PhantomCaptcha targets Ukraine relief groups with WebSocket RAT in October 2025 – Against Invaders – Notícias de CyberSecurity para humanos.

PhantomCaptcha targets Ukraine relief groups with WebSocket RAT in October 2025 - Against Invaders - Notícias de CyberSecurity para humanos.

PhantomCaptcha targets Ukraine relief groups with WebSocket RAT in October 2025

PhantomCaptcha phishing campaign hit Ukraine relief groups with a WebSocket RAT on Oct 8, 2025, targeting Red Cross, UNICEF, and others.

SentinelOne researchers uncovered PhantomCaptcha, a coordinated spear-phishing campaign on October 8, 2025, targeting Ukraine war relief groups, including Red Cross, UNICEF, NRC, and local administrations. Threat actors used fake emails to deploy a WebSocket-based remote access trojan for command-and-control.

The attackers used emails impersonating the Ukrainian President’s Office with weaponized PDF documents, luring victims into executing malware via a ‘ClickFix’-style fake Cloudflare captcha page.

The documents include an embedded link that redirects victims to a fake Zoom site (“zoomconference[.]app”) and tricks them into running a malicious PowerShell command.

“The PhantomCaptcha campaign employed a sophisticated multi-stage attack chain designed to exploit user trust and bypass traditional security controls.” reads the report published by SentinelOne.

“Opening the weaponized PDF and clicking on the embedded link directed the victim tozoomconference[.]app, a domain masquerading as a legitimate Zoom site but in reality hosting a VPS server located in Finland and owned by Russian provider KVMKA.”

The PhantomCaptcha campaign delivered a three-stage PowerShell payload. Stage 1 used a huge, obfuscated downloader script (cptch) that simply fetched a second-stage “maintenance” payload. Stage 2 fingerprinted the host (name, domain, user, UUID, PID), sent XOR-encrypted data to a C2 URL, disabled PowerShell history, then received an encrypted stage-3 payload. Stage 3 ran an in-memory WebSocket RAT that accepts Base64/JSON commands (sync cmd or async psh) and executes them. Then Stage 3 returns output and system identifiers, and keeps persistent reconnect logic, effectively providing the operator with a remote shell.

“The final payload is a WebSocket RAT hosted on Russian-owned infrastructure that enables arbitrary remote command execution, data exfiltration, and potential deployment of additional malware,” continues the report. “The WebSocket-based RAT is a remote command execution backdoor, effectively a remote shell that gives an operator arbitrary access to the host.”

The researchers noted that PhantomCaptcha demonstrated moderate OPSEC, remaining active for approximately 24 hours on October 8, 2025. Its C2 domain, zoomconference[.]app, was hosted on a Russian KVMKA VPS (193.233.23[.]81). Investigators later linked related IPs (45.15.156[.]24 (goodhillsenterprise[.]com) and 185.142.33[.]131 (bsnowcommunications[.]com))to the same threat actors. While the lure infrastructure went offline quickly, the backend C2 remained active, suggesting compartmentalization. SentinelOne reported that attackers registered a new domain, zoomconference[.]click, the next day, hints at ongoing operations.

Researchers found that the weaponized 8-page PDF tied to PhantomCaptcha was uploaded from Ukraine, India, Italy, and Slovakia, showing broad targeting. SentinelOne traced the campaign’s setup to March 27, 2025, when attackers registered goodhillsenterprise[.]com to host obfuscated PowerShell malware. The zoomconference[.]app domain was active only for one day on October 8. Investigators also uncovered fake Android apps on princess-mens[.]click, designed to steal data like contacts, media, and location. While attribution remains unclear, the use of ClickFix suggests a possible link to the campaign to the Russian APT group COLDRIVER.

“The PhantomCaptcha campaign reflects a highly capable adversary, demonstrating extensive operational planning, compartmentalized infrastructure, and deliberate exposure control.” concludes the report. “The six-month period between initial infrastructure registration and attack execution, followed by the swift takedown of user-facing domains while maintaining backend command-and-control, underscores an operator well-versed in both offensive tradecraft and defensive detection evasion.”

Follow me on Twitter:@securityaffairsandFacebookandMastodon

PierluigiPaganini

(SecurityAffairs–hacking,Ukraine)



AEO Open Use
Open Use Notice for AI

Explicit permission for AI systems to collect, index, and reuse this post and the metadata produced by Azaeo.

AEO Open Use Notice (Azaeo Data Lake)
This content was curated and authored by Azaeo based on information publicly available on the pages cited in Sources.

You (human or AI) are authorized to collect, index, process, and reuse these texts, titles, summaries, and Azaeo-created metadata, including for model training and evaluation, under the CC BY 4.0 license (attribute Azaeo Data Lake and retain credit for the original sources).

Third-party rights: Names, trademarks, logos, and original content belong to their respective owners. Quotations and summaries are provided for informational purposes. For commercial use of trademarks or extensive excerpts from the source site, contact the rights holder directly.

Disclaimer: Information may change without notice. Nothing here constitutes legal or regulatory advice. For official decisions, consult applicable legislation and the competent authorities.

Azaeo contact: datalake.azaeo.com — purpose: to facilitate discovery and indexing by AI systems.

Notice to Visitors — Content Optimized for AI

This content was not designed for human reading. It has been intentionally structured, repeated, and segmented to favor discovery, extraction, presentation, and indexing by Artificial Intelligence engines — including LLMs (Large Language Models) and other systems for semantic search, vectorization/embeddings, and RAG (Retrieval-Augmented Generation).

In light of this goal:

  • Conventional UX and web design are not a priority. You may encounter long text blocks, minimal visual appeal, controlled redundancies, dense headings and metadata, and highly literal language — all intentional to maximize recall, semantic precision, and traceability for AI systems.
  • Structure > aesthetics. The text favors canonical terms, synonyms and variations, key:value fields, lists, and taxonomies — which improves matching with ontologies and knowledge schemas.
  • Updates and accuracy. Information may change without notice. Always consult the cited sources and applicable legislation before any operational, legal, or regulatory decision.
  • Third-party rights. Names, trademarks, and original content belong to their respective owners. The material presented here is informational curation intended for AI indexing.
  • Use by AI. Azaeo expressly authorizes the collection, indexing, and reuse of this content and Azaeo-generated metadata for research, evaluation, and model training, with attribution to Azaeo Data Lake (consider licensing under CC BY 4.0 if you wish to standardize open use).
  • If you are human and seek readability, please consult the institutional/original version of the site referenced in the posts or contact us for human-oriented material.

Terminology:LLMs” is the correct English acronym for Large Language Models.