Skip to content

freedatacenter/threat-intelligence

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

15 Commits
 
 
 
 

Repository files navigation

Threat Intelligence Reports

Public threat intelligence reports and indicators of compromise (IOCs) from real-world incident investigations.

Reports

2026-04-04 — Instagram Credential Phishing via Compromised Telegram Accounts

A cross-platform phishing campaign targeting Ukrainian-speaking users was identified. Attackers compromise Telegram accounts and mass-message all contacts with a "vote for a child in a drawing contest" lure. The link leads to a reverse-proxied Instagram login page hosted on bulletproof infrastructure. The server proxies the real Instagram login, loading resources from static.cdninstagram.com, while intercepting submitted credentials server-side. The phishing kit supports full 2FA flow and uses Cloudflare Turnstile as an anti-bot gate.

Key findings:

  • Cross-platform attack: Telegram as delivery channel, Instagram credentials as the target
  • Reverse proxy phishing: real Instagram login page proxied through nginx, POST to /accounts/login/ajax/ intercepted server-side
  • Full 2FA interception support (PolarisLoginActionGoToTwoFactorLogin modules)
  • Wildcard DNS: any subdomain of va-kt[.]bayern resolves to the phishing server
  • Only /ua/ and /uk/ routes active (Ukrainian audience targeting); all other prefixes return empty stubs
  • Numeric path ID (1–1000+) used as victim/campaign tracking parameter
  • Hosted on AS214351 (FEMO IT SOLUTIONS LIMITED) — Censys-classified BULLETPROOF hosting with 514 domains
  • Same ASN hosts phishing domains impersonating BlaBlaCar, Stripe, Mercado Pago, Wise, SoFi, and others

Documents:

IOCs:

Type Value
Domain va-kt[.]bayern (wildcard DNS)
Domain friend[.]va-kt[.]bayern
URL hxxp://friend[.]va-kt[.]bayern/ua/6
IP 62[.]60[.]226[.]50 (AS214351, Frankfurt DE)
ASN AS214351 (FEMO IT SOLUTIONS LIMITED)
SSH HASSH 41ff3ecd1458b0bf86e1b4891636213e

MITRE ATT&CK: T1586.002, T1566.002, T1598.003, T1036.005, T1583.001, T1583.003, T1557


2026-03-31 — Mass Credential Phishing Campaign Impersonating Google Workspace

A large-scale credential phishing operation was identified targeting organizations across five countries. Phishing emails impersonate Google Workspace storage notifications and are delivered via a compromised Amazon SES account, spoofing a corporate domain with DMARC p=NONE. The phishing link traverses four redirect levels — Sophos Email Protection, bit.ly, Google redirect, and a compromised Brazilian website — before reaching a credential harvesting page disguised as a Cloudflare protection check. The page extracts the victim's email from the URL fragment (base64-encoded) and redirects to a C2 server running a Laravel application on a VDSina VPS in the Netherlands.

Key findings:

  • Four-level redirect chain abusing legitimate services (Sophos, Google, bit.ly) to evade URL filtering
  • Phishing kit with anti-analysis: blocks DevTools, right-click, keyboard shortcuts; emergency redirect on detection
  • C2 infrastructure: 62 DGA-like .ru domains on a single IP (89[.]124[.]98[.]199), all using DNSPod (Tencent Cloud) nameservers
  • Three parallel campaigns (gbe, sey, 5ppp) with a single MongoDB-based campaign panel active since August 2025
  • Victims span NGOs, financial services, government (Ministry of Trade Malaysia), IT outsourcing, and healthcare
  • Laravel backend with Cloudflare reverse proxy, but origin IP exposed through direct DNS resolution
  • Compromised Amazon SES account (eu-west-1) with unique Feedback-ID fingerprint for detection

Documents:

IOCs:

Type Value
C2 Domain crooveazoo[.]ru
C2 IP 89[.]124[.]98[.]199 (AS216071, VDSina NL)
C2 Path /HeJK!UMT/$
Phishing Host lasys[.]com[.]br (compromised, 69[.]6[.]213[.]189)
Phishing Paths /teste/gbe/ccc/, /teste/sey/ccc/, /teste/5ppp/ccc/
Sender Domain ejm[.]org (spoofed, DMARC p=NONE)
SES IP 54[.]240[.]4[.]15 (Amazon SES eu-west-1)
bit.ly bit[.]ly/4rVLObb, bit[.]ly/41muSA5, bit[.]ly/4bGmwcs
SSH Host Key 23c5cfe5298cc99c7f7a02e236d6cc9c4fc22e8f85c0d064f45a93c8b92b30b0
Reserve Domains 61 additional .ru DGA domains on same IP (full list in report)

MITRE ATT&CK: T1566.002, T1583.001, T1583.006, T1584.004, T1078, T1608.005, T1027, T1497.001


2026-03-27 — ClickFix Social Engineering Campaign Delivering Vidar Stealer via Fake Cloudflare CAPTCHA

A social engineering attack using the "ClickFix" technique was observed targeting users through a compromised Hebrew language school website (oulpansheli[.]org). The page displayed a fake Cloudflare "Verify you are human" dialog instructing victims to open PowerShell as administrator and paste a "verification code." The clipboard payload was an XOR-obfuscated PowerShell command (key: PuHNJs) that downloaded and executed a Go-based crypter ("blindcousin") from productionmaza[.]cyou. The crypter decrypted an embedded Vidar Stealer v1.0 payload using a custom 5-round XOR/SUB algorithm. The stealer exfiltrated browser credentials, cookies, Outlook profiles, and system information to a Hetzner-hosted C2 server, with Telegram and Steam Community profiles serving as dead drop resolvers for backup C2 addresses.

Key findings:

  • Three-stage attack chain: ClickFix social engineering → Go crypter with custom encryption → Vidar Stealer
  • Go loader "blindcousin" uses garble obfuscator with 5-round decryption (XOR, SUB, byte-swap, reverse)
  • Vidar v1.0 with botnet ID 4c0a49bed86cb25165c2f64c7c27c48a confirmed by Recorded Future Triage (score 10/10)
  • C2 at 78[.]46[.]199[.]184 (Hetzner DE) with self-signed TLS certificate, domain neugepower[.]net
  • Dead drop resolvers: Telegram channel t[.]me/v2ts23m contains backup C2 domain skfilmsint[.]com
  • Steam profile 76561198724155486 used as additional dead drop resolver
  • Process injection into Chrome and Edge browsers for credential theft
  • Targets: Chrome/Edge cookies and credentials, Outlook email profiles (v14.0-16.0), system hardware fingerprinting

Documents:

IOCs:

Type Value
Domain oulpansheli[.]org (compromised landing page, OVH FR)
Domain productionmaza[.]cyou (payload delivery, Cloudflare)
Domain neugepower[.]net (C2 domain, Hetzner)
Domain skfilmsint[.]com (backup C2, NameCheap/Cloudflare)
IP 78[.]46[.]199[.]184 (Vidar C2, Hetzner DE)
IP 213[.]186[.]33[.]16 (landing page, OVH FR)
IP 172[.]67[.]148[.]28 (Cloudflare proxy, productionmaza)
IP 104[.]21[.]55[.]125 (Cloudflare proxy, productionmaza)
URL hxxps://oulpansheli[.]org/ru/
URL hxxps://productionmaza[.]cyou/api/index.php?a=dl&token=fcdd5b796fbf5cb5614da7aaa4773fb404771c4821e4b8d30305ed8df58a2188&src=cloudflare&mode=cloudflare
URL hxxps://telegram[.]me/v2ts23m (dead drop)
URL hxxps://steamcommunity[.]com/profiles/76561198724155486 (dead drop)
SHA256 e2f6f791dd32b18fd7a002efce17fdd039f69809f7ddabeda9d0de1035da82d9 (Go loader)
SHA256 4a788d7009f7cd13fda4291461e67191bc4b9c34e16761796e0457810fe5bba8 (Vidar payload)
SHA256 4d4cd6ee9165a7b5e1bb8c7e91e2d62cb9db662b415900959785d24a59188a42 (ZIP archive)
Botnet 4c0a49bed86cb25165c2f64c7c27c48a
Mutex ChromeBuildTools

MITRE ATT&CK: T1204.002, T1059.001, T1027.013, T1140, T1105, T1036.005, T1584.001, T1071.001, T1070.004, T1564.003, T1555, T1555.003, T1552.001, T1005, T1114, T1217, T1012, T1082, T1124


2026-03-09 — Gmail Workspace Credential Phishing via Commercial PhaaS Platform

A phishing email impersonating a Gmail Workspace system notification ("Release Incoming Messages from pooled storage") was delivered to a public-facing email address of a human rights organization. The email was sent through a legitimate SendGrid account (SPF/DKIM pass), using a compromised Indian company's domain as the sender identity. The phishing link led to a commercial Phishing-as-a-Service platform with a two-stage architecture: a browser fingerprinting framework (collector.js) screens visitors before showing the credential harvesting form. The fingerprinting includes WebGL GPU identification, WebRTC STUN requests to reveal real IPs behind VPNs, anti-bot prototype patching detection, and DevTools detection. The platform uses wildcard DNS on Cloudflare, generating unique subdomains per campaign. A licensing system was confirmed when the operator's subscription expired — the backend returned "Your license has expired."

Key findings:

  • Two-stage phishing: landing page runs collector.js fingerprinting framework before redirecting to backend — bots, sandboxes, and researchers are filtered before the phishing form is shown
  • Browser fingerprinting includes WebRTC STUN (stun.l.google.com:19302) to deanonymize VPN users, WebGL GPU fingerprint to detect VMs (SwiftShader/llvmpipe), and anti-automation checks
  • Commercial PhaaS with licensing: expired license returns "Your license has expired. Please renew to continue using the service."
  • Wildcard DNS on bitnest[.]za[.]com: any subdomain resolves to Cloudflare CDN, enabling instant campaign subdomain generation
  • SendGrid abuse: account user_id=60417945, SPF/DKIM pass, inbox delivery guaranteed
  • Infrastructure link: Reply-To domain (sevensounds[.]ae) and exquisite[.]za[.]com share the same IP (91[.]193[.]42[.]16) via hostingww.com — connecting the Reply-To infrastructure to the za.com phishing namespace
  • Sender domain (oesplindia[.]com) is a legitimate Indian company with open FTP, MySQL, SNMP ports — likely compromised

Documents:

IOCs:

Type Value
URL hxxps://maxillae890[.]bitnest[.]za[.]com/testatrix449/
URL hxxps://demo[.]bitnest[.]za[.]com/testatrix449/
Domain bitnest[.]za[.]com (PhaaS platform, wildcard DNS, Cloudflare)
Domain oesplindia[.]com (compromised sender)
Domain sevensounds[.]ae (Reply-To)
IP 188[.]114[.]96[.]11 (Cloudflare CDN)
IP 188[.]114[.]97[.]11 (Cloudflare CDN)
IP 170[.]10[.]163[.]134 (LiquidNet US, AS14555)
IP 91[.]193[.]42[.]16 (AMANKA SARL / AWS, AS16509)
IP 149[.]72[.]123[.]24 (SendGrid)
Email sandeep@oesplindia[.]com (From, compromised)
Email td@sevensounds[.]ae (Reply-To)
SendGrid User ID 60417945, tracking: u60417945[.]ct[.]sendgrid[.]net
Script collector.js?v=21e981d0 (fingerprinting framework)

MITRE ATT&CK: T1566.002, T1598.003, T1589.001, T1583.001, T1583.006, T1585.002, T1036.005, T1071.001, T1217


2026-03-15 — Mamont Banking Trojan: Telegram Phishing Disguised as "Accident Photos"

Distribution of the Mamont banking trojan via Telegram, observed on March 12, 2026. A victim received a message from a compromised contact — "Hey, remember him? He crashed" — with an attached HTML file that redirected to a Telegram channel hosting a malicious APK. The malware requests default SMS app permissions, exfiltrates banking SMS codes, and automatically forwards phishing messages to all contacts on the device. C2 is conducted entirely via Telegram Bot API. Mamont is the most prevalent Android banking trojan in Russia — Kaspersky reported a 36x increase in attacked users in 2025.

Key findings:

  • Viral delivery: phishing message from a compromised real contact with emotional trigger ("He crashed"), HTML redirect to Telegram channel (376 subscribers)
  • Default SMS app takeover: once granted, the trojan reads, sends, and hides SMS — enabling interception of bank OTP codes
  • Telegram Bot API C2: operators control devices via bot commands (/getallsms, /send, /ussd, /spamallcontact, /hidemsg)
  • Obfuscation: hidden DEX in assets/ with fake zlib header, renamed Android SDK packages, password-protected AndroidManifest.xml
  • Targets 30+ Russian apps: 19 banks (Sberbank, Tinkoff, Alfa-Bank, etc.), payment systems (MIR Pay, QIWI), marketplaces (Wildberries, Ozon)
  • SaaS model: control panel sold/rented (~$300/month), APKs auto-generated by builder — explains numerous independent operator groups
  • Self-propagation: /spamallcontact command turns each victim into a new attack vector

Documents:

IOCs:

Type Value
SHA256 cc08aa94ad0a58c81ac6d7922db970271cce3c064e9e561157d2794bb80b7e79
MD5 b787fff066ef4a03360cc3822289f9aa
Package Name org.net.framework
Telegram Channel hxxps://t[.]me/+XEAhWyIorixlODVl ("Accident Photos 10.03")
Domain amuvvoafs[.]com, amuvvoafs[.]me, amuvvoafs[.]su
Domain tlydtdl[.]me
Lure File Запись происшествия.html (Accident Record.html)
APK Фото_ДТП.apk (Accident_Photos.apk)

MITRE ATT&CK: T1660, T1204.002, T1398, T1406, T1407, T1417, T1636.004, T1636.003, T1418, T1481.002, T1646, T1582


2026-03-14 — Telegram Account Hijacking via Fake Voting Phishing Campaign

A phishing campaign targeting Russian-speaking Muslim communities was observed distributing fake "regional voting" links via Telegram. Victims clicking the link on a mobile device were shown a fake voting page with two candidates, then prompted to "authorize via Telegram to prevent fraud." The authorization step hijacked the victim's Telegram session, giving the attacker full account access. The campaign uses a professional Phishing-as-a-Service kit with polymorphic CSS obfuscation, anti-replay tokens, and User-Agent filtering (desktop users redirected to Google, Telegram bot previews suppressed). Infrastructure is hosted on Pitline Ltd (Kharkiv, Ukraine) bulletproof hosting — Censys labels the IP as BULLETPROOF (confidence 0.75). The same server hosts 11 co-located domains including 4 "vybory" (elections) domains. F6 (formerly Group-IB) documented this kit across 290+ domains since 2022.

Key findings:

  • Professional phishing kit (PhaaS): polymorphic CSS class prefixes regenerated per request, anti-replay URL tokens, hidden junk HTML content for anti-detection
  • 3-stage User-Agent filtering: mobile → phishing page, desktop → Google redirect, TelegramBot → 204 No Content (suppresses link preview)
  • Server rebuilt from Windows (RDP/SMB) to Debian Linux specifically for this campaign (Censys Service History: Feb 12 → Mar 7, 2026)
  • SSL certificate issued same day as attack (Let's Encrypt E7, 2026-03-14 11:16 UTC)
  • 12 domains on single IP across 2 registrar clusters (Namecheap + Global Domain Group) with separate Cloudflare accounts — OPSEC compartmentalization
  • Part of a documented mass campaign: F6 tracked 290+ domains using this template since 2022, peak activity February 2026 (39 domains/month)
  • Viral distribution model: victims instructed to "forward to contacts," turning each compromise into a new attack vector

Documents:

IOCs:

Type Value
Domain beaminkjet[.]com
IP 77[.]83[.]39[.]62 (Pitline Ltd, Kharkiv, UA — BULLETPROOF)
ASN AS214940 (KPRONET) / AS215693 (PalmaHost)
Network 77[.]83[.]36[.]0/22 (Pitline Ltd)
Email syimono1488@gmail[.]com (WHOIS registrant)
URL hxxps://beaminkjet[.]com/umarashab
Domain vybory[.]cyou, vybory[.]bond, vybory[.]sbs, vybory[.]cfd
Domain vesna2026[.]cyou, vesna2026[.]cfd, vesna2026[.]sbs
Domain onetop[.]sbs, onetop[.]cfd, onetop[.]bond, onetop[.]click
Hash (MD5) 8d1c6e9b6c08132c9bddf5128515ebcc (phishing kit identifier in HTML comments)
SSL Serial 06:f1:d4:14:46:8b:2d:48:b9:40:cb:a9:42:d2:24:6a:b9:e5

MITRE ATT&CK: T1566.002, T1204.001, T1036.005, T1027, T1539, T1056.003, T1556, T1583.001, T1583.003, T1588.002, T1608.002, T1550.004, T1589.001, T1070.004, T1213


2026-03-10 — Multi-Protocol Scanner with MCP Module Detected in Honeypot

A multi-service honeypot recorded a systematic reconnaissance campaign from a single IP address that probed 8 services in 10 minutes, including a JSON-RPC initialization request for the Model Context Protocol (MCP). This is the first documented observation of MCP scanning integrated into a multi-protocol scanner alongside traditional services such as SSH, MySQL, Docker API, and Winbox. The scanner identified itself as "gitmc-org-mcp-scanner v1.0.0" — a tool not found in any public repository.

Key findings:

  • MCP initialize handshake (protocol version 2025-06-18) sent as part of a multi-service scan covering SSH, Telnet, HTTP/S, MySQL, Docker API, Memcached, and Winbox
  • Full set of client capabilities requested: sampling, elicitation, roots — maximizing server response
  • Scanner self-identifies as gitmc-org-mcp-scanner v1.0.0 — no public references found
  • Same IP attempted Docker API exploitation: POST /v1.43/containers/create with Image: alpine, Cmd: cat /etc/shadow
  • SSH fingerprint: OpenSSH 10.2 with post-quantum KEX algorithms (mlkem768x25519-sha256)
  • Source: residential DSL (Orange Polska, Warsaw) — likely purpose-built scanning system or residential proxy
  • Context: GreyNoise saw no MCP payloads on honeypots in November 2025; by March 2026, MCP scanning is part of commodity scanners

Documents:

IOCs:

Type Value
IP 95[.]51[.]243[.]130 (Orange Polska, Warsaw, PL)
rDNS ojl130[.]internetdsl[.]tpnet[.]pl
User-Agent curl/8.7.1
HASSH eeca2460550b9ded084ecf2f70a75356 (OpenSSH 10.2)
MCP client gitmc-org-mcp-scanner v1.0.0
MCP proto 2025-06-18
Docker path /v1.43/containers/create (Image: alpine, Cmd: cat /etc/shadow)

MITRE ATT&CK: T1595.002, T1046, T1190, T1610, T1613, T1552.001


2026-03-05 — WhatsApp Account Takeover via "Defisher" Phishing Kit

A phishing link distributed via Signal led to a WhatsApp account compromise through the device linking feature. The phishing site impersonated WhatsApp Web, tricking the victim into entering their phone number and then a device linking code. The attack was powered by a commercial phishing kit called "Defisher" — a Next.js application with an admin panel, WebSocket-based C2, and optional CIS country filtering.

Key findings:

  • Phishing kit "Defisher": Next.js-based commercial tool with admin panel at panel-my-test[.]online/auth
  • Two attack modes: QR code scanning and phone number-based device linking (phone mode used in this incident)
  • WebSocket C2: phishing page communicates with backend via Socket.IO (panel-my-test[.]online/api/socket)
  • CIS geo-filtering code present but not active in this campaign: source code contains "Извините, ваш номер в зоне СНГ, ошибка" handler, but active testing confirmed CIS numbers (RU, UA, KZ, BY) were accepted and received valid linking codes
  • Infrastructure: AEZA Group (AS210644) — bulletproof hosting provider, FSB raid (Apr 2025), US OFAC sanctions (Jul 2025)
  • Both domains registered 8 seconds apart (batch registration) via PDR Ltd., NS: timeweb.ru
  • API endpoint exposed campaign stats: 210 views, 73 phone number inputs, campaign #8 on the server (at least 7 prior campaigns)
  • Open Nginx Proxy Manager admin panel on port 81

Documents:

IOCs:

Type Value
Domain trust-authorization[.]tech (phishing page)
Domain panel-my-test[.]online (C2 panel / WebSocket API)
IP 147[.]45[.]43[.]133 (AEZA Group, AS210644, Frankfurt)
URL hxxps://trust-authorization[.]tech/pUsl9nuZo649dKua0HL7uG5npbYAq1bn
URL hxxps://panel-my-test[.]online/api/socket (WebSocket endpoint)
URL hxxps://panel-my-test[.]online/auth (Defisher admin panel)
ASN AS210644 (AEZA-AS, bulletproof hosting)
Netblock 147[.]45[.]43[.]0/24 (Aeza-Network)
SSH HASSH e42184b06d45385a906f0803d04c83da
SSH Host Key SHA256 67e1fe70de94c56a515ae423ac6eded53e98a20cc7732114f661b372de82f934
TLS Serial 0571f6a08d8bad9c5aaad12c3a22a3012108 (trust-authorization[.]tech, LE E7)
TLS Serial 06390e30192e8789eb02220f86d45db74a46 (panel-my-test[.]online, LE E8)

MITRE ATT&CK: T1566.002, T1078, T1583.001, T1583.003, T1588.002, T1036.005, T1071.001, T1530


2026-03-02 — Targeted Phishing Impersonating Meta/Facebook Against a Human Rights NGO

A spear-phishing email impersonating Meta/Facebook was delivered to a Russian human rights NGO. The attackers chained legitimate services (Resend.com → Amazon SES) to achieve SPF pass, DKIM pass, and ARC pass, ensuring inbox delivery in Gmail. The phishing link led to a likely compromised legitimate British recruitment website, bypassing URL reputation filters.

Key findings:

  • SPF, DKIM (×2), and ARC all passed — delivered to Gmail inbox, not spam
  • Sending infrastructure: Resend.com email API → Amazon SES (ap-northeast-1, Tokyo) via domain registered at Sav.com (documented abuse issues)
  • Phishing host: skillbaseltd[.]co[.]uk — confirmed domain hijacking after expiry (company in liquidation, cert evidence via crt.sh); bypasses URL reputation filters
  • Broader infrastructure: cluster of 14 re-registered expired .co.uk domains on shared Cloudflare/cPanel hosting; 3 additional domains (restorewellbeing[.]co[.]uk, rubyandginger[.]co[.]uk, senditmyway[.]co[.]uk) have Resend+Amazon SES sending infrastructure pre-configured — staged for follow-on campaigns
  • Display Name "M e t a" with spaces — evades brand-name filters matching exact string "Meta"
  • Meta logo loaded directly from facebook[.]com — adds credibility and enables open tracking
  • Targeted attack: recipient address associated with a specific organizational program, not publicly listed; email in Russian adapted to target profile

Documents:

IOCs:

Type Value
Email identity-policy@readlundy[.]com
Domain readlundy[.]com (sending domain, registered Aug 15, 2025)
Domain send.readlundy[.]com (Resend SPF domain)
Domain skillbaseltd[.]co[.]uk (phishing host)
URL hxxps://skillbaseltd[.]co[.]uk/
IP 23[.]251[.]234[.]52 (Amazon SES, ap-northeast-1, Tokyo)
IP 104[.]21[.]15[.]116 (Cloudflare CDN)
Message-ID 0106019caf15ae50-9ddecc03-8e54-4d63-b110-5cf354fbf092-000000@ap-northeast-1.amazonses.com
Domain restorewellbeing[.]co[.]uk (related infra: Resend+SES staged)
Domain rubyandginger[.]co[.]uk (related infra: Resend+SES staged)
Domain senditmyway[.]co[.]uk (related infra: Resend+SES staged)

MITRE ATT&CK: T1583.001, T1583.006, T1584.001, T1585.002, T1566.002, T1056.003, T1656, T1036


2026-02-18 — Targeted Phishing Impersonating National Endowment for Democracy

A spear-phishing campaign impersonating the National Endowment for Democracy (NED), targeting individuals in the NGO sector with fabricated grant opportunities. The email was sent from a compromised Zambian real estate domain via Russian VPS infrastructure.

Key findings:

  • Highly targeted: victim addressed by full name with fabricated reference to a prior NED grant application
  • Sender impersonated a fictitious NED employee "Daniel Knaus" (real employee John Knaus exists)
  • Infrastructure: SmartApe VPS (Moscow, DataPro datacenter) → StableServer relay → AntiSpamCloud → Gmail
  • SPF/DKIM passed for the sending domain, bypassing basic email authentication
  • Phantom attachment technique: email references an attached document that doesn't exist in MIME structure
  • Likely multi-stage attack: initial email establishes trust, malicious payload delivered in follow-up

Documents:

IOCs:

Type Value
Email daniel.knaus@hunterspropertyzm[.]com
Domain hunterspropertyzm[.]com
IP 188.127.227[.]111 (SmartApe VPS, Moscow)
Hostname s1277447.smartape-vps.com
IP 192.250.227[.]159 (stableserver.net relay)
IP 185.201.18[.]54 (antispamcloud.com)
Message-ID 177141183849.635335.*@s1277447.smartape-vps.com

MITRE ATT&CK: T1566.001, T1036.005, T1598, T1589, T1591, T1583.003, T1586.002, T1204.001, T1585


2026-02-13 — Phishing Campaign via Google Drive with Browser Fingerprinting

A phishing campaign abusing Google's legitimate infrastructure (Drive, Cloud Storage, Gmail) to deliver a browser fingerprinting payload hosted on bulletproof infrastructure (PROSPERO OOO, AS200593).

Key findings:

  • Multi-hop delivery chain through trusted Google domains bypassing email filters
  • FingerprintJS v4.2.1 + BotD for victim profiling and scanner evasion
  • Advanced cloaking: automated scanners redirected to msn.com, real users fingerprinted
  • Reconnaissance operation — fingerprint harvesting linked to email tracking IDs, not credential theft
  • Infrastructure hosted on PROSPERO OOO (AS200593), a notorious bulletproof hosting provider labeled "BULLETPROOF" by Censys
  • Same IP hosts multiple phishing campaigns: DocuSign impersonation (docusign.notifyentryflow[.]com) and additional domains active through late February 2026

Documents:

IOCs:

Type Value
Domain online.accessinformnotice[.]com
Domain accessinformnotice[.]com
Domain accessinformattention[.]com
Domain docusign.notifyentryflow[.]com (related: DocuSign impersonation, same IP)
Domain notifyentryflow[.]com (related: parent domain)
Domain warningentrypath[.]com (related: same IP, active Feb 26, 2026)
IP 91.202.233[.]71 (PROSPERO OOO, St. Petersburg)
ASN AS200593 (PROSPERO OOO, bulletproof hosting)
Netblock 91.202.233[.]0/24
URL hxxps://online.accessinformnotice[.]com/secure/index_newest.html
URL hxxps://online.accessinformnotice[.]com/secure/secure.php
GCS hxxps://storage.googleapis[.]com/persontwelve/online/offer.html
Google Drive hxxps://drive.google[.]com/file/d/18XPn0pHsygsvZcinTivBQ_I225l-xzpC
Email neyjardespbeg2002@secure.accessinformattention[.]com
Server Apache/2.4.41 (Ubuntu)
FingerprintJS v4.2.1
TLS Cert 50f8484b5501e0132ef7ffc1614590845ccdc9375e53d81d2f7d7119a0387d3c (SHA-256)

MITRE ATT&CK: T1566.002, T1036.005, T1036.001, T1204.001, T1608.005, T1090, T1583.003, T1217, T1041, T1592.004, T1598


Author

Aleksei Fokin — DevOps / Infrastructure Engineer, Warsaw, Poland

Contact: info@afokin.com

License

All reports are published under TLP:CLEAR — no restrictions on distribution.

About

Threat intelligence reports and IOCs from real-world incident investigations

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors