Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Targeting HubSpot Users in Targeted Phishing Attack

Hackers Targeting HubSpot Users in Targeted Phishing Attack

Posted on December 19, 2025December 19, 2025 By CWS

An lively phishing marketing campaign is at the moment concentrating on HubSpot customers by a complicated mixture of social engineering and infrastructure compromise.

The assault leverages enterprise e mail compromise techniques, paired with web site hijacking, to ship credential-stealing malware to unsuspecting advertising professionals and enterprise groups that depend on the platform.

The marketing campaign begins with fastidiously crafted phishing emails that seem to return from reliable enterprise accounts.

These messages urge recipients to log into their HubSpot accounts to assessment advertising campaigns, citing an uncommon spike in unsubscribes as the explanation for quick motion.

The emails use MailChimp, a trusted e mail advertising platform, to distribute the assault at scale, making certain messages move by safe e mail gateways due to the platform’s popularity.

Evalian researchers famous that phishing emails use a misleading method: embedding malicious URLs within the sender’s show identify quite than within the e mail physique.

This strategy efficiently bypasses many e mail safety controls, which generally scan message content material however overlook the sender subject.

Phishing Electronic mail (Supply – Evalian)

Mixed with the compromised reliable enterprise area, the emails seem genuine to each automated programs and human readers.

As soon as victims click on the embedded URL, they’re redirected from a compromised web site to a convincing pretend HubSpot login portal hosted on Proton66 OOO infrastructure, a Russian bulletproof internet hosting supplier linked to ASN AS 198953.

When customers enter their credentials, the login data is transmitted to a login.php file and captured by attackers.

Malicious HubSpot Login Web page (Supply – Evalian)

The phishing e mail construction and the reproduction login web page are designed to reflect HubSpot’s reliable interface.

Internet hosting infrastructure

The an infection mechanism depends on harvesting legitimate person credentials quite than delivering conventional malware.

Evalian analysts recognized that the internet hosting infrastructure makes use of a Plesk-managed digital personal server with uncovered mail providers, together with Postfix and Dovecot.

The IP tackle 193.143.1.220 reveals an unusually broad vary of open ports, together with SMTP providers on ports 25 and 465, IMAP on ports 143 and 993, and a number of Plesk administrative interfaces.

This configuration is typical of infrastructure designed for speedy deployment and rotation of phishing campaigns.

Infrastructure evaluation confirmed that the IP is related to a number of different phishing makes an attempt, indicating a sample of organized assault exercise.

The uncovered Plesk management panels permit attackers to shortly deploy new phishing pages, handle compromised e mail accounts, and rotate infrastructure to evade detection.

Organizations should implement layered safety measures that reach past customary e mail authentication protocols to guard in opposition to evolving threats.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Attack, Hackers, HubSpot, Phishing, Targeted, Targeting, Users

Post navigation

Previous Post: US Shuts Down Crypto Exchange E-Note, Charges Russian Administrator
Next Post: Docker Makes 1,000 Hardened Images Free and Open Source

Related Posts

Critical DNN Platform Vulnerability Let Attackers Execute Malicious Scripts Critical DNN Platform Vulnerability Let Attackers Execute Malicious Scripts Cyber Security News
Researchers Gained Access to Hacker Domain Server Using Name Server Delegation Researchers Gained Access to Hacker Domain Server Using Name Server Delegation Cyber Security News
Pure Crypter Employs Multiple Evasion Techniques To Bypass Windows 11 24H2 Security Features Pure Crypter Employs Multiple Evasion Techniques To Bypass Windows 11 24H2 Security Features Cyber Security News
India’s New SIM-Binding Rule for WhatsApp, Signal, Telegram, and Other Messaging Platforms India’s New SIM-Binding Rule for WhatsApp, Signal, Telegram, and Other Messaging Platforms Cyber Security News
Windows Cloud Files Mini Filter Driver Vulnerability Exploited to Escalate Privileges Windows Cloud Files Mini Filter Driver Vulnerability Exploited to Escalate Privileges Cyber Security News
New Ghost Calls Attack Abuses Web Conferencing for Covert Command & Control New Ghost Calls Attack Abuses Web Conferencing for Covert Command & Control Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users
  • DynoWiper Data-Wiping Malware Attacking Energy Companies to Destroy Data
  • 30 Wind and Solar Farms in Poland Faced Coordinated Cyberattacks
  • OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link
  • Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users
  • DynoWiper Data-Wiping Malware Attacking Energy Companies to Destroy Data
  • 30 Wind and Solar Farms in Poland Faced Coordinated Cyberattacks
  • OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link
  • Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark