Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Weaponized DMV-Themed Phishing Attacking U.S. Citizens to Harvest Personal and Financial Data

Posted on June 24, 2025June 24, 2025 By CWS

A classy phishing marketing campaign emerged in Might 2025, concentrating on U.S. residents via a coordinated impersonation of state Division of Motor Autos (DMV) businesses.

This massive-scale operation utilized SMS phishing strategies mixed with misleading net infrastructure to reap private and monetary data from unsuspecting victims throughout a number of states.

The attackers employed alarming messages about unpaid toll violations, directing recipients to fraudulent DMV web sites that prompted quick cost of nominal fines to resolve fictitious authorized points.

The marketing campaign’s main assault vector concerned SMS messages despatched from spoofed telephone numbers, many traced to origins within the Philippines, with senders leveraging refined spoofing strategies to reinforce legitimacy.

Spoofed SMS (Supply – Verify Level)

Victims acquired threatening messages citing fabricated authorized codes reminiscent of “[State-Name] Administrative Code 15C-16.003” and warnings of license suspension or authorized penalties if quick motion was not taken.

These messages directed customers to click on malicious hyperlinks resulting in state-themed phishing web sites designed to gather in depth private data and bank card credentials beneath the guise of identification verification.

Phishing Web site (Supply – Verify Level)

Verify Level researchers famous that the marketing campaign demonstrated exceptional technical sophistication and scale, with the FBI’s Web Crime Grievance Middle receiving over 2,000 associated complaints inside a single month.

The operation’s widespread influence prompted official alerts from a number of states together with New York, New Jersey, Pennsylvania, Florida, Texas, and California, whereas nationwide media retailers together with CBS Information, Fox Information, The New York Put up, and Time Journal offered in depth protection to boost public consciousness.

Infrastructure Evaluation and Attribution

Technical evaluation revealed a extremely structured phishing operation using shared infrastructure and constant patterns throughout all malicious domains.

Registered phishing domains (Supply – Verify Level)

The attackers employed a predictable area construction following the sample https://[state_ID]dmv.gov-[4-letter-string].cfd/pay, with most domains hosted on the malicious IP tackle 49.51.75.162.

Evaluation uncovered six HTML information mapped to totally different states, every with distinctive hash signatures together with Pennsylvania (5c7b246ec5b654c6ba0c86c89ba5cbaa61d68536efc32) and California (5df0fcc2b6b3d3e52fb635c0b7bac41d27b5b75cbfeb1).

Cloned DMV pages used predictable TLDs (Supply – Verify Level)

The marketing campaign utilized uniform DNS infrastructure with all domains pointing to alidns.com and dns8.alidns.com identify servers, whereas the SOA contact tackle persistently confirmed [email protected].

DOM evaluation revealed every phishing web site contained an identical static belongings together with JavaScript information (C18UmYZN.js, fliceXIj.js), CSS information (C0Zfn5GX.css), and picture belongings (BHcjXi3x.gif, BkBiYrmZ.svg).

The reuse of those belongings throughout domains strongly indicated using a centralized phishing package often called “Lighthouse,” beforehand utilized in opposition to U.S. DMVs, with Chinese language-language feedback in supply code reinforcing attribution to a China-based risk actor.

Are you from SOC/DFIR Groups! – Work together with malware within the sandbox and discover associated IOCs. – Request 14-day free tria

Cyber Security News Tags:Attacking, Citizens, Data, DMVThemed, Financial, Harvest, Personal, Phishing, U.S, Weaponized

Post navigation

Previous Post: The CTEM Conversation We All Need
Next Post: OPPO Clone Phone Weak WiFi Hotspot Exposes Sensitive Data

Related Posts

Adversarial Machine Learning – Securing AI Models Cyber Security News
How to Conduct a Secure Code Review Cyber Security News
From SOC to SOAR Automating Security Operations Cyber Security News
New Eleven11bot Hacked 86,000 IP Cameras for Massive DDoS Attack Cyber Security News
Prioritizing Vulnerabilities in a Sea of Alerts Cyber Security News
DPRK’s Largest Cryptocurrency Heist via a Compromised macOS Developer and AWS Pivots Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • North Korea-linked Supply Chain Attack Targets Developers with 35 Malicious npm Packages
  • Russian APT Hits Ukrainian Government With New Malware via Signal
  • Microsoft Extends Windows 10 Security Updates for One Year with New Enrollment Options
  • How to Disable Unused Network Ports
  • New U.S. Visa Rule Requires Applicants to Set Social Media Account Privacy to Public

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • North Korea-linked Supply Chain Attack Targets Developers with 35 Malicious npm Packages
  • Russian APT Hits Ukrainian Government With New Malware via Signal
  • Microsoft Extends Windows 10 Security Updates for One Year with New Enrollment Options
  • How to Disable Unused Network Ports
  • New U.S. Visa Rule Requires Applicants to Set Social Media Account Privacy to Public

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News