Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Targeting HubSpot Users in Targeted Phishing Attack

Posted on December 19, 2025December 19, 2025 By CWS

An lively phishing marketing campaign is at the moment concentrating on HubSpot customers by a complicated mixture of social engineering and infrastructure compromise.

The assault leverages enterprise e mail compromise techniques, paired with web site hijacking, to ship credential-stealing malware to unsuspecting advertising professionals and enterprise groups that depend on the platform.

The marketing campaign begins with fastidiously crafted phishing emails that seem to return from reliable enterprise accounts.

These messages urge recipients to log into their HubSpot accounts to assessment advertising campaigns, citing an uncommon spike in unsubscribes as the explanation for quick motion.

The emails use MailChimp, a trusted e mail advertising platform, to distribute the assault at scale, making certain messages move by safe e mail gateways due to the platform’s popularity.

Evalian researchers famous that phishing emails use a misleading method: embedding malicious URLs within the sender’s show identify quite than within the e mail physique.

This strategy efficiently bypasses many e mail safety controls, which generally scan message content material however overlook the sender subject.

Phishing Electronic mail (Supply – Evalian)

Mixed with the compromised reliable enterprise area, the emails seem genuine to each automated programs and human readers.

As soon as victims click on the embedded URL, they’re redirected from a compromised web site to a convincing pretend HubSpot login portal hosted on Proton66 OOO infrastructure, a Russian bulletproof internet hosting supplier linked to ASN AS 198953.

When customers enter their credentials, the login data is transmitted to a login.php file and captured by attackers.

Malicious HubSpot Login Web page (Supply – Evalian)

The phishing e mail construction and the reproduction login web page are designed to reflect HubSpot’s reliable interface.

Internet hosting infrastructure

The an infection mechanism depends on harvesting legitimate person credentials quite than delivering conventional malware.

Evalian analysts recognized that the internet hosting infrastructure makes use of a Plesk-managed digital personal server with uncovered mail providers, together with Postfix and Dovecot.

The IP tackle 193.143.1.220 reveals an unusually broad vary of open ports, together with SMTP providers on ports 25 and 465, IMAP on ports 143 and 993, and a number of Plesk administrative interfaces.

This configuration is typical of infrastructure designed for speedy deployment and rotation of phishing campaigns.

Infrastructure evaluation confirmed that the IP is related to a number of different phishing makes an attempt, indicating a sample of organized assault exercise.

The uncovered Plesk management panels permit attackers to shortly deploy new phishing pages, handle compromised e mail accounts, and rotate infrastructure to evade detection.

Organizations should implement layered safety measures that reach past customary e mail authentication protocols to guard in opposition to evolving threats.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Attack, Hackers, HubSpot, Phishing, Targeted, Targeting, Users

Post navigation

Previous Post: US Shuts Down Crypto Exchange E-Note, Charges Russian Administrator
Next Post: Docker Makes 1,000 Hardened Images Free and Open Source

Related Posts

Linux Malware Authors Attacking Cloud Environments Using ELF Binaries Cyber Security News
Hackers Weaponize Active Directory Federation Services and office.com to Steal Microsoft 365 logins Cyber Security News
UK Sanctions Russian APT 28 Hackers for Attacking Microsoft Cloud Service Login Details Cyber Security News
Laundry Bear Infrastructure, Key Tactics and Procedures Uncovered Cyber Security News
Microsoft Desktop Windows Manager Out-Of-Bounds Vulnerability Let Attackers Escalate Privileges Cyber Security News
Hackers Allegedly Claim Breach of Mercedes-Benz USA Legal and Customer Data Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Denmark Blames Russia for Cyberattacks Ahead of Elections and on Water Utility
  • Scripted Sparrow Uses Automation to Generate and Send their Attack Messages
  • Docker Makes 1,000 Hardened Images Free and Open Source
  • Hackers Targeting HubSpot Users in Targeted Phishing Attack
  • US Shuts Down Crypto Exchange E-Note, Charges Russian Administrator

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Denmark Blames Russia for Cyberattacks Ahead of Elections and on Water Utility
  • Scripted Sparrow Uses Automation to Generate and Send their Attack Messages
  • Docker Makes 1,000 Hardened Images Free and Open Source
  • Hackers Targeting HubSpot Users in Targeted Phishing Attack
  • US Shuts Down Crypto Exchange E-Note, Charges Russian Administrator

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark