CRIL analyzed an active phishing campaign leveraging HTML-based Telegram bot credential harvesters designed to mimic multiple prominent brands
Cyble Research and Intelligence Labs (CRIL) have uncovered a widespread phishing campaign targeting multiple brands to steal credentials. Attackers distribute HTML attachments through email, successfully bypassing conventional security checks by not using suspicious URLs or hosting on external servers. The embedded HTML files run JavaScript that steals user credentials and sends them directly to attacker-controlled Telegram bots.
The infection chain, outlined in Figure 1, showcases the stages of the attack.

In this campaign, the adversary used an HTML file in the email as an attachment (RFC-compliant filename, such as RFQ_4460-INQUIRY.HTML) or as an archive. The HTML contains embedded JavaScript that accepts credentials on a fake Adobe login UI and posts them to the Telegram Bot API using a bot token and chat ID.
The social lure used is a standard procurement/advice flow: an unsolicited request for quotation (RFQ) or invoice, which asks the recipient to open the attached document and “sign in to view.” (see Figure 2)

The malicious file is a self-contained HTML page. It loads a blurred background invoice image and renders a centered login modal. No external hosting is required for the initial file; the HTML itself is the attachment. (see Figure 3)

An excerpt of the exfiltration activity is shown in Figure 4.

Harvested credentials are transmitted directly to Telegram via the Bot API using hard-coded bot tokens and chat IDs embedded in the JavaScript of multiple samples.
We analysed two representative samples that revealed the technical sophistication:

Both samples share core functionality as shown in Figure 6.

An analysis of the campaign infrastructure uncovers a decentralized network of Telegram bots operated by multiple threat actors.
Multiple active bot tokens were identified and confirmed in the ecosystem, each showcasing distinct, or in some cases, unique operational behavior.
Recent research conducted over the past month has identified many distinct HTML samples in circulation, suggesting broad reuse or automation. The templates and user interface components are consistent, including Adobe-style branding, blurred backgrounds on invoices, and centered elements modals, indicating the use of a toolkit or an automated generator. (see Figure 7)

Based on our threat intelligence analysis, the campaign primarily targets organizations across Central and Eastern Europe, with heavy concentration in the Czech Republic, Slovakia, Hungary, and Germany.
The attackers distribute phishing emails posing as legitimate customers or business partners, requesting quotations or invoice confirmations. This regional focus is evident through targeted recipient domains belonging to local enterprises, distributors, government-linked entities, and hospitality firms that routinely process RFQs and supplier communications.
Identified targeted industries include:
The threat actors employ a sophisticated multi-brand approach tailored to regional preferences and business contexts.
The brands leveraged by this campaign are as follows
Global Brands (see Figure 8)

Logistics/Shipping brands (see Figure 9)

Regional Service brands (see Figure 10)

The campaign is likely designed to mimic common B2B communication in the sectors mentioned above. For Central European targets, the threat actor employs RFQ-style subject lines and procurement terminology. For broader audiences, they emphasize themes like document sharing and shipping notifications.
This dual strategy, which merges regional business email styles with globally recognized brand impersonation, enhances success rates across diverse organizational cultures and security awareness levels.
The modular template system enables quick deployment of new brand variants, suggesting that additional brands not listed could also be in circulation. The presence of German-language Telekom variants and Spanish-language sales department targeting shows the campaign’s ability to tailor branding and language for specific regional markets.
The technical variations between samples indicate ongoing development:
In addition to this, we also identified the following:
Domain Masquerading: References to trusted domains enhance legitimacy
A sophisticated credential-harvesting attack that is also scalable poses a potent threat. This campaign attempts to circumvent traditional security measures by using HTML attachments. Impersonating trusted brands, targeting specific audiences, and using Telegram for data exfiltration pose a low-cost yet high-impact threat to organizations worldwide.
As obfuscation techniques and anti-analysis tactics evolve, SOCs’ measures show ongoing development and improvement. Organizations should prioritize deploying HTML attachment controls and blocking the Telegram API as key components of their security strategy, while also enhancing overall email security to provide long-term protection.
The scale of this operation, with multiple samples of different themes across different industries and multiple active bots, suggests a significant ongoing compromise of business credentials. Security teams should conduct retroactive threat hunts for the identified indicators and assume potential account compromises for any users who may have interacted with these attachments.
For end users:
For SOCs/Defenders:
| Tactic | Technique ID | Procedure |
| Initial Access (TA0027) | Phishing: Spearphishing Attachment (T1566.001) | Delivered via targeted email attachments |
| Execution (TA0041) | User Execution: Malicious File (T1204.002) | Execution occurs when the user opens or runs a malicious file disguised as legitimate software or documents. |
| Credential Access (TA0006) | Input Capture via Web Form (T1056.003) | Captures user credentials and other sensitive information entered in web forms. |
| Exfiltration (TA0010) | Exfiltration Over Web Service: Telegram API (T1567.002) | Sends stolen data via Telegram API. |
| Defense Evasion (TA0030) | Obfuscated/Encrypted File (T1027) | Uses code obfuscation/encrypted files |
The IOCs have been added to this GitHub repository. Please review and integrate them into your Threat Intelligence feed to enhance protection and improve your overall security posture.
Static indicators (from analysed samples):
Yara rule
rule HTML_Telegram_Credential_Phishing
{
meta: description = "Detects HTML-based Telegram credential phishing attempts that invoke the Telegram bot API to exfiltrate credentials"
author = "Cyble Research Labs"
date = "2025-11-04"
tlp = "AMBER"
severity = "critical"
strings:
$a = "api.telegram.org/bot"
$b = "/sendMessage"
$c = "type=\"password\""
$d = "preventDefault()"
$e = /[0-9]{9,10}:AA[A-Za-z0-9_-]{35}/
$f = "api.ipify.org"
$g = "Quotation Request"
$h = "Invoice "
condition:
all of ($a, $b, $c, $d) and any of ($e, $f, $g, $h)
}