPTCHA steps.
  • International SMS charges appear later on the phone bill.

Back-button hijacking keeps users trapped

The campaign also uses back-button hijacking to keep users inside the fake verification flow.

This technique manipulates the browser history so pressing the back button does not return the user to the previous page. Instead, the browser reloads the scam page or redirects the user back into the same flow.

That extra pressure increases the chance that a user will finish the fake CAPTCHA process rather than simply leaving.

Why this is different from normal ClickFix attacks

Many recent fake CAPTCHA attacks use ClickFix tactics to trick users into copying and running commands that install malware or steal data.

This campaign follows the same social engineering pattern, but the goal is different. It does not need the victim to install an app or run code.

The attacker only needs the victim to send prefilled SMS messages. That makes the scam easier to run across mobile browsers and harder for traditional anti-malware tools to catch.

Warning signs to watch for

Warning signWhy it matters
A CAPTCHA opens your SMS appLegitimate CAPTCHA checks should not ask you to send text messages.
Prefilled international numbersThis can indicate SMS pumping or premium-rate fraud.
The back button does not workThe page may be using browser history manipulation to trap you.
The domain looks slightly wrongTyposquatted domains often imitate real brands to gain trust.
The page repeats verification stepsMultiple steps can generate multiple SMS charges.

Domains linked to the campaign

Security researchers listed several domains connected to the redirect chain and fake CAPTCHA activity. Users and security teams should treat these as suspicious and block them where appropriate.

  • sweeffg[.]online
  • colnsdital[.]com
  • zawsterris[.]com
  • megaplaylive[.]com
  • ruelomamuy[.]com

How users can protect themselves

Users should never send an SMS to prove they are human online. A legitimate CAPTCHA runs inside the browser and does not need access to the SMS app or phone dialer.

Mobile users should also review phone bills for unfamiliar international SMS charges. Small charges can matter, especially if they repeat across billing cycles.

If suspicious SMS charges appear, users should contact their carrier, dispute the charges, and ask about blocking international or premium SMS if they do not need those services.

What telecoms and organizations should do

  • Monitor for unusual international SMS traffic spikes.
  • Flag repeated messages to high-risk destination ranges.
  • Review traffic linked to known fake CAPTCHA domains.
  • Block malicious TDS and fake CAPTCHA infrastructure at DNS or web-filtering layers.
  • Educate users that CAPTCHA checks should not open messaging apps.
  • Offer customers easy controls to disable premium and international SMS.
  • Investigate repeated billing disputes tied to similar destination countries or number ranges.

Why this campaign matters

The campaign shows how scammers can turn familiar web habits into billing fraud. Users trust CAPTCHA prompts because they see them every day, and attackers use that trust to push them into a paid telecom action.

It also shows that fraud does not always need malware. A web page, a redirect chain, and a clever billing abuse model can cause financial loss without compromising the phone itself.

For users, the safest rule is simple: if a human verification page asks you to send a text message, close the page.

FAQ

What is SMS pumping fraud?

SMS pumping fraud is a scheme where attackers generate large volumes of SMS traffic to specific phone numbers so they can profit from telecom revenue-sharing fees.

Does this fake CAPTCHA campaign install malware?

No. The reported campaign does not need to install malware. It tricks users into sending prefilled international SMS messages from their own phones.

How much can this scam cost a victim?

Researchers observed flows that could generate up to 60 international SMS messages and cost about $30 on a typical consumer plan.

Can this happen on Android and iPhone?

Yes. The scam abuses browser-to-SMS behavior that can open the phone’s messaging app with prefilled content on mobile devices.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages