Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Weaponized DMV-Themed Phishing Attacking U.S. Citizens to Harvest Personal and Financial Data

Posted on June 24, 2025June 24, 2025 By CWS

A classy phishing marketing campaign emerged in Might 2025, concentrating on U.S. residents via a coordinated impersonation of state Division of Motor Autos (DMV) businesses.

This massive-scale operation utilized SMS phishing strategies mixed with misleading net infrastructure to reap private and monetary data from unsuspecting victims throughout a number of states.

The attackers employed alarming messages about unpaid toll violations, directing recipients to fraudulent DMV web sites that prompted quick cost of nominal fines to resolve fictitious authorized points.

The marketing campaign’s main assault vector concerned SMS messages despatched from spoofed telephone numbers, many traced to origins within the Philippines, with senders leveraging refined spoofing strategies to reinforce legitimacy.

Spoofed SMS (Supply – Verify Level)

Victims acquired threatening messages citing fabricated authorized codes reminiscent of “[State-Name] Administrative Code 15C-16.003” and warnings of license suspension or authorized penalties if quick motion was not taken.

These messages directed customers to click on malicious hyperlinks resulting in state-themed phishing web sites designed to gather in depth private data and bank card credentials beneath the guise of identification verification.

Phishing Web site (Supply – Verify Level)

Verify Level researchers famous that the marketing campaign demonstrated exceptional technical sophistication and scale, with the FBI’s Web Crime Grievance Middle receiving over 2,000 associated complaints inside a single month.

The operation’s widespread influence prompted official alerts from a number of states together with New York, New Jersey, Pennsylvania, Florida, Texas, and California, whereas nationwide media retailers together with CBS Information, Fox Information, The New York Put up, and Time Journal offered in depth protection to boost public consciousness.

Infrastructure Evaluation and Attribution

Technical evaluation revealed a extremely structured phishing operation using shared infrastructure and constant patterns throughout all malicious domains.

Registered phishing domains (Supply – Verify Level)

The attackers employed a predictable area construction following the sample https://[state_ID]dmv.gov-[4-letter-string].cfd/pay, with most domains hosted on the malicious IP tackle 49.51.75.162.

Evaluation uncovered six HTML information mapped to totally different states, every with distinctive hash signatures together with Pennsylvania (5c7b246ec5b654c6ba0c86c89ba5cbaa61d68536efc32) and California (5df0fcc2b6b3d3e52fb635c0b7bac41d27b5b75cbfeb1).

Cloned DMV pages used predictable TLDs (Supply – Verify Level)

The marketing campaign utilized uniform DNS infrastructure with all domains pointing to alidns.com and dns8.alidns.com identify servers, whereas the SOA contact tackle persistently confirmed [email protected].

DOM evaluation revealed every phishing web site contained an identical static belongings together with JavaScript information (C18UmYZN.js, fliceXIj.js), CSS information (C0Zfn5GX.css), and picture belongings (BHcjXi3x.gif, BkBiYrmZ.svg).

The reuse of those belongings throughout domains strongly indicated using a centralized phishing package often called “Lighthouse,” beforehand utilized in opposition to U.S. DMVs, with Chinese language-language feedback in supply code reinforcing attribution to a China-based risk actor.

Are you from SOC/DFIR Groups! – Work together with malware within the sandbox and discover associated IOCs. – Request 14-day free tria

Cyber Security News Tags:Attacking, Citizens, Data, DMVThemed, Financial, Harvest, Personal, Phishing, U.S, Weaponized

Post navigation

Previous Post: The CTEM Conversation We All Need
Next Post: OPPO Clone Phone Weak WiFi Hotspot Exposes Sensitive Data

Related Posts

Weaponized Google Calendar Invites Delivers Malicious Payload With Just One Character Cyber Security News
Tycoon2FA Infra Used by Dadsec Hacker Group to Steal Office365 Credentials Cyber Security News
Predator Mobile Spyware Remains Consistent with New Design Changes to Evade Detection Cyber Security News
New Phishing Attack Abusing Blob URLs to Bypass SEGs and Evade Analysis Cyber Security News
Detecting Lateral Movement in Windows-Based Network Infrastructures Cyber Security News
New Report Uncover That Chinese Hackers Attempted To Compromise SentinelOne’s Own Servers Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Disable Unused Network Ports
  • New U.S. Visa Rule Requires Applicants to Set Social Media Account Privacy to Public
  • New FileFix Attack Abuses Windows File Explorer to Execute Malicious Commands
  • Gonjeshke Darande Threat Actors Pose as Hacktivist Infiltrated Iranian Crypto Exchange
  • 2,000+ Devices Hacked Using Weaponized Social Security Statement Themes

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • How to Disable Unused Network Ports
  • New U.S. Visa Rule Requires Applicants to Set Social Media Account Privacy to Public
  • New FileFix Attack Abuses Windows File Explorer to Execute Malicious Commands
  • Gonjeshke Darande Threat Actors Pose as Hacktivist Infiltrated Iranian Crypto Exchange
  • 2,000+ Devices Hacked Using Weaponized Social Security Statement Themes

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News