Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Phishing Attack Bypasses Using UUIDs Unique to Bypass Secure Email Gateways

Posted on October 25, 2025October 25, 2025 By CWS

A classy phishing marketing campaign leveraging randomly generated Common Distinctive Identifiers (UUIDs) has emerged, efficiently bypassing Safe E mail Gateways (SEGs) and evading perimeter defenses.

The assault employs a sophisticated JavaScript-based phishing script combining random area choice, dynamic UUID era, and server-driven web page alternative to steal credentials.

In contrast to typical phishing operations counting on static redirects, this marketing campaign demonstrates tactical precision.

The phishing script operates by embedding malicious code inside HTML attachments or spoofed file-sharing platforms reminiscent of Microsoft OneDrive, SharePoint On-line, DocuSign, and Adobe Acrobat Signal.

When victims work together with seemingly authentic paperwork, the script prompts and selects one .org area at random from 9 predefined addresses.

These domains seem bulk-generated with out recognizable phrase patterns, intentionally designed to evade blocklists and machine studying detection methods.

The script generates a dynamic UUID to trace particular person victims whereas using a hardcoded UUID as a marketing campaign identifier.

Cofense researchers recognized this uncommon tactic in early February 2025, noting its ongoing nature and class.

The twin UUID mechanism stands out as significantly unusual in phishing operations.

Phishing electronic mail utilizing Microsoft OneDrive – SharePoint On-line to ship the malicious URL (Supply – Cofense)

After area choice and UUID era, the script sends an HTTPS POST request to the chosen server’s API endpoint.

The server responds with dynamically generated content material tailor-made to the sufferer’s context, reminiscent of customized company login pages.

This method allows risk actors to exchange webpage content material with out altering URLs.

Dynamic Web page Substitute

Probably the most misleading side includes dynamic web page alternative functionality, manipulating browser classes to ship credential phishing pages with out conventional redirects.

Somewhat than utilizing window.location.href redirects altering seen URLs, this script employs DOM manipulation methods to exchange web page content material with server-provided HTML.

A faux Microsoft credential phishing web page rendered with out a redirect (Supply – Cofense)

The server-driven nature permits real-time customization primarily based on sufferer context. When customers enter electronic mail addresses, the script extracts domains and indicators backend infrastructure to generate corresponding branded login pages.

This personalization considerably will increase sufferer belief whereas decreasing suspicion. The seamless expertise maintained all through proves essential for profitable credential harvesting, demonstrating how trendy assaults have developed past easy electronic mail deception into refined browser-based manipulation.

Observe us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Attack, Bypass, Bypasses, Email, Gateways, Phishing, Secure, Unique, UUIDs

Post navigation

Previous Post: OpenAI ChatGPT Atlas Browser Jailbroken to Disguise Malicious Prompt as URLs
Next Post: North Korean Hackers Attacking Unmanned Aerial Vehicle Industry to Steal Confidential Data

Related Posts

Hackers Weaponize Active Directory Federation Services and office.com to Steal Microsoft 365 logins Cyber Security News
Apple 0-day, Chrome, Copilot Vulnerabilities and Cyber Attacks Cyber Security News
Hackers Actively Exploiting CitrixBleed 2 Vulnerability in the Wild Cyber Security News
12 Best Infrastructure Monitoring Tools in 2025 Cyber Security News
Police Body Camera Apps Sending Data to Cloud Servers Hosted in China Via TLS Port 9091 Cyber Security News
How Microsoft Azure Storage Logs Aid Forensics Following a Security Breach Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • North Korean Hackers Attacking Unmanned Aerial Vehicle Industry to Steal Confidential Data
  • New Phishing Attack Bypasses Using UUIDs Unique to Bypass Secure Email Gateways
  • OpenAI ChatGPT Atlas Browser Jailbroken to Disguise Malicious Prompt as URLs
  • Malicious NuGet Packages Mimic as Popular Nethereum Project to Steal Wallet Keys
  • Microsoft Teams to Auto-Set Work Location by Detecting the Wi-Fi Network

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • North Korean Hackers Attacking Unmanned Aerial Vehicle Industry to Steal Confidential Data
  • New Phishing Attack Bypasses Using UUIDs Unique to Bypass Secure Email Gateways
  • OpenAI ChatGPT Atlas Browser Jailbroken to Disguise Malicious Prompt as URLs
  • Malicious NuGet Packages Mimic as Popular Nethereum Project to Steal Wallet Keys
  • Microsoft Teams to Auto-Set Work Location by Detecting the Wi-Fi Network

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News