Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Targeting HubSpot Users in Targeted Phishing Attack

Hackers Targeting HubSpot Users in Targeted Phishing Attack

Posted on December 19, 2025December 19, 2025 By CWS

An lively phishing marketing campaign is at the moment concentrating on HubSpot customers by a complicated mixture of social engineering and infrastructure compromise.

The assault leverages enterprise e mail compromise techniques, paired with web site hijacking, to ship credential-stealing malware to unsuspecting advertising professionals and enterprise groups that depend on the platform.

The marketing campaign begins with fastidiously crafted phishing emails that seem to return from reliable enterprise accounts.

These messages urge recipients to log into their HubSpot accounts to assessment advertising campaigns, citing an uncommon spike in unsubscribes as the explanation for quick motion.

The emails use MailChimp, a trusted e mail advertising platform, to distribute the assault at scale, making certain messages move by safe e mail gateways due to the platform’s popularity.

Evalian researchers famous that phishing emails use a misleading method: embedding malicious URLs within the sender’s show identify quite than within the e mail physique.

This strategy efficiently bypasses many e mail safety controls, which generally scan message content material however overlook the sender subject.

Phishing Electronic mail (Supply – Evalian)

Mixed with the compromised reliable enterprise area, the emails seem genuine to each automated programs and human readers.

As soon as victims click on the embedded URL, they’re redirected from a compromised web site to a convincing pretend HubSpot login portal hosted on Proton66 OOO infrastructure, a Russian bulletproof internet hosting supplier linked to ASN AS 198953.

When customers enter their credentials, the login data is transmitted to a login.php file and captured by attackers.

Malicious HubSpot Login Web page (Supply – Evalian)

The phishing e mail construction and the reproduction login web page are designed to reflect HubSpot’s reliable interface.

Internet hosting infrastructure

The an infection mechanism depends on harvesting legitimate person credentials quite than delivering conventional malware.

Evalian analysts recognized that the internet hosting infrastructure makes use of a Plesk-managed digital personal server with uncovered mail providers, together with Postfix and Dovecot.

The IP tackle 193.143.1.220 reveals an unusually broad vary of open ports, together with SMTP providers on ports 25 and 465, IMAP on ports 143 and 993, and a number of Plesk administrative interfaces.

This configuration is typical of infrastructure designed for speedy deployment and rotation of phishing campaigns.

Infrastructure evaluation confirmed that the IP is related to a number of different phishing makes an attempt, indicating a sample of organized assault exercise.

The uncovered Plesk management panels permit attackers to shortly deploy new phishing pages, handle compromised e mail accounts, and rotate infrastructure to evade detection.

Organizations should implement layered safety measures that reach past customary e mail authentication protocols to guard in opposition to evolving threats.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Attack, Hackers, HubSpot, Phishing, Targeted, Targeting, Users

Post navigation

Previous Post: US Shuts Down Crypto Exchange E-Note, Charges Russian Administrator
Next Post: Docker Makes 1,000 Hardened Images Free and Open Source

Related Posts

Retail Finance Giant SitusAMC Data Breach Exposes Accounting Records and Legal Agreements Retail Finance Giant SitusAMC Data Breach Exposes Accounting Records and Legal Agreements Cyber Security News
SonicOS SSLVPN Vulnerability Let Attackers Crash the Firewall Remotely SonicOS SSLVPN Vulnerability Let Attackers Crash the Firewall Remotely Cyber Security News
Critical Imunify360 AV Vulnerability Exposes 56 Million Linux-hosted Websites to RCE Attacks Critical Imunify360 AV Vulnerability Exposes 56 Million Linux-hosted Websites to RCE Attacks Cyber Security News
Cisco AsyncOS 0-Day Vulnerability Exploited in the Wild to run System-level Commands Cisco AsyncOS 0-Day Vulnerability Exploited in the Wild to run System-level Commands Cyber Security News
Astaroth Banking Malware Leveraging GitHub to Host Malware Configurations Astaroth Banking Malware Leveraging GitHub to Host Malware Configurations Cyber Security News
New Obex Tool Blocks EDR Dynamic Libraries From Loading at Runtime New Obex Tool Blocks EDR Dynamic Libraries From Loading at Runtime Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • NationStates Temporarily Offline Due to Security Breach
  • Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users
  • DynoWiper Data-Wiping Malware Attacking Energy Companies to Destroy Data
  • 30 Wind and Solar Farms in Poland Faced Coordinated Cyberattacks
  • OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • NationStates Temporarily Offline Due to Security Breach
  • Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users
  • DynoWiper Data-Wiping Malware Attacking Energy Companies to Destroy Data
  • 30 Wind and Solar Farms in Poland Faced Coordinated Cyberattacks
  • OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark