Monday, April 28, 2025
HomeSecurity NewsunCaptcha to Break reCaptcha System of Defense in 5.42 Seconds

unCaptcha to Break reCaptcha System of Defense in 5.42 Seconds

Published on

SIEM as a Service

Follow Us on Google News

Captcha challenge is the first line of defense to protect the website against attacks, it challenges to prove that you are the human user.

Google’s ReCaptcha was introduced in 2014 and it is used by the significant number of users and it relies on advanced risk analysis engine and it offers audio and image captcha, here security researchers took audio captcha to attack.

Security researchers from UM present unCaptcha, a low-resource, fully automated attack on Google’s 2017 reCaptcha audio captcha with a high success rate.

We have evaluated unCaptcha using over 450 reCaptcha challenges from live websites, and showed that it can solve them with 85.15% accuracy in 5.42 seconds, on average: less time than it takes to even play the audio challenge! Researchers said.
- Advertisement - Google News

To attack captcha one should have huge resources but anyway the success rate is very less.Here they provided a low resource attack with a high success rate.

Also Read Beware: Mass Ransomware Cyber Attack with “Bad Rabbit” Ransomware Hitting Many Government & Private organization

How unCaptcha works – Captcha

It is completely automated, they obtain audio samples and separated into segments for sound bites analysis and uploads to online speech recognization services like (IBM, Google Cloud, Google Speech Recognition, Sphinx, Wit-AI, Bing Speech Recognition).

captcha

And once the results are collected then it presents captcha solution.It is capable of locating “I’m not a robot” checkbox and clicks on it.Researchers also published the code of unCaptcha publically in Github.

Last February Researcher Discover “A logic vulnerability” dubbed ReBreakCaptcha that allows attackers to automate the process of bypassing reCAPTCHA fields. They published the source code in Github.

For mitigations they suggested in broadening the vocabulary of sound bites beyond just digits, adding background noise which makes the segmentation more difficult.

You can get full research paper titled unCaptcha: A Low-Resource Defeat of reCaptcha’s Audio Challenge available to download here.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Windows 11 25H2 Expected to Launch with Minor Changes

Microsoft is quietly preparing the next update to its flagship operating system, Windows 11 25H2,...

China Claims U.S. Cyberattack Targeted Leading Encryption Company

China has accused U.S. intelligence agencies of carrying out a sophisticated cyberattack against one...

Critical FastCGI Library Flaw Exposes Embedded Devices to Code Execution

A severe vulnerability (CVE-2025-23016) in the FastCGI library-a core component of lightweight web server...

Viasat Modems Zero-Day Vulnerabilities Let Attackers Execute Remote Code

A severe zero-day vulnerability has been uncovered in multiple Viasat satellite modem models, including...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

FBI Alerts Public to Scammers Posing as IC3 Officials in Fraud Scheme

The Federal Bureau of Investigation (FBI) has issued a warning regarding an emerging scam...

New ‘Waiting Thread Hijacking’ Malware Technique Evades Modern Security Measures

Security researchers have unveiled a new malware process injection technique dubbed "Waiting Thread Hijacking"...

EU’s GDPR Article 7 Poses New Challenges for Businesses To Secure AI-Generated Image Data

As businesses worldwide embrace digital transformation, the European Union’s General Data Protection Regulation (GDPR),...