Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Exploit Trusted Platforms to Target Philippine Bank Users

Hackers Exploit Trusted Platforms to Target Philippine Bank Users

Posted on April 3, 2026 By CWS

A phishing campaign has been targeting banking customers across the Philippines since early 2024, continuing its operations well into 2026. This sophisticated effort exploits trusted online platforms to harvest banking credentials and one-time passwords, leading to rapid unauthorized withdrawals from victims’ accounts.

Techniques Used by Cybercriminals

Unlike traditional phishing attempts, the attackers in this campaign leverage legitimate-looking emails to deceive users. These emails appear to originate from trusted sources, alerting recipients to purported unauthorized transactions or suspicious logins. The messages contain links that direct users to enter their banking details, a tactic designed to mimic legitimate banking communications.

Research conducted by Group-IB CERT has identified this operation under the threat actor label PHISLES. The investigation reveals that since its inception in January 2024, over 900 malicious links have been distributed, impersonating three major Philippine banks and affecting over 400 individuals.

Exploiting Trusted Platforms for Delivery

In 2025, the campaign evolved to use trusted platforms as intermediaries in their phishing process. By routing victims through these platforms before reaching the fake banking page, attackers effectively bypassed Secure Email Gateways. This tactic made phishing emails appear more credible, increasing the likelihood of them being opened by recipients.

Specifically, platforms like Google Business Profile links and Google’s AMP CDN were abused to lend credibility to the phishing URLs. Additionally, URL shorteners and Cloudflare-managed domains facilitated the obfuscation of the true destination of these links, making them appear innocuous to both users and security systems.

Impact and Recommendations

The campaign’s persistence is partly due to the use of compromised email accounts sourced from combolists available on dark web forums. These accounts lend authenticity to phishing emails, allowing them to evade detection by spam filters. Furthermore, attackers have hijacked domains of legitimate institutions, creating subdomains to further their phishing efforts without disrupting normal operations.

To protect themselves, banking customers should exercise caution with urgent emails, verify URLs before entering credentials, and regularly update passwords. Financial institutions are urged to alert customers about ongoing scams and implement measures to detect unauthorized access. Educational institutions should enforce multi-factor authentication and audit DNS records to prevent domain misuse.

By staying informed and vigilant, both individuals and organizations can mitigate the risks posed by such sophisticated phishing campaigns.

Cyber Security News Tags:banking fraud, cloud platforms, Cybersecurity, email security, financial scams, multi-factor authentication, online security, Philippines, Phishing, trusted platforms

Post navigation

Previous Post: China-Linked TA416 Intensifies Cyber Attacks on Europe
Next Post: Anthropic Ends Third-Party Tool Access for Claude

Related Posts

Top 10 Best Data Removal Services In 2026 Top 10 Best Data Removal Services In 2026 Cyber Security News
FortiWeb SQL Injection Vulnerability Allows Attacker to Execute Malicious SQL Code FortiWeb SQL Injection Vulnerability Allows Attacker to Execute Malicious SQL Code Cyber Security News
Android Zero-Click Flaw Allows Remote Access Android Zero-Click Flaw Allows Remote Access Cyber Security News
Laundry Bear Infrastructure, Key Tactics and Procedures Uncovered Laundry Bear Infrastructure, Key Tactics and Procedures Uncovered Cyber Security News
UAT-8099 Targets Vulnerable IIS Servers Using Web Shells, PowerShell, and Region-Customized BadIIS UAT-8099 Targets Vulnerable IIS Servers Using Web Shells, PowerShell, and Region-Customized BadIIS Cyber Security News
Windows Vulnerability Exploited by Russian Group Windows Vulnerability Exploited by Russian Group Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • AI Model Uncovers 10,000 Critical Software Flaws
  • Critical Nginx Vulnerability Demands Immediate Patching
  • New Vulnerability ‘Underminr’ Masks Malicious Networks
  • Compromised Laravel-Lang Packages Spread Credential Stealer
  • F5 BIG-IP Exploit Enables Network Intrusion via SSH

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • AI Model Uncovers 10,000 Critical Software Flaws
  • Critical Nginx Vulnerability Demands Immediate Patching
  • New Vulnerability ‘Underminr’ Masks Malicious Networks
  • Compromised Laravel-Lang Packages Spread Credential Stealer
  • F5 BIG-IP Exploit Enables Network Intrusion via SSH

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark