Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Phishing Attack Leverages Popular Brands to Harvest Login Credentials

Posted on November 12, 2025November 12, 2025 By CWS

A complicated phishing marketing campaign has emerged, concentrating on organizations throughout Central and Japanese Europe by impersonating authentic international manufacturers to deceive customers into surrendering their login credentials.

The assault makes use of self-contained HTML recordsdata delivered as e mail attachments, eliminating the necessity for exterior server internet hosting or suspicious URLs that conventional safety programs sometimes detect.

As soon as opened, these attachments current convincing faux login pages for manufacturers together with Microsoft 365, Adobe, WeTransfer, FedEx, and DHL, making a seamless consumer expertise designed to bypass typical e mail safety controls.

The assault methodology demonstrates a transparent understanding of regional enterprise practices.

Menace actors distribute phishing emails posing as authentic clients or enterprise companions, requesting quotations or bill confirmations by RFC-compliant filenames equivalent to RFQ_4460-INQUIRY.HTML.

This focused strategy focuses on industries with common procurement workflows, together with agriculture, automotive, building, and schooling sectors, primarily within the Czech Republic, Slovakia, Hungary, and Germany.

Cyble safety analysts recognized that the marketing campaign’s success depends on embedded JavaScript inside HTML attachments that captures credentials and transmits them on to attacker-controlled Telegram bots fairly than conventional command-and-control servers.

Upon execution, victims encounter a rigorously replicated login interface displaying brand-authentic branding with blurred background photographs for added legitimacy.

Marketing campaign Overview

The credential seize mechanism features by studying type subject values and setting up API requests to ship stolen knowledge instantly by the Telegram Bot API.

Technical evaluation reveals two distinct implementation approaches amongst analyzed samples. The primary variant implements CryptoJS AES encryption for obfuscation whereas capturing e mail addresses, passwords, IP addresses, and user-agent data earlier than redirecting victims to authentic firm domains.

Marketing campaign Overview (Supply – Cyble)

The second pattern employs extra superior anti-forensics methods, blocking keyboard combos together with F12, Ctrl+U/S/C/A/X, and right-click context menus to forestall code inspection and evaluation.

The exfiltration operate demonstrates technical sophistication by using the native Fetch API for cleaner code implementation fairly than jQuery dependencies.

The JavaScript constructs POST requests containing harvested credentials despatched through HTTPS to api.telegram.org/bot endpoints with hardcoded bot tokens and chat IDs embedded instantly within the payload.

This strategy intentionally avoids suspicious community patterns whereas sustaining operational resilience by decentralized bot infrastructure.

Organizations ought to prioritize deploying HTML attachment controls and implementing content material inspection insurance policies to dam or sandbox probably malicious HTML recordsdata earlier than supply to finish customers.

Safety groups are suggested to hunt for api.telegram.org POST exercise originating from shopper programs and conduct retroactive menace hunts for recognized indicators to evaluate whether or not credentials have been compromised.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Attack, Brands, Credentials, Harvest, Leverages, Login, Phishing, Popular

Post navigation

Previous Post: Sweet Security Raises $75 Million for Cloud and AI Security
Next Post: Amazon Uncovers Attacks Exploited Cisco ISE and Citrix NetScaler as Zero-Day Flaws

Related Posts

5,000+ Fake Online Pharmacies Websites Selling Counterfeit Medicines Cyber Security News
CISA Warns of Federal Agencies Not Fully Patching Actively Exploited Cisco ASA or Firepower Devices Cyber Security News
Multiple Django Vulnerabilities Enable SQL injection and DoS Attack Cyber Security News
Decoding PIN-Protected BitLocker Through TPM SPI Analysis To Decrypt And Mount The Disks Cyber Security News
Google Warns 2.5B Gmail Users to Reset Passwords Following Salesforce Data Breach Cyber Security News
Ivanti Patches 13 Vulnerabilities in Endpoint Manager Allowing Remote Code Execution Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark