Phishing Campaign Imitating U.S. Department of Education (G5)
PreCrime™ Labs发现了一个模仿美国教育部G5门户网站的钓鱼活动,利用多个仿冒网站窃取用户登录凭证。这些钓鱼网站模仿真实界面并使用混淆技术绕过扫描器,可能针对教育工作者、资助管理员等群体。此活动可能利用近期人事变动引发的社会工程攻击风险,并对联邦系统安全构成威胁。
2025-7-23 10:1:32
Author: bfore.ai(查看原文)
阅读量:13
收藏
Phishing Campaign Imitating U.S. Department of Education (G5)
Target: U.S. Department of Education – G5 Grant Portal Analyst: PreCrime™ Labs Threat Classification: Credential Phishing (Government Impersonation) Date: PreCrime™ Labs identified the phishing campaign on July 15th and notified the DoE
Executive Summary: Phishing Campaign Imitating U.S.
Department of Education (G5)
PreCrime™ Labs, the threat research team at BforeAI, identifies a phishing campaign currently targeting the U.S. Department of Education’s G5 portal, which is used for managing grants and federal education funding. Multiple lookalike domains have been observed spoofing the G5 login page in an attempt to harvest login credentials from legitimate users.
These domains attempt to clone or imitate the official G5.gov interface and may be targeting education professionals, grant administrators, or vendors tied to the U.S. Department of Education. This activity is particularly alarming given the recent Trump Administration announcement of 1,400 layoffs at the Department of Education, which may create confusion and an opportunity for social engineering.
The following domains have been observed actively hosting phishing kits or cloned login portals:
mynylifeinsuraces.com
mysoleverhrnix.com
myizolvedpeopls.com
myapdpetrol.com
g5parameters.com
g4parameters.com
These domains are seen mimicking login portals and using deceptive structures to appear affiliated with legitimate federal systems.
Infrastructure Analysis
Registrar: Hello Internet Corp (known noted for lax abuse compliance)
Hosting: All domains are fronted by Cloudflare CDN for obfuscation and uptime resilience
Includes fake login form and JavaScript-based credential exfiltration
Displays a “case-sensitive” login field to appear more legitimate
Observed Behavior:
The page submits data via analytics.php and uses an asynchronous updates.php loop to simulate login processing
Uses browser-based cloaking and DOM manipulation to confuse automated scanners
Attempts redirection to a /verify/ endpoint, which likely leads to secondary phishing or MFA bypass.
A cloned version of the G5 portal was identified on one of the domains. This phish uses the same login structure, help desk information, and layout as the official site. (see screenshot below).
Cloned version of the G5 portal
Reputational Hits and Risk Propagation
BforeAI is the only known provider currently flagging this infrastructure. No mainstream blocklists have yet labeled this cluster — highlighting the value of predictive detection.
Credential Theft: Login credentials to a government grant system may allow attackers to:
Access sensitive grant award data
Change payment instructions
Impersonate recipients for fraud
Wider Social Engineering: These domains could be paired with phishing emails referencing ongoing layoffs or grant disbursement delays.
National Security: Attacks targeting federal infrastructure (even peripheral systems) could be leveraged for supply chain intrusion or reputational damage.
All domains have been flagged and are under disruption process
Threat indicators shared with partner intelligence ecosystems
Continuous monitoring in place for reuse of assets (favicon hashes, JS signatures, etc.)
The Department of Education Office of the Inspector General (OIG) has been notified of the campaign via the OIG Hotline: https://oig.ed.gov/oig-hotline
Government employees and grant recipients should avoid clicking on links from unknown email sources and always verify URLs.