Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Phishing Attack Uses Basic Auth URLs to Trick Users and Steal Login Credentials

Posted on October 16, 2025October 16, 2025 By CWS

Early October 2025 witnessed the resurgence of a retro phishing approach that exploits legacy Fundamental Authentication URLs to deceive customers into divulging delicate credentials.

Menace actors crafted hyperlinks within the format https://username:[email protected], embedding a trusted establishment’s area within the username discipline to visually mimic professional providers.

When customers click on these hyperlinks, their browsers authenticate to the malicious area specified after the @ image, silently harvesting the credentials meant for the cast website.

This tactic is especially efficient in cell apps and e mail purchasers that truncate lengthy URLs, exhibiting solely the misleading portion earlier than the @ image.

Netcraft analysts famous the primary wave of those assaults focusing on GMO Aozora Financial institution prospects in Japan, the place the attackers registered URLs akin to hxxps://gmo-aozora.com%[email protected]/sKgdiq.

Victims encountering these hyperlinks in phishing emails had been prompted to finish a Japanese-language CAPTCHA web page designed to simulate a professional safety verify.

CAPTCHA web page captured earlier than URLs turned inactive (Supply – Netcraft)

Regardless of trendy browsers supporting Fundamental Auth URLs, this format has fallen out of favor as a result of safety issues, making it an surprising vector that evades informal URL scrutiny.

Following the preliminary discovery, Netcraft researchers recognized greater than 200 distinctive Fundamental Auth phishing URLs in a two-week interval.

Assaults impersonated main manufacturers together with Amazon, Google, and Netflix, usually cloaking malicious domains behind acquainted names.

One instance spoofed Netflix, luring recipients into clicking a hyperlink that appeared professional however directed them to a credential-stealing script hosted on themiran.web.

The coordinated use of a number of malicious domains and encoded tokens strengthened the phantasm of professional authentication flows.

Past easy credential harvesting, these phishing hyperlinks additionally applied human verification CAPTCHAs to delay automated takedown efforts and to strengthen belief amongst victims.

The CAPTCHA web page emulated a safety checkpoint, requiring customers to click on “I’m not a robotic” earlier than continuing to a counterfeit login kind. This further step each elevated the perceived legitimacy of the web page and gave attackers extra time to seize credentials.

An infection Mechanism and Credential Exfiltration

Upon clicking a compromised Fundamental Auth URL, the sufferer’s browser points an HTTP GET request with the credentials discipline set to the trusted area textual content.

For instance:-

GET /sKgdiq HTTP/1.1
Host: coylums.com
Authorization: Fundamental Z21vLWFvem9yYS5jb206

Right here, Z21vLWFvem9ycmEuY29tOg== is the Base64-encoded illustration of the string gmo-aozora.com:. The server decodes this header to verify the presence of the embedded “username,” then serves the phishing web page that mimics the financial institution’s login interface.

Submitted credentials are despatched through a POST request to the attacker’s backend endpoint, the place they’re collected for later misuse.

This mechanism bypasses typical URL filters that concentrate on question strings quite than embedded authentication tokens.

By reviving this outdated HTTP characteristic, attackers have demonstrated how legacy requirements might be repurposed for contemporary phishing campaigns.

Monetary establishments and safety groups ought to replace URL inspection guidelines to detect and block Fundamental Authentication tokens in hyperlinks and educate customers concerning the risks of unbeknownst embedded credentials.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attack, Auth, Basic, Credentials, Login, Phishing, Steal, Trick, URLs, Users

Post navigation

Previous Post: AISLE Emerges From Stealth With AI-Based Reasoning System That Remediates Vulnerabilities on the Fly
Next Post: Senate Investigates Cisco Over Zero-Day Firewall Vulnerabilities

Related Posts

OpenAI Launches $4 ChatGPT Go Plan with Unlimited Access to GPT-5 Cyber Security News
17K+ SharePoint Servers Exposed to Internet Cyber Security News
TP-Link Router Zero-Day RCE Vulnerability Exploited Bypassing ASLR Protections Cyber Security News
Threat Actors Poisoning Google Search Results to Display The Scammer’s Phone Number Instead of Real Number Cyber Security News
FBI Atlanta Seizes Major Video Game Piracy Websites in International Operation Cyber Security News
Splunk Address Third-Party Packages Vulnerabilities in SOAR Versions Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • $1M WhatsApp Hack Flops: Only Low-Risk Bugs Disclosed to Meta After Pwn2Own Withdrawal
  • OpenAI Atlas Omnibox Is Vulnerable to Jailbreaks
  • AI-Powered Ransomware Is the Emerging Threat That Could Bring Down Your Organization
  • YouTube Ghost Malware Network With 3,000+ Malicious Videos Attacking Users to Deploy Malware
  • Agenda Ransomware Actors Deploying Linux RAT on Windows Systems Targeting VMware Deployments

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • $1M WhatsApp Hack Flops: Only Low-Risk Bugs Disclosed to Meta After Pwn2Own Withdrawal
  • OpenAI Atlas Omnibox Is Vulnerable to Jailbreaks
  • AI-Powered Ransomware Is the Emerging Threat That Could Bring Down Your Organization
  • YouTube Ghost Malware Network With 3,000+ Malicious Videos Attacking Users to Deploy Malware
  • Agenda Ransomware Actors Deploying Linux RAT on Windows Systems Targeting VMware Deployments

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News