• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

SonicWall warns customers to reset credentials after MySonicWall backups were exposed

 | 

CVE-2025-10585 is the sixth actively exploited Chrome zero-day patched by Google in 2025

 | 

Jaguar Land Rover will extend its production halt into a third week following a cyberattack

 | 

China-linked APT41 targets government, think tanks, and academics tied to US-China trade and policy

 | 

Microsoft and Cloudflare teamed up to dismantle the RaccoonO365 phishing service

 | 

DoJ resentenced former BreachForums admin to three years in prison

 | 

Apple backports fix for actively exploited CVE-2025-43300

 | 

New supply chain attack hits npm registry, compromising 40+ packages

 | 

Cybercrime group accessed Google Law Enforcement Request System (LERS)

 | 

China-linked Mustang Panda deploys advanced SnakeDisk USB worm

 | 

Insider breach at FinWise Bank exposes data of 689,000 AFF customers

 | 

Hackers steal millions of Gucci, Balenciaga, and Alexander McQueen customer records

 | 

Fairmont Federal Credit Union 2023 data breach impacted 187K people

 | 

UK ICO finds students behind majority of school data breaches

 | 

INC ransom group claimed the breach of Panama’s Ministry of Economy and Finance

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 62

 | 

Security Affairs newsletter Round 541 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

ShinyHunters Attack National Credit Information Center of Vietnam

 | 

FBI warns of Salesforce attacks by UNC6040 and UNC6395 groups

 | 

HybridPetya ransomware bypasses UEFI Secure Boot echoing Petya/NotPetya

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Breaking News
  • Hacking
  • New unCaptcha automated system bypasses Google reCAPTCHA once again

New unCaptcha automated system bypasses Google reCAPTCHA once again

Pierluigi Paganini January 03, 2019

The unCaptcha automated system can once again bypass Google’s reCAPTCHA challenges, despite major updates to the security service.

It has happened again, the unCaptcha automated system is able to bypass the Google reCAPTCHA mechanism even if it was improved over the years.

The unCaptcha system was created in 2017 to bypass the reCAPTCHA mechanism used to protect websites from abuses. 

unCaptcha

After unCaptcha was presented by researchers from the University of Maryland (UM), Google improved its security to bypass Google reCAPTCHA

Now unCaptcha has been modified and it is able to bypass Google reCAPTCHA again.

The unCaptcha is able to bypass the audio challenges presented by reCAPTCHA, it could be also used to bypass other security systems such as BotDetect, Yahoo, and PayPal image challenges.

The system receives the audio challenge, downloads it, and submits it to Speech To Text. The unCAPTCHA parses the response and types the answer, then it clicks submit and checks if the response to the challenge was correct.

Google experts introduced a couple features to improve reCAPTCHA, they enhanced the browser automation detection and used spoken phrases instead of spoken digits. The unCaptcha system now uses a screen clicker to mimic human movement on a page. 

Since June 2018, unCaptcha was updated to bypass Google’s security service once again.

“Created in April 2017, unCaptcha achieved 85% accuracy defeating Google’s ReCaptcha. After the release of this work,”  explained the experts.

“Google released an update to ReCaptcha with the following major changes:

  • Better browser automation detection
  • Spoken phrases rather than digits”

The researchers shared their work with the ReCaptcha team that after six months authorized them to release the code.

“The Recaptcha team is aware of this attack vector, and have confirmed they are okay with us releasing this code, despite its current success rate. This attack vector was deemed out of scope for the bug bounty program,” continue the experts. 

“Thanks to the changes to the audio challenge, passing ReCaptcha is easier than ever before. The code now only needs to make a single request to a free, publicly available speech to text API to achieve around 90% accuracy over all captchas,”

Experts pointed out that the new unCaptcha variant won’t be updated when Google improves its service, they also removed their API keys from all the necessary queries.

“unCaptcha2, like the original version, is meant to be a proof of concept. As Google updates its service, this repository will notbe updated. As a result, it is not expected to work in the future, and is likely to break at any time.” concludes the experts.

“Unfortunately, due to Google’s work in browser automation detection, this version of unCaptcha does not use Selenium. As a result, the code has to navigate to specific parts of the screen. To see unCaptcha working for yourself, you will need to change the coordinates for your screen resolution.

While unCaptcha2 is tuned for Google’s Demo site, it can be changed to work for any such site – the logic for defeating ReCaptcha will be the same.

Additionally, we have removed our API keys from all the necessary queries.”

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – reCaptcha, hacking)

[adrotate banner=”5″] [adrotate banner=”13″]


facebook linkedin twitter

Hacking Pierluigi Paganini reCAPTCHA Security Affairs unCaptcha

you might also like

Pierluigi Paganini September 18, 2025
SonicWall warns customers to reset credentials after MySonicWall backups were exposed
Read more
Pierluigi Paganini September 18, 2025
Jaguar Land Rover will extend its production halt into a third week following a cyberattack
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    SonicWall warns customers to reset credentials after MySonicWall backups were exposed

    Data Breach / September 18, 2025

    CVE-2025-10585 is the sixth actively exploited Chrome zero-day patched by Google in 2025

    Uncategorized / September 18, 2025

    Jaguar Land Rover will extend its production halt into a third week following a cyberattack

    Security / September 18, 2025

    China-linked APT41 targets government, think tanks, and academics tied to US-China trade and policy

    APT / September 17, 2025

    Microsoft and Cloudflare teamed up to dismantle the RaccoonO365 phishing service

    Cyber Crime / September 17, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT