Instagram Lures, Microsoft Spoofs, and SIM Swaps: A Mid-May Phishing Breakdown
2025年5月中旬出现复杂零日钓鱼攻击活动,针对社交媒体、电商、企业邮件等多领域。攻击者利用合法云服务及被黑基础设施提升可信度,并通过伪装成Adobe、Netflix等品牌诱导用户泄露凭证。建议加强防火墙封锁域名、提升员工安全意识并启用多因素认证以应对威胁。 2025-5-29 00:1:49 Author: pixmsecurity.com(查看原文) 阅读量:20 收藏

A surge of sophisticated zero-day phishing campaigns was observed in mid-May 2025, targeting a wide range of services including social media, e-commerce, enterprise email, telecommunications, and streaming platforms. Attackers leveraged legitimate cloud services and compromised infrastructure – from professional learning platforms to web hosting and cloud app environments – to lend credibility to their phishing pages. Here are some examples and highlights.

Phishing URLs

manage[.]nay[.]qxk[.]mybluehost[.]me

googleiinfluencerhub[.]ct[.]ws

czoin[.]dzdyf[.]es

newspaceitenow[.]tech/Gran1/

sign[.]account[.]srver[.]at[.]bel[.]0auth[.]165-154-199-230[.]cprapid[.]com

my-php-app-production-7f57[.]up[.]railway[.]app

log-in[.]billing-information[.]netflix-id[.]cc[.]valterjavaroni[.]com[.]br

greatbtinternet[.]in/vparty/

Instagram Influencer

This Instagram phishing attack was clicked by a Texas user on May 11 on their work device, where threat actors created a fake “Google Influencer Hub” webpage to target Instagram users’ login credentials. 

The lure likely promised users an opportunity to join a Google-sponsored influencer program, tricking them into entering their Instagram credentials. Once entered, the credentials would be captured via the site’s script (which submitted the username and password to the attacker’s server). Such messages are often delivered within the native Instagram app, completely outside the scope of corporate email security.

The attack also includes a 2FA prompt stage, asking the user for a 6 digit code after entering their password.

Office 365 and Okta Spearphish

On May 21, a Kentucky employee clicked the below Microsoft spearphish.

This attack targeted Microsoft Office 365 credentials, using a phishing page hosted on czoin[.]dzdyf[.]es (a Spanish domain). Additionally, the HTML suggests that the phishing kit appears to integrate elements of Okta, as seen by references to Okta in the HTML code.

“Adobe Document Cloud” Spearphish

On May 13th, a staff member at an Idaho organization clicked the below phishing attack on an “Adobe Document Cloud” lure.

The original phishing page presented an Adobe Document Viewer, which prompted the user to select their email type (Outlook in this case). The attack contains the assurance “We’ll never share your email with anyone else”. 

The phishing kit behind this page actually catered to multiple email providers: besides Outlook, the kit also offered options to sign in with Yahoo, AOL, Office 365, or “Other Mail”.

A similar phishing kit to the one on newspaceitenow.tech was observed on greatbtinternet[.]in/vparty/ a week later (May 21) targeting a user in Kentucky

AT&T Wireless Login Phish on cPanel Site

On May 13th, an Idaho employee clicked the below AT&T phishing attack on their work device.

Attacks targeting AT&T customers like this are often delivered through SMS, mimicking AT&T’s regular communications for services and marketing. Compromised AT&T accounts give hackers access to critical device and billing information, allowing them the ability to manage SIM cards and eSIMs and execute SIM swaps.

Microsoft Spearphish on Railway Cloud App

On May 15th, a user at a Minnesota organization clicked the below Microsoft spearphish.

This attack was hosted on the Railway.app cloud platform, which provides free hosting for web applications. By deploying on Railway.app, the attacker took advantage of a legitimate cloud domain (up.railway.app). The text on this phishing page reads: “Because you’re accessing sensitive info, you need to verify your password,” which matches Microsoft wording in real scenarios (like re-confirming credentials for sensitive account changes).

Netflix Billing Phish via Compromised Brazilian Site

On May 21, an employee at a Colorado organization clicked the below Netflix billing phish.

The attack is hosted on a legitimate domain of a legitimate Brazilian business, that was near certain compromised and unwittingly hosting this phishing attack. Leveraging the reputation of a reputable third party domain, this attack can easily fly under the radar

Amazon Phish on Spoofed Hosting

On May 18th, another Texas staff member clicked the below Amazon phishing attack on their work device.

The domain mybluehost[.]me likely impersonated the legitimate hosting domain bluehost.com. Examples like this speak to the risks of users accessing personal email accounts on work devices.

Mitigations

  • Block the specified domains on corporate firewalls and endpoint security solutions.
  • Educate users about phishing risks in file sharing applications outside email like Adobe 
  • Remind users of phishing risks for their personal accounts they access even if they are on corporate devices
  • Enforce multi-factor authentication (MFA) on all corporate logins to reduce the risk of credential compromise.

[email protected]


文章来源: https://pixmsecurity.com/blog/blog/instagram-lures-microsoft-spoofs-and-sim-swaps-a-mid-may-phishing-breakdown/
如有侵权请联系:admin#unsafe.sh