Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Targeting HubSpot Users in Targeted Phishing Attack

Posted on December 19, 2025December 19, 2025 By CWS

An lively phishing marketing campaign is at the moment concentrating on HubSpot customers by a complicated mixture of social engineering and infrastructure compromise.

The assault leverages enterprise e mail compromise techniques, paired with web site hijacking, to ship credential-stealing malware to unsuspecting advertising professionals and enterprise groups that depend on the platform.

The marketing campaign begins with fastidiously crafted phishing emails that seem to return from reliable enterprise accounts.

These messages urge recipients to log into their HubSpot accounts to assessment advertising campaigns, citing an uncommon spike in unsubscribes as the explanation for quick motion.

The emails use MailChimp, a trusted e mail advertising platform, to distribute the assault at scale, making certain messages move by safe e mail gateways due to the platform’s popularity.

Evalian researchers famous that phishing emails use a misleading method: embedding malicious URLs within the sender’s show identify quite than within the e mail physique.

This strategy efficiently bypasses many e mail safety controls, which generally scan message content material however overlook the sender subject.

Phishing Electronic mail (Supply – Evalian)

Mixed with the compromised reliable enterprise area, the emails seem genuine to each automated programs and human readers.

As soon as victims click on the embedded URL, they’re redirected from a compromised web site to a convincing pretend HubSpot login portal hosted on Proton66 OOO infrastructure, a Russian bulletproof internet hosting supplier linked to ASN AS 198953.

When customers enter their credentials, the login data is transmitted to a login.php file and captured by attackers.

Malicious HubSpot Login Web page (Supply – Evalian)

The phishing e mail construction and the reproduction login web page are designed to reflect HubSpot’s reliable interface.

Internet hosting infrastructure

The an infection mechanism depends on harvesting legitimate person credentials quite than delivering conventional malware.

Evalian analysts recognized that the internet hosting infrastructure makes use of a Plesk-managed digital personal server with uncovered mail providers, together with Postfix and Dovecot.

The IP tackle 193.143.1.220 reveals an unusually broad vary of open ports, together with SMTP providers on ports 25 and 465, IMAP on ports 143 and 993, and a number of Plesk administrative interfaces.

This configuration is typical of infrastructure designed for speedy deployment and rotation of phishing campaigns.

Infrastructure evaluation confirmed that the IP is related to a number of different phishing makes an attempt, indicating a sample of organized assault exercise.

The uncovered Plesk management panels permit attackers to shortly deploy new phishing pages, handle compromised e mail accounts, and rotate infrastructure to evade detection.

Organizations should implement layered safety measures that reach past customary e mail authentication protocols to guard in opposition to evolving threats.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Attack, Hackers, HubSpot, Phishing, Targeted, Targeting, Users

Post navigation

Previous Post: US Shuts Down Crypto Exchange E-Note, Charges Russian Administrator
Next Post: Docker Makes 1,000 Hardened Images Free and Open Source

Related Posts

RONINGLOADER Weaponized Weaponizes Signed Drivers to Disable Defender and Evade EDR Tools Cyber Security News
Detego Global Launches Case Management Platform for Digital Forensics and Incident Response Teams Cyber Security News
Greedy Sponge Hackers Attacking Financial Institutions With Modified Version of AllaKore RAT Cyber Security News
Ransomware Gangs Actively Expanding to Attack VMware and Linux Systems Cyber Security News
Empire 6.3.0 Launches With New Features for Red Teams and Penetration Testers Cyber Security News
Multi-Staged ValleyRAT Uses WeChat and DingTalk to Attack Windows Users Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • In Other News: Docker AI Attack, Google Sues Chinese Cybercriminals, Coupang Hacked by Employee
  • Cracked Software and YouTube Videos Spread CountLoader and GachiLoader Malware
  • Cloud Atlas Hacker Group Exploiting Office Vulnerabilities to Execute Malicious Code
  • Denmark Blames Russia for Cyberattacks Ahead of Elections and on Water Utility
  • Iranian Nation-State APT Targeting Networks and Critical Infrastructure Organizations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • In Other News: Docker AI Attack, Google Sues Chinese Cybercriminals, Coupang Hacked by Employee
  • Cracked Software and YouTube Videos Spread CountLoader and GachiLoader Malware
  • Cloud Atlas Hacker Group Exploiting Office Vulnerabilities to Execute Malicious Code
  • Denmark Blames Russia for Cyberattacks Ahead of Elections and on Water Utility
  • Iranian Nation-State APT Targeting Networks and Critical Infrastructure Organizations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark