CRIL Uncovers a New Wave of Browser-Based e-Challan Phishing Powered by Shared Fraud Infrastructure.
Following our earlier reporting on RTO-themed threats, CRIL observed a renewed phishing wave abusing the e-Challan ecosystem to conduct financial fraud. Unlike earlier Android malware-driven campaigns, this activity relies entirely on browser-based phishing, significantly lowering the barrier for victim compromise. During the course of this research, CRIL also noted that similar fake e-Challan scams have been highlighted by mainstream media outlets, including Hindustan Times, underscoring the broader scale and real-world impact of these campaigns on Indian users.
The campaign primarily targets Indian vehicle owners via unsolicited SMS messages claiming an overdue traffic fine. The message includes a deceptive URL resembling an official e-Challan domain. Once accessed, victims are presented with a cloned portal that mirrors the branding and structure of the legitimate government service. At the time of this writing, many of the associated phishing domains were active at the time, indicating that this is an ongoing and operational campaign rather than isolated or short-lived activity.
The same hosting IP was observed serving multiple phishing lures impersonating government services, logistics companies, and financial institutions, indicating a shared phishing backend supporting multi-sector fraud operations.
The infection chain, outlined in Figure 1, showcases the stages of the attack.

A sense of urgency, evidenced in this campaign, is usually a sign of deception. By demanding a user’s immediate attention, the intent is to make a potential victim rush their task and not perform due diligence.
Users must accordingly exercise caution, scrutinize the domain, sender, and never trust any unsolicited link(s).
Stage 1: Phishing SMS Delivery
The attack we first identified started with victims receiving an SMS stating that a traffic violation fine is overdue and must be paid immediately to avoid legal action. The message includes:
The sender appears as a standard mobile number, which increases delivery success and reduces immediate suspicion. (see Figure 2)

Stage 2: Redirect to Fraudulent e-Challan Portal
Clicking the embedded URL redirects the user to a phishing domain hosted on 101[.]33[.]78[.]145.
The page content is originally authored in Spanish and translated to English via browser prompts, suggesting the reuse of phishing templates across regions. (see Figure 3)

The Government insignia, MoRTH references, and NIC branding are visually replicated. (see Figure 3)
Stage 3: Fabricated Challan Generation
The portal prompts the user to enter:
Regardless of the input provided, the system returns:
This step is purely psychological validation, designed to convince victims that the challan is legitimate. (see Figure 4)

Stage 4: Card Data Harvesting
Upon clicking “Pay Now”, victims are redirected to a payment page claiming secure processing via an Indian bank. However:
During testing, the page accepted repeated card submissions, indicating that all entered card data is transmitted to the attacker backend, independent of transaction success. (see Figure 5)

Infrastructure Correlation and Campaign Expansion
CRIL identified another attacker-controlled IP, 43[.]130[.]12[.]41, hosting multiple domains impersonating India’s e-Challan and Parivahan services. Several of these domains follow similar naming patterns and closely resemble legitimate Parivahan branding, including domains designed to look like Parivahan variants (e.g., parizvaihen[.]icu). Analysis indicates that this infrastructure supports rotating, automatically generated phishing domains, suggesting the use of domain generation techniques to evade takedowns and blocklists.

The phishing pages hosted on this IP replicate the same operational flow observed in the primary campaign, displaying fabricated traffic violations with fixed fine amounts, enforcing urgency through expiration dates, and redirecting victims to fake payment pages that harvest full card details while falsely claiming to be backed by the State Bank of India.
This overlap in infrastructure, page structure, and social engineering themes suggests a broader, scalable phishing ecosystem that actively exploits government transport services to target Indian users.
Further investigation into IP address 101[.]33[.]78[.]145 revealed more than 36 phishing domains impersonating e-Challan services, all hosted on the same infrastructure.
The infrastructure also hosted phishing pages targeting:


Consistent UI patterns and payment-harvesting logic across campaigns
This confirms the presence of a shared phishing infrastructure supporting multiple fraud verticals.
As part of the continued investigation, CRIL analyzed the originating phone number used to deliver the phishing e-Challan SMS. A reverse phone number lookup confirmed that the number is registered in India and operates on the Reliance Jio Infocomm Limited mobile network, indicating the use of a locally issued mobile connection rather than an international SMS gateway.
Additionally, analysis of the number showed that it is linked to a State Bank of India (SBI) account, further reinforcing the campaign’s use of localized infrastructure. The combination of an Indian telecom carrier and association with a prominent public-sector bank likely enhances the perceived legitimacy of the scam. It increases the effectiveness of government-themed phishing messages. (see Figure 9)

This campaign demonstrates that RTO-themed phishing remains a high-impact fraud vector in India, particularly when combined with realistic UI cloning and psychological urgency. The reuse of infrastructure across government, logistics, and BFSI lures highlights a professionalized phishing operation rather than isolated scams.
As attackers continue shifting from malware delivery to direct financial fraud, user awareness alone is insufficient. Infrastructure monitoring, domain takedowns, and proactive SMS phishing detection are critical to disrupting these operations at scale.
| Tactic | Technique ID | Technique Name |
| Initial Access | T1566.001 | Phishing: Spearphishing via SMS |
| Credential Access | T1056 | Input Capture |
| Collection | T1119 | Automated Collection |
| Exfiltration | T1041 | Exfiltration Over C2 Channel |
| Impact | T1657 | Financial Theft |
The IOCs have been added to this GitHub repository. Please review and integrate them into your Threat Intelligence feed to enhance protection and improve your overall security posture.
| Indicators | Indicator Type | Description |
| echala[.]vip echallaxzov[.]vip | Domain | Phishing Domain |
| echallaxzrx[.]vip | ||
| echallaxzm[.]vip | ||
| echallaxzv[.]vip | ||
| echallaxzx[.]vip | ||
| echallx[.]vip | ||
| echalln[.]vip | ||
| echallv[.]vip | ||
| delhirzexu[.]vip | ||
| delhirzexi[.]vip | ||
| delhizery[.]vip | ||
| delhisery[.]vip | ||
| dtdcspostb[.]vip | ||
| dtdcspostv[.]vip | ||
| dtdcspostc[.]vip | ||
| hsbc-vnd[.]cc | ||
| hsbc-vns[.]cc | ||
| parisvaihen[.]icu | ||
| parizvaihen[.]icu | ||
| parvaihacn[.]icu | ||
| 101[.]33[.]78[.]145 | IP | Malicious IP |
| 43[.]130[.]12[.]41 |