Credit Resources Vault: Why this credit email set off our scam alarms
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得通读全文,抓住主要信息。 文章讲的是一个名为Credit Resources Vault的邮件被标记为可疑。邮件看起来像是来自可信的金融机构,但实际上有很多可疑之处。比如,发件人的域名和金融服务无关,邮件内容制造紧迫感,这些都是典型的钓鱼手法。 接着,点击链接后进入的网站虽然看起来专业,但技术细节显示它可能由AI工具快速搭建,缺乏金融级的安全措施。网站收集了大量个人信息和银行账户细节,并且有一个隐藏的复选框授权每周扣款20美元。 分析显示,这些数据被发送到多个合法的云服务中存储和处理,可能用于后续的营销或钓鱼活动。文章指出这可能属于灰色地带的公司行为,虽然没有明确违法,但存在很大风险。 用户的需求是用中文总结内容,并且控制在100字以内。不需要特定开头。我需要提取关键点:邮件可疑、网站收集敏感信息、授权扣款、数据存储在云服务中、属于灰色地带。 现在把这些点浓缩成简洁的句子: 文章描述了一封可疑信用服务邮件及网站如何收集个人信息和银行账户细节,并通过隐藏复选框授权每周扣款20美元。技术分析显示网站由AI快速搭建,缺乏金融级安全措施。数据被发送到多个云服务存储和处理。该行为处于合法与诈骗之间。 检查字数是否在100字以内,并确保信息准确无误。 </think> 文章描述了一封可疑信用服务邮件及网站如何收集个人信息和银行账户细节,并通过隐藏复选框授权每周扣款20美元。技术分析显示网站由AI快速搭建,缺乏金融级安全措施。数据被发送到多个云服务存储和处理。该行为处于合法与诈骗之间。 2026-4-15 09:8:47 Author: securityboulevard.com(查看原文) 阅读量:9 收藏

The post Credit Resources Vault: Why this credit email set off our scam alarms appeared first on Malwarebytes.

If there is anything that annoys me more than a scammer, it’s companies that behave like one, while staying just on the right side of the law. They manage to linger and disappoint customers for years.

It’s also why sometimes people think that Malwarebytes Scam Guard can be overly cautious when flagging websites. Some sites sit in a grey area where even seasoned researchers have to look twice to figure out whether something is an outright scam.

That’s exactly what happened here.

After receiving an anonymized report from a customer, I started an investigation into an email Scam Guard flagged as highly suspicious.

The email

The email came from the address anna@cosmosshift[.]org and promoted a service called Credit Resources Vault, urging recipients to click a button labelled Check Eligibility Now..

There are immediate red flags:

  • The sender domain (cosmosshift.org) has no clear connection to credit services or financial products. There is no “Cosmos Shift” financial institution.
  • The message creates urgency around credit approval, a classic social engineering pressure tactic.
  • It includes a physical address and an opt-out link which appear to be legitimate, but are also a common technique in phishing called legitimacy laundering.

Unlike most phishing emails, this one includes a personalized greeting using the recipient’s email address. Since the recipient says they’ve never interacted with the sender, this suggests their details may have come from a data broker or a past data breach.

The website paints a suspicious picture

Clicking the link leads to (yourcreditvault.com), a polished-looking site that appears to offer credit services.

Credit Resources landing page
Credit Resources landing page

But under the hood we found more red flags:

  • The website was built with Vite/React, a modern JavaScript framework more typical of startup side projects than regulated financial services.
  • References to bolt.new suggest the site may have been assembled using AI tools
  • There are no visible indicators of banking-grade security. The HTML source shows only a basic app shell with no indicators of financial-sector encryption infrastructure.
  • The branding (including the logo) looks hastily put together
  • The JavaScript bundle (index-B54Ghi53.js) behind the submission form is heavily obfuscated: a technique used by cybercriminals to hide where the submitted data is being sent.

None of this proves malicious intent on its own. But together, it paints a picture of something built quickly, and designed to collect data rather than deliver a robust financial service.

The form collects data, and $20/week

The biggest concern is the form, which collects an extraordinary amount of data for what’s presented as a basic credit eligibility check.

The application form
The application form

By monitoring network traffic during form submission, we were able to capture exactly what fields are transmitted:

  • Personal: first name, last name, email, phone
  • Address: street, city, province, postal code
  • Full banking details: bank name, institution number, transit number, account number
  • Tracking data tied to advertising campaigns
  • A drawn-on-screen signature, which gets uploaded to the owner’s Google Drive.

See if your personal data has been exposed.


That’s far more than what’s needed for a credit eligibility check.

With those banking details alone, someone can set up fraudulent Pre-Authorized Debits (PADs). A PAD is a form of direct bank withdrawal used legitimately by billers, but can also be abused.

Subscription agreement
Enlarged screenshot of the box they want a checkmark in

And that’s exactly what appears to happen.

A small checkbox, paired with fine print, authorizes the company to withdraw $20 weekly per the PAD agreement the target just signed. This checkbox serves two purposes: it provides the operators with legal cover (“you agreed to it!”) and it weaponizes the very bank account details the form just collected.

Targeting the financially vulnerable

This campaign seems to deliberately target people with poor or limited credit history. The promise of “approval when others say no” is powerful, especially for people under financial pressure.

These are not random victims, but people targeted because their need makes them more likely to hand over sensitive information without scrutinizing the source.

The $20/week PAD charge (over $1,000 per year) can lead to overdrafts, fees, and further financial harm.

Where your data goes

Our network traffic analysis revealed a sophisticated, multi-service backend that uses individual components which all might be legitimate.

Supabase: Victim data is sent via POST request to a Supabase project:

POST https://bstvkdzfgpktokbiagsc.supabase.co/rest/v1/vault_memberships

Supabase is a legitimate, well-regarded cloud database platform with free tiers.

Brevo (formerly Sendinblue): This is a legitimate mass-email platform. Enrolling victims here means they can be targeted with follow-up campaigns indefinitely.

POST https://bstvkdzfgpktokbiagsc.supabase.co/functions/v1/add-to-brevo

Google Drive and Sheets: The signature data field includes a signature_drive_url, indicating victims’ handwritten signatures might get stored on Google Drive infrastructure. A google_sheets_synced field confirms that incoming victim records are mirrored to a live Google Sheet, giving the operators a real-time dashboard of everyone that submitted a form.

Individually, these are trusted platforms. Together, they form a system designed to:

  • Collect sensitive personal and banking data
  • Store it in accessible formats
  • Add users to ongoing marketing or even phishing campaigns

In other words, submitting the form doesn’t just risk your bank account, but may also put you on a list of people likely to be targeted again.

Infrastructure

The infrastructure behind this campaign spans multiple domains:

  • cosmosshift[.]org (email sender)
  • yourcreditvault[.]com (landing page).
  • yourscore[.]ca (redirect after submitting the form)
  • creditresources[.]ca (follow-up email that included the phone number 1-833-427-1562)
  • debtlesscredit[.]com (another website using that same phone number)

Using multiple domains and having one telephone number associated with more than one domain raising red flags about the legitimacy of the company.

So is this a scam?

That depends on how you define it.

While this may not meet the strict legal definition of a scam, we can see why Scam Guard flagged it, as many of the tactics used here are also seen in phishing emails and on scam websites.

The evidence suggests these sites are operated by real companies, but they sit firmly in a grey area. On one hand, they have corporate registrations, public websites, and apparently even some satisfied customers. On the other, the business model—charging recurring fees for credit or debt “programs”—has generated a steady stream of consumer complaints and scam accusations. The use of multiple domains (Credit Resources, Debtless Credit, Your Credit Vault) also points to a lead-generation strategy that’s common in the debt-relief space.

It’s also likely that these companies rely on purchased mailing lists and may have found our customer’s email address on a list of likely candidates. Unfortunately, lists like these are bought and sold by legitimate marketers and cybercriminals alike.

We have reached out to the sender of the email and Credit Resources for comment but had not received an answer at the time of publication.


What do cybercriminals know about you?

Use Malwarebytes’ free Digital Footprint scan to see whether your personal information has been exposed online.

*** This is a Security Bloggers Network syndicated blog from Malwarebytes authored by Malwarebytes. Read the original post at: https://www.malwarebytes.com/blog/news/2026/04/credit-resources-vault-why-this-credit-email-set-off-our-scam-alarms


文章来源: https://securityboulevard.com/2026/04/credit-resources-vault-why-this-credit-email-set-off-our-scam-alarms/
如有侵权请联系:admin#unsafe.sh