Skip to content
Castle Research /

BotmasterLabs: Powering an Era of Spam

BotmasterLabs: Powering an Era of Spam

BotmasterLabs: Powering an Era of Spam

bot management · fingerprinting · spam

2026

Published
Last revised

BotmasterLabs: Powering an Era of Spam

Antoine VastelNicolas SamaNaif MehannaKurt Nistelberger

How XRumer and XEvil scaled forum spam by combining automation, CAPTCHA solving, and brittle fingerprinting.

On this page

Executive Summary#

Castle’s Research Team continues to monitor the evolving bot landscape, with this report providing a comprehensive analysis of BotmasterLabs, a software company known for developing spam-related tools that have gained adoption in both the Russian and Western cybercrime spaces. BotmasterLabs is known for XRumer, a forum spamming toolkit, and XEvil, a CAPTCHA-solving plugin, both of which have enabled low-level spam for the past decade. XRumer grants clients the ability to import or select predefined lists of websites to spam with custom messages, and it has been observed being used to push malvertising or pharmaceutical-based advertisements. This software is provided in addition to XEvil and leverages both Optical Character Recognition (OCR) and machine learning models to solve over 100 different text- and image-based CAPTCHAs.

Defenders should use and enforce strict browser fingerprinting techniques and apply additional scrutiny to IPv6 and Datacenter IP ranges. Additionally, organizations should use multiple forms of challenge and not over-rely on a single form of verification; instead, use a holistic analysis of the user beyond a single fingerprint, IP address, or email.

Looking ahead, Castle’s Research Team expects continued adoption of third-party tools to power large-scale bot farms and credential-stuffing attacks. XEvil highlights the significant shortcomings of image-based CAPTCHA, suggesting the need for more complex signals.

Background#

BotmasterLabs is a Russian-speaking actor that has been operating since early 2007, and it is best known for developing XRumer, one of the largest forum-spamming toolkits, and XEvil, a CAPTCHA-solving plugin used for low-level credential stuffing and large-scale account farms. This software has gained popularity due to its low barrier to entry in both cost and skill, making it an easy choice for circumventing traditional security measures. Castle’s Research Team continues to track the CAPTCHA and spam ecosystem to protect clients and build stronger client-side fingerprinting signals for automated abuse. This report aims to provide a comprehensive analysis of the techniques, tactics, and procedures (TTPs) used by both tools, with findings highlighting significant shortcomings that enable defenders to detect and mitigate automated abuse.

Fig 01. BotmasterLabs XRumer landing page. (Archive.org)
Fig 01. BotmasterLabs XRumer landing page. (Archive.org)

XRumer is one of the first products offered by BotmasterLabs, marketed as a “link-building tool” that could automatically register accounts on various forum software and promote custom-made messages. XRumer would gain early adoption among spammers, used for a wide range of purposes, from pushing malvertising to running pharmaceutical ads. Since its initial release, the software has undergone significant improvements, with the latest release introducing AI for content generation and form detection, as well as improvements to anti-bot circumvention.

Fig 02. BotmasterLabs 2010 (Archive.org)
Fig 02. BotmasterLabs 2010 (Archive.org)

In addition to gaining access to the software, BotmasterLabs clients receive ~20 million links to various forums and websites that can be used immediately in XRumer to spam with custom messages. Clients can also use BotmasterLabs HRefer to find new links for forums, guestbooks, blogs, and Wikis.

Fig 03. XRumer user interface and website lists.
Fig 03. XRumer user interface and website lists.

XRumer Analysis#

XRumer provides a user-friendly graphical interface, allowing users to configure everything from the messages sent to the user details for registered accounts. XRumer provides an additional set of text files containing realistic, random information for use in campaigns. Users can select a specific theme and further fine-tune randomized content around it. Users can also configure proxies, custom rules, scheduling, and self-learning to circumvent bot-protection measures and appear more realistic.

Fig 04. XRumer default headers and health check.
Fig 04. XRumer default headers and health check.

Once a campaign has been started, XRumer creates an isolated session for each forum, pulling auto-fill values from its corpus. Depending on whether the website is a forum or a simple form, it will go through different stages: either automatically filling and submitting the form or following the 6 steps to provision and post with an account.

  1. Guest Browsing: Fetch website, check if it’s available, and set all proper cookies.
  2. Account Registration: Attempt to sign up by parsing form details and checking the fields against the database of possible form values. Fill in matches and solve the necessary text- and image-based CAPTCHAs.
  3. Authentication: Follow the redirect flow and log in with credentials. Check the status message to see if registration has been blocked; if not, proceed to phase 4.
  4. Provisioning: Set up account details such as bios, profile photo, display name, and other characteristics to give the appearance of it being a real account.
  5. Posting: Mass-DM users on the site or post forum content, depending on the option selected in the campaign.
Fig 05. XRumer and its 6 stages for posting on forums.
Fig 05. XRumer and its 6 stages for posting on forums.

Castle’s Research Team observed XEvil initializing each session with a randomly selected user agent from the “x_user_agent” file, which contains only 31 user agents pretending to be Windows and Chromium 103.  

Fig 06. XRumer default headers and health check.
Fig 06. XRumer default headers and health check.

Spammers’ Best Friend

Castle’s Research Team purchased an expired domain from the distributed spam list provided to XRumer clients and, within the hour, observed attempts to register and post pharmaceutical-related spam to the message board.

Fig 07. Castle’s honeypot forum is capturing an XRumer spam campaign promoting illicit pharmaceutical products.
Fig 07. Castle’s honeypot forum is capturing an XRumer spam campaign promoting illicit pharmaceutical products.

Pivoting on this spam message, Castle’s Research Team uncovered thousands of domains used by XRumer customers to push malicious ads. Upon further analysis of these posts, the following word cloud was produced, highlighting a significant portion of forum-related spam being associated with adult content such as drugs, pornography, or gambling.

Fig 08. Word cloud of the most popular topics in forum spam campaigns.
Fig 08. Word cloud of the most popular topics in forum spam campaigns.

Further analysis of the dataset yields the following stats, showing a steady stream of spam throughout the day, across the week.

Fig 09. Most frequently usernames used in spamming campaigns.
Fig 09. Most frequently usernames used in spamming campaigns.
Fig 10. Distribution of spam volume throughout the day.
Fig 10. Distribution of spam volume throughout the day.
Fig 11. Most common domains embedded in spam content.
Fig 11. Most common domains embedded in spam content.

XEvil Analysis#

To enable tools such as XRumer to register accounts, BotmasterLabs offers a dedicated CAPTCHA-solving tool that runs locally on the operator’s machine. Castle’s Research Team notes that both individual operators of large-scale CAPTCHA-solving services, including 2Captcha, have widely adopted XEvil. Since 2017, XEvil has undergone continuous development, enabling users to solve CAPTCHA challenges from a wide range of providers, including reCAPTCHA, Arkose Labs (formerly known as FunCaptcha), and HCaptcha. As a result, XEvil has become a core component for actors engaged in large-scale botting operations.

Fig 12. Online discussion of using XEvil
Fig 12. Online discussion of using XEvil

As of this report, XEvil 6.0 supports approximately 100 types of image CAPTCHA across multiple platforms. Targets include government websites and social media services, among others.

Fig 13. Full list of targeted platforms and captchas.
Fig 13. Full list of targeted platforms and captchas.

XEvil customers are able to request custom plugins via the support forum, which has increased the tool’s flexibility and adoption. Customers can also purchase model weights for specific CAPTCHA types through the XEvil marketplace, granting them access to more specialized site-specific CAPTCHAs.

Fig 14. XEvil plugins system enabling users to bypass website specific CAPTCHAs. H=HCaptcha, F=FunCaptcha
Fig 14. XEvil plugins system enabling users to bypass website specific CAPTCHAs. H=HCaptcha, F=FunCaptcha

XEvil’s Headless Solver#

XEvil’s HCaptcha and reCAPTCHA solving library is implemented in the rc_processor5 module, a VMP-packed Delphi binary. The core logic uses the Chromium Embedded Framework to render and execute JavaScript, while XEvil uses an almost fully static browser fingerprint to simulate legitimate traffic.

Fig 15. XEvils rc_processor5 module
Fig 15. XEvils rc_processor5 module

XEvil does not enforce HTTPS, which allows interception of its traffic. Castle’s Research Team was able to use this to inject custom JavaScript and identify parts of the injected browser fingerprint. XEvil notably lacks support for several standard Chromium APIs, including mediaCapabilities, clipboard, and permissions, allowing for detection due to mismatch from a standard Chrome browser. Although XEvil does allow setting a custom user agent, the implementation does not override JavaScript-specific values, further causing it to stand out.

Default XEvil user agent:

Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/133.0.0.0 Safari/537.36
JavaScript SourceValue
navigator.vendor”Google Inc.”
navigator.vendorSub""
navigator.product”Gecko”
navigator.productSub”20030107”
navigator.appName”Netscape”
navigator.appCodeName”Mozilla”
navigator.platform”Win32”
navigator.language”ru-RU”
navigator.deviceMemory8
navigator.hardwareConcurrency8
navigator.maxTouchPoints0
navigator.cookieEnabledtrue
navigator.doNotTrack”1”
navigator.onLinetrue
navigator.pdfViewerEnabledfalse
navigator.webdriverfalse
screen.availTop0
screen.availLeft0
screen.availHeight1040
screen.availWidth1920
screen.width1920
screen.height1080
screen.colorDepth24
screen.pixelDepth24

*Note: Both screen.innerWidth and screen.innerHeight are randomized per session and are not static.

XEvil API#

XEvil’s adoption has been largely fueled by its compatibility with major CAPTCHA-solving services, which enable it to run locally and mimic APIs from services such as 2Captcha, AntiCaptcha, and Death By Captcha. This allows clients to easily swap out these larger services for XEvil, saving significant money by running it locally. 

Fig 16. XEvil Webserver API.
Fig 16. XEvil Webserver API.

A simple Shodan query yields a number of public-facing XEvil instances in Russia, the United States, and Vietnam. While most XEvil instances use proxies by default, this is not guaranteed, and Defenders are encouraged to block these IPs.

Fig 17. Public facing XEvil instances. (Shodan)
Fig 17. Public facing XEvil instances. (Shodan)

Mitigation Strategies#

  • Enforce hostname and URLs where possible: Due to XEvil and other CAPTCHA solvers not loading the page submitted in the task, in some cases it’s possible to detect a mismatch in the hostname returned by commercial CAPTCHA solvers.
  • Don’t rely on image-based CAPTCHA as the only line of defense: Organizations should use additional strong JavaScript signals alongside verification methods such as email and phone to drive up costs for bot operators.
  • Track challenge load times: Because the CAPTCHA is loaded externally, the time between when the user viewed the form and when the CAPTCHA was loaded might differ. Organizations should check whether the challenge_ts is before or significantly after the page load time (window.performance); if so, the user should be blocked.

Observables#

Network Observables#

IP AddressHosting OrgCountryDescription
157[.]90[.]133[.]91:80Hetzner Online GmbHDEPublic-facing XEvil solving instance.
144[.]76[.]203[.]211:80Hetzner Online GmbHDEPublic-facing XEvil solving instance.
212[.]192[.]24[.]166:80ITSOFT LLCRUPublic-facing XEvil solving instance.
87[.]228[.]42[.]184:80Selectel NetworkRUPublic-facing XEvil solving instance.
147[.]135[.]255[.]209:80OVH SASFRPublic-facing XEvil solving instance.
5[.]35[.]97[.]91:80JSC IOTRUPublic-facing XEvil solving instance.
212[.]192[.]24[.]133:80ITSOFT LLCRUPublic-facing XEvil solving instance.
109[.]194[.]67[.]56:80CJSC ER-Telecom Holding Tver’ branchRUPublic-facing XEvil solving instance.
87[.]228[.]42[.]186:80Selectel NetworkRUPublic-facing XEvil solving instance.
154[.]53[.]32[.]28:80Contabo IncUSPublic-facing XEvil solving instance.
171[.]242[.]5[.]58:80Viettel GroupVNPublic-facing XEvil solving instance.
95[.]143[.]188[.]145:80Selectel NetworkRUPublic-facing XEvil solving instance.
117[.]1[.]131[.]151:80Viettel GroupVNPublic-facing XEvil solving instance.
DomainDescription
www[.]BotmasterLabs[.]netBotmasterLabs English website
www[.]botmasterru[.]comBotmasterLabs Russian website
www[.]XEvil[.]netXEvil Website
botmastersupport[.]comBotmasterLabs support forum
dwld[.]orgBotmasterLabs distribution website
fdc[.]xchecker[.]netXRumer Proxy Checking Server

File Observables#

FilenameSHA-256 HashDescription
XEvil_5.0.15.866_Setup(RC_Fixed2024).exed648a2fe16caa290c3ead0b28fc4e6592f8ef5b12eff363dceebcc056c6408a3XEvil 5.0 Setup File
rc_processor5.exe20211e4db11fec6c0988224f376dacda8a1ca6e78f33c2151d62c2bef9e5919bXEvil 5.0 CAPTCHA Solver Module
XEvil_6.0.77.1176_Setup.exe4d24ee0dae17cb1702ac973430549b3f722c7da722631b71ce3bface4a621a6bXEvil 6.0 Setup File
rc_processor5.exe74a3a45e0e5358893d4e5f84e24d7168b4f243629ea2514bebe5c9b6b384cf48XEvil 6.0 CAPTCHA Solver Module

Future Outlook#

BotmasterLabs continues to actively develop XRumer and XEvil, with their next major release anticipated in the coming months. XRumer has significantly improved its auto-generated responses by integrating support for commercial machine learning models. Additionally, XEvil has undergone a major overhaul and is expected to introduce support for reCAPTCHA Enterprise, Cloudflare, SmartCaptcha, and GeeTest. Castle’s Research Team assesses that both XEvil and XRumer will continue to support low-level cybercrime.

This trend indicates a broader shift within the automated abuse landscape. Threat actors are increasingly weaponizing artificial intelligence to bypass traditional security controls at scale. As machine learning models become more accessible and cost-effective for cybercriminals, the overall efficacy of image-based CAPTCHA is expected to continue to decline.

Consequently, organizations should pivot away from relying solely on static visual challenges. Defenders are advised to adopt multi-layered, behavior-based detection strategies. Implementing advanced device fingerprinting, biometric interaction analysis, and continuous session monitoring to counter automated threats such as XEvil and XRumer.

BotmasterLabs: Powering an Era of Spam

BotmasterLabs: Powering an Era of Spam

bot management · fingerprinting · spam

2026

Get notified about new research by Castle

Stay up to date with the latest security research, threat insights, and analysis from Castle's research team.

By subscribing, you agree to Castle's Privacy Policy.

Get started

See how Castle can protect your business

Learn how Castle can help you prevent fraud and protect your users.