Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Phishing Attack Uses Basic Auth URLs to Trick Users and Steal Login Credentials

Posted on October 16, 2025October 16, 2025 By CWS

Early October 2025 witnessed the resurgence of a retro phishing approach that exploits legacy Fundamental Authentication URLs to deceive customers into divulging delicate credentials.

Menace actors crafted hyperlinks within the format https://username:[email protected], embedding a trusted establishment’s area within the username discipline to visually mimic professional providers.

When customers click on these hyperlinks, their browsers authenticate to the malicious area specified after the @ image, silently harvesting the credentials meant for the cast website.

This tactic is especially efficient in cell apps and e mail purchasers that truncate lengthy URLs, exhibiting solely the misleading portion earlier than the @ image.

Netcraft analysts famous the primary wave of those assaults focusing on GMO Aozora Financial institution prospects in Japan, the place the attackers registered URLs akin to hxxps://gmo-aozora.com%[email protected]/sKgdiq.

Victims encountering these hyperlinks in phishing emails had been prompted to finish a Japanese-language CAPTCHA web page designed to simulate a professional safety verify.

CAPTCHA web page captured earlier than URLs turned inactive (Supply – Netcraft)

Regardless of trendy browsers supporting Fundamental Auth URLs, this format has fallen out of favor as a result of safety issues, making it an surprising vector that evades informal URL scrutiny.

Following the preliminary discovery, Netcraft researchers recognized greater than 200 distinctive Fundamental Auth phishing URLs in a two-week interval.

Assaults impersonated main manufacturers together with Amazon, Google, and Netflix, usually cloaking malicious domains behind acquainted names.

One instance spoofed Netflix, luring recipients into clicking a hyperlink that appeared professional however directed them to a credential-stealing script hosted on themiran.web.

The coordinated use of a number of malicious domains and encoded tokens strengthened the phantasm of professional authentication flows.

Past easy credential harvesting, these phishing hyperlinks additionally applied human verification CAPTCHAs to delay automated takedown efforts and to strengthen belief amongst victims.

The CAPTCHA web page emulated a safety checkpoint, requiring customers to click on “I’m not a robotic” earlier than continuing to a counterfeit login kind. This further step each elevated the perceived legitimacy of the web page and gave attackers extra time to seize credentials.

An infection Mechanism and Credential Exfiltration

Upon clicking a compromised Fundamental Auth URL, the sufferer’s browser points an HTTP GET request with the credentials discipline set to the trusted area textual content.

For instance:-

GET /sKgdiq HTTP/1.1
Host: coylums.com
Authorization: Fundamental Z21vLWFvem9yYS5jb206

Right here, Z21vLWFvem9ycmEuY29tOg== is the Base64-encoded illustration of the string gmo-aozora.com:. The server decodes this header to verify the presence of the embedded “username,” then serves the phishing web page that mimics the financial institution’s login interface.

Submitted credentials are despatched through a POST request to the attacker’s backend endpoint, the place they’re collected for later misuse.

This mechanism bypasses typical URL filters that concentrate on question strings quite than embedded authentication tokens.

By reviving this outdated HTTP characteristic, attackers have demonstrated how legacy requirements might be repurposed for contemporary phishing campaigns.

Monetary establishments and safety groups ought to replace URL inspection guidelines to detect and block Fundamental Authentication tokens in hyperlinks and educate customers concerning the risks of unbeknownst embedded credentials.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attack, Auth, Basic, Credentials, Login, Phishing, Steal, Trick, URLs, Users

Post navigation

Previous Post: AISLE Emerges From Stealth With AI-Based Reasoning System That Remediates Vulnerabilities on the Fly
Next Post: Senate Investigates Cisco Over Zero-Day Firewall Vulnerabilities

Related Posts

DragonForce Ransomware Group – The Rise of a Relentless Cyber Threat in 2025 Cyber Security News
BMC Firmware Vulnerabilities Allow Attackers to Bypass Signature Verification Features Cyber Security News
LANSCOPE Endpoint Manager Vulnerability Let Attackers Execute Remote Code Cyber Security News
Hackers Actively Scanning to Exploit Palo Alto Networks PAN-OS Global Protect Vulnerability Cyber Security News
Muddled Libra Actors Attacking Organizations Call Centers for Initial Infiltration Cyber Security News
Beware of Phishing Email from Kimusky Hackers With Subject Spetember Tax Return Due Date Notice Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • CISA Warns of Hackers Actively Exploiting Windows Server Update Services RCE Vulnerability in the Wild
  • New Malware Attack Using Variable Functions and Cookies to Evade and Hide Their Malicious Scripts
  • Threat Actors Tricks Target Users Via Impersonation and Fictional Financial Aid Offers
  • TransparentTribe Attack Linux-Based Systems of Indian Military Organizations to Deliver DeskRAT
  • Jingle Thief Attackers Exploiting Festive Season with Weaponized Gift Card Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • CISA Warns of Hackers Actively Exploiting Windows Server Update Services RCE Vulnerability in the Wild
  • New Malware Attack Using Variable Functions and Cookies to Evade and Hide Their Malicious Scripts
  • Threat Actors Tricks Target Users Via Impersonation and Fictional Financial Aid Offers
  • TransparentTribe Attack Linux-Based Systems of Indian Military Organizations to Deliver DeskRAT
  • Jingle Thief Attackers Exploiting Festive Season with Weaponized Gift Card Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News