Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
SSH Auth Keys Reuse Exposes Sophisticated Targeted Phishing Attack

SSH Auth Keys Reuse Exposes Sophisticated Targeted Phishing Attack

Posted on May 16, 2025May 16, 2025 By CWS

A coordinated phishing marketing campaign focusing on Kuwait’s essential sectors has been uncovered via a particular operational safety lapse: the constant reuse of SSH authentication keys throughout a number of assault servers.

The marketing campaign, which stays energetic as of Might 2025, has deployed over 100 domains to reap credentials via meticulously cloned login portals impersonating official Kuwaiti companies within the fisheries, telecommunications, and insurance coverage sectors.

Relatively than using conventional typosquatting methods, the attackers have registered brand-inspired domains utilizing transliterations and generic references, making conventional detection strategies much less efficient.

The phishing infrastructure spans a number of servers focused on IP addresses 78.153.136[.]29, 134.124.92[.]70, and 138.124.78[.]35, all hosted inside Aeza Worldwide Ltd’s community (AS210644).

These servers exhibit multi-tenant traits, concurrently staging domains focusing on completely different sectors to maximise operational effectivity.

Most of the domains impersonate the Nationwide Fishing Firm of Kuwait, with examples together with alwattnya[.]com, wtanaya[.]com, elwattanya1[.]com, and alwattnia[.]com.

The webpages convincingly replicate official firm storefronts, full with product listings and buying cart options.

Hunt.io researchers recognized the marketing campaign after receiving a tip concerning sustained phishing exercise focusing on industries in Kuwait.

Their investigation revealed that greater than half of the 230+ domains have been impersonating the Nationwide Fishing Firm of Kuwait.

Webpage imitating the Nationwide Fishing Firm (Supply – Hunt.io)

The webpages carefully mimicked the looks of official websites, which shows an instance webpage imitating the Nationwide Fishing Firm’s on-line storefront.

Infrastructure

The essential technical discovering that uncovered this operation was the constant reuse of SSH authentication keys throughout the phishing infrastructure.

Two particular SSH key fingerprints have been repeatedly deployed throughout a number of servers, creating a particular signature that allowed researchers to hyperlink seemingly unrelated phishing domains.

This operational safety failure supplied safety groups with a dependable methodology to establish the complete scope of the marketing campaign regardless of its use of numerous area naming conventions and internet hosting preparations.

The SSH key reuse demonstrates how refined menace actors can unwittingly create detectable patterns via infrastructure administration shortcuts.

When configuring new servers, the attackers apparently deployed the identical authentication keys reasonably than producing distinctive credentials for every asset.

SSH key pivot on 138.124.92[.]70 (Supply – Hunt.io)

This allowed Hunt.io researchers to pivot throughout the infrastructure, which reveals an SSH key pivot visualization on 138.124.92[.]70.

To establish associated infrastructure via SSH key fingerprinting, safety professionals can question for these particular keys throughout their community environments.

The constant deployment sample inside Aeza Worldwide Ltd’s ASN offers extra context for menace searching efforts.

Safety groups can use the next question to establish potential malware sightings throughout this particular ASN:-

SELECT ip, hostname, malware.title
FROM malware
WHERE asn.quantity == ‘210644’
GROUP BY ip, hostname, malware.title

The marketing campaign expanded past fisheries to incorporate domains impersonating Zain, a serious Kuwaiti telecommunications supplier.

The area zain-kw[.]professional hosted a convincing cell fee portal designed to reap cellphone numbers and fee particulars.

Zain spoofed account web page (Supply – Hunt.io)

The spoofed Zain account web page fastidiously mimicked official companies, making detection significantly troublesome on cell gadgets the place phishing indicators are much less apparent.

This phishing marketing campaign highlights how attackers proceed to evolve their methods whereas sometimes leaving essential operational traces.

The mix of numerous area methods, cross-sector focusing on, and cell fee lures demonstrates a classy strategy to social engineering, whereas the SSH key reuse offers defenders with a helpful detection alternative.

How SOC Groups Save Time and Effort with ANY.RUN – Reside webinar for SOC groups and managers

Cyber Security News Tags:Attack, Auth, Exposes, Keys, Phishing, Reuse, Sophisticated, SSH, Targeted

Post navigation

Previous Post: Linux Kernel Patching: Preventing Exploits in 2025
Next Post: macOS Gatekeeper Explained: Strengthening System Defenses

Related Posts

CanisterWorm Malware Targets npm, Compromises Developer Accounts CanisterWorm Malware Targets npm, Compromises Developer Accounts Cyber Security News
Iranian Nation-State APT Targeting Networks and Critical Infrastructure Organizations Iranian Nation-State APT Targeting Networks and Critical Infrastructure Organizations Cyber Security News
Bloody Wolf Hackers Mimic as Government Agencies to Deploy NetSupport RAT via Weaponized PDF’s Bloody Wolf Hackers Mimic as Government Agencies to Deploy NetSupport RAT via Weaponized PDF’s Cyber Security News
Hackers Exploit Screensavers for Remote Access Hackers Exploit Screensavers for Remote Access Cyber Security News
LLMs are Accelerating the Ransomware Operations with Functional Tools and RaaS LLMs are Accelerating the Ransomware Operations with Functional Tools and RaaS Cyber Security News
HashiCorp Vault 0-Day Vulnerabilities Let Attackers Execute Remote Code HashiCorp Vault 0-Day Vulnerabilities Let Attackers Execute Remote Code Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark