# Massive IRSF Scam Network Uses Fake CAPTCHAs to Steal SMS Credentials, Fueling Crypto and Fraud Operations
A sophisticated international telecommunications fraud campaign leveraging 120 Keitaro landing page instances has been detailed in a new security report, exposing how threat actors are systematically abusing fake CAPTCHA verification prompts to trick users into authorizing costly international SMS messages. The scheme, known as International Revenue Sharing Fraud (IRSF), generates millions in illicit revenue by exploiting mobile billing systems and routing charges through leased phone numbers in high-cost calling regions.
According to research published by Infoblox, the operation represents a significant escalation in telecom fraud tactics, combining social engineering with infrastructure-as-a-service (IaaS) platforms to scale attacks across multiple verticals and geographies simultaneously.
## The Threat: How the Fake CAPTCHA Scam Works
The attack chain begins innocuously. Users visiting compromised or malicious websites encounter what appears to be a legitimate CAPTCHA verification prompt—the security check you've seen thousands of times before. However, instead of authenticating access to a website, these fake CAPTCHAs are designed to trick users into authorizing outbound SMS messages.
When a user "solves" the fake CAPTCHA, they unknowingly trigger their mobile device to send premium-rate SMS text messages to international numbers. Here's what happens next:
The genius of the scheme lies in its invisibility. Unlike credential theft or direct financial fraud, victims may not realize they've been compromised until their monthly mobile bill arrives with inexplicable charges. By then, hundreds or thousands of messages may have been sent.
## Background: IRSF's Evolution and Scope
International Revenue Sharing Fraud is not new, but its sophistication has accelerated significantly. Telecom fraud schemes have existed for decades, but they traditionally required:
Modern IRSF campaigns have democratized these attacks by:
1. Leveraging public IaaS platforms — Keitaro, a legitimate landing page builder used for affiliate marketing, has been weaponized to host 120+ malicious domains
2. Automating the attack chain — scripts automatically detect device types and route users to the most effective exploit variants
3. Combining social engineering with fake UI — visual deception now replaces technical complexity
4. Operating at scale — a single campaign can target millions of users across dozens of countries
The Infoblox research identified 120 distinct Keitaro campaigns actively distributing the fake CAPTCHA payload, indicating a highly distributed, resilient operation.
## Technical Details: The Keitaro Infrastructure
Keitaro is a performance marketing platform designed for legitimate affiliate marketers—it provides landing page builders, traffic analytics, and conversion tracking. However, its flexibility and relative anonymity have made it attractive to fraudsters.
| Aspect | Details |
|--------|---------|
| Primary platform | Keitaro landing page builder |
| Number of campaigns | 120+ active instances |
| Attack vector | Fake CAPTCHA overlay/redirect |
| Payload delivery | Silent SMS trigger (JavaScript) |
| Target geographies | Global, with emphasis on North America and Europe |
| High-cost SMS destinations | Tanzania, Somalia, DRC, Sudan, other high-rate regions |
The technical payload operates as follows:
Key technical signatures identified by Infoblox:
## Scope and Impact
The scale of this operation is substantial. Infoblox estimates:
The operation funds additional fraud activities, including:
## Implications for Users and Organizations
### For Individual Users
Your mobile bill is a target. IRSF disproportionately impacts:
Victims often don't realize they've been compromised for weeks, by which time thousands of messages have been sent and thousands in charges accumulated.
### For Organizations
Enterprises face secondary risks:
## Defense Strategies and Recommendations
For individual users:
For mobile network operators:
For security teams:
## Conclusion
The convergence of IRSF tactics with accessible IaaS platforms represents a mature, profitable fraud ecosystem. The 120 Keitaro campaigns identified by Infoblox are likely just the visible portion of a much larger operation. As telecom operators become more sophisticated, fraud actors will continue to evolve their techniques—shifting focus from technical exploits to social engineering and psychological manipulation.
The best defense remains awareness: understand what you're clicking, monitor your bills, and remember that legitimate services will never ask you to "verify" through a CAPTCHA you didn't explicitly request.