Phishing Campaign Imitating U.S. Department of Education (G5)
PreCrime™ Labs发现了一个模仿美国教育部G5门户网站的钓鱼活动,利用多个仿冒网站窃取用户登录凭证。这些钓鱼网站模仿真实界面并使用混淆技术绕过扫描器,可能针对教育工作者、资助管理员等群体。此活动可能利用近期人事变动引发的社会工程攻击风险,并对联邦系统安全构成威胁。 2025-7-23 10:1:32 Author: bfore.ai(查看原文) 阅读量:13 收藏

Phishing Campaign Imitating U.S. Department of Education (G5)

Phishing Campaign Imitating U.S. Department of Education (G5)

Target: U.S. Department of Education – G5 Grant Portal
Analyst: PreCrime™ Labs
Threat Classification: Credential Phishing (Government Impersonation)
Date: PreCrime™ Labs identified the phishing campaign on July 15th and notified the DoE 

Executive Summary: Phishing Campaign Imitating U.S. Department of Education (G5)

PreCrime™ Labs, the threat research team at BforeAI, identifies a phishing campaign currently targeting the U.S. Department of Education’s G5 portal, which is used for managing grants and federal education funding. Multiple lookalike domains have been observed spoofing the G5 login page in an attempt to harvest login credentials from legitimate users.

These domains attempt to clone or imitate the official G5.gov interface and may be targeting education professionals, grant administrators, or vendors tied to the U.S. Department of Education. This activity is particularly alarming given the recent Trump Administration announcement of 1,400 layoffs at the Department of Education, which may create confusion and an opportunity for social engineering.

The following domains have been observed actively hosting phishing kits or cloned login portals:

  • mynylifeinsuraces.com
  • mysoleverhrnix.com
  • myizolvedpeopls.com
  • myapdpetrol.com
  • g5parameters.com
  • g4parameters.com

These domains are seen mimicking login portals and using deceptive structures to appear affiliated with legitimate federal systems.

Infrastructure Analysis

  • Registrar: Hello Internet Corp (known noted for lax abuse compliance)
    • Hosting: All domains are fronted by Cloudflare CDN for obfuscation and uptime resilience
    • HTML Content:
      • Copies visual design and structure of https://www.g5.gov
      • Includes fake login form and JavaScript-based credential exfiltration
      • Displays a “case-sensitive” login field to appear more legitimate
    • Observed Behavior:
      • The page submits data via analytics.php and uses an asynchronous updates.php loop to simulate login processing
      • Uses browser-based cloaking and DOM manipulation to confuse automated scanners

Attempts redirection to a /verify/ endpoint, which likely leads to secondary phishing or MFA bypass.

A cloned version of the G5 portal was identified on one of the domains. This phish uses the same login structure, help desk information, and layout as the official site. (see screenshot below).

Phishing Campaign Imitating United States Department of Education (G5)
Cloned version of the G5 portal

Reputational Hits and Risk Propagation

BforeAI is the only known provider currently flagging this infrastructure. No mainstream blocklists have yet labeled this cluster — highlighting the value of predictive detection.

Credential Theft: Login credentials to a government grant system may allow attackers to:

  • Access sensitive grant award data
  • Change payment instructions
  • Impersonate recipients for fraud
  • Wider Social Engineering: These domains could be paired with phishing emails referencing ongoing layoffs or grant disbursement delays.
  • National Security: Attacks targeting federal infrastructure (even peripheral systems) could be leveraged for supply chain intrusion or reputational damage.
  • All domains have been flagged and are under disruption process
  • Threat indicators shared with partner intelligence ecosystems
  • Continuous monitoring in place for reuse of assets (favicon hashes, JS signatures, etc.)
  • The Department of Education Office of the Inspector General (OIG) has been notified of the campaign via the OIG Hotline: https://oig.ed.gov/oig-hotline
  • Government employees and grant recipients should avoid clicking on links from unknown email sources and always verify URLs.
  • Bookmark the official G5 portal: https://www.g5.gov
  • Report suspicious emails or domains to your agency’s cybersecurity team or to [email protected]

Ready to see BforeAI in action?
Get a personalized demo

Talk to one of our experts and deploy in minutes.
No implementation needed. Works right out of the box!


文章来源: https://bfore.ai/report/phishing-campaign-imitating-united-states-department-of-education-g5/
如有侵权请联系:admin#unsafe.sh