Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Phishing Attack Uses Basic Auth URLs to Trick Users and Steal Login Credentials

Posted on October 16, 2025October 16, 2025 By CWS

Early October 2025 witnessed the resurgence of a retro phishing approach that exploits legacy Fundamental Authentication URLs to deceive customers into divulging delicate credentials.

Menace actors crafted hyperlinks within the format https://username:[email protected], embedding a trusted establishment’s area within the username discipline to visually mimic professional providers.

When customers click on these hyperlinks, their browsers authenticate to the malicious area specified after the @ image, silently harvesting the credentials meant for the cast website.

This tactic is especially efficient in cell apps and e mail purchasers that truncate lengthy URLs, exhibiting solely the misleading portion earlier than the @ image.

Netcraft analysts famous the primary wave of those assaults focusing on GMO Aozora Financial institution prospects in Japan, the place the attackers registered URLs akin to hxxps://gmo-aozora.com%[email protected]/sKgdiq.

Victims encountering these hyperlinks in phishing emails had been prompted to finish a Japanese-language CAPTCHA web page designed to simulate a professional safety verify.

CAPTCHA web page captured earlier than URLs turned inactive (Supply – Netcraft)

Regardless of trendy browsers supporting Fundamental Auth URLs, this format has fallen out of favor as a result of safety issues, making it an surprising vector that evades informal URL scrutiny.

Following the preliminary discovery, Netcraft researchers recognized greater than 200 distinctive Fundamental Auth phishing URLs in a two-week interval.

Assaults impersonated main manufacturers together with Amazon, Google, and Netflix, usually cloaking malicious domains behind acquainted names.

One instance spoofed Netflix, luring recipients into clicking a hyperlink that appeared professional however directed them to a credential-stealing script hosted on themiran.web.

The coordinated use of a number of malicious domains and encoded tokens strengthened the phantasm of professional authentication flows.

Past easy credential harvesting, these phishing hyperlinks additionally applied human verification CAPTCHAs to delay automated takedown efforts and to strengthen belief amongst victims.

The CAPTCHA web page emulated a safety checkpoint, requiring customers to click on “I’m not a robotic” earlier than continuing to a counterfeit login kind. This further step each elevated the perceived legitimacy of the web page and gave attackers extra time to seize credentials.

An infection Mechanism and Credential Exfiltration

Upon clicking a compromised Fundamental Auth URL, the sufferer’s browser points an HTTP GET request with the credentials discipline set to the trusted area textual content.

For instance:-

GET /sKgdiq HTTP/1.1
Host: coylums.com
Authorization: Fundamental Z21vLWFvem9yYS5jb206

Right here, Z21vLWFvem9ycmEuY29tOg== is the Base64-encoded illustration of the string gmo-aozora.com:. The server decodes this header to verify the presence of the embedded “username,” then serves the phishing web page that mimics the financial institution’s login interface.

Submitted credentials are despatched through a POST request to the attacker’s backend endpoint, the place they’re collected for later misuse.

This mechanism bypasses typical URL filters that concentrate on question strings quite than embedded authentication tokens.

By reviving this outdated HTTP characteristic, attackers have demonstrated how legacy requirements might be repurposed for contemporary phishing campaigns.

Monetary establishments and safety groups ought to replace URL inspection guidelines to detect and block Fundamental Authentication tokens in hyperlinks and educate customers concerning the risks of unbeknownst embedded credentials.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attack, Auth, Basic, Credentials, Login, Phishing, Steal, Trick, URLs, Users

Post navigation

Previous Post: AISLE Emerges From Stealth With AI-Based Reasoning System That Remediates Vulnerabilities on the Fly
Next Post: Senate Investigates Cisco Over Zero-Day Firewall Vulnerabilities

Related Posts

Threat Actors Embed Malicious RMM Tools to Gain Silent Initial Access to Organizations Cyber Security News
New Inboxfuscation Tool That Bypasses Microsoft Exchange Inbox Rules and Evade Detection Cyber Security News
RapperBot Botnet Attack Peaks 50,000+ Attacks Targeting Network Edge Devices Cyber Security News
UNC5518 Group Hacks Legitimate Websites to Inject Fake Captcha That Tricks Users to Execute Malware Cyber Security News
48M Gmail, 6.5M Instagram Exposed Online From Unprotected Database Cyber Security News
Microsoft Teams New Meeting Join Bar Reminds You to Join Meeting On-time Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Moltbook AI Vulnerability Exposes Email Addresses, Login Tokens, and API Keys
  • eScan Antivirus Delivers Malware in Supply Chain Attack
  • Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists
  • Automated Penetration Testing Toolkit Designed for Linux systems
  • SCADA Vulnerability Triggers DoS, Potentially Disrupting Industrial Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Moltbook AI Vulnerability Exposes Email Addresses, Login Tokens, and API Keys
  • eScan Antivirus Delivers Malware in Supply Chain Attack
  • Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists
  • Automated Penetration Testing Toolkit Designed for Linux systems
  • SCADA Vulnerability Triggers DoS, Potentially Disrupting Industrial Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark