Phish Wire - Feb 25 2025
  • 24 Feb 2025
  • 1 Minute to read
  • Dark
    Light

Phish Wire - Feb 25 2025

  • Dark
    Light

Article summary

There has been an increase in phishing activity recently, focusing on platforms such as Instagram, Microsoft, and Chase Bank. Attackers leveraged sophisticated tactics, including hosting phishing pages on legitimate cloud platforms and enabling them to bypass traditional detection mechanisms. We also saw a massive surge in malware hosted on Azure infrastructure. Below are key highlights and examples of recent phishing activity.

  • azureserv[.]com/?__cpo=aHR0cHM6Ly93d3cuaW5zdGFncmFtLmNvbQ

  • wittrams[.]com

  • skspofficelogin[.]richargest[.]cloud/?QvZli=YQbr&sso_reload=true

  • screetru[.]es/?auth&apitoken=rylae2be63wttzu

  • superdemolink00010[.]z13[.]web[.]core[.]windows[.]net

  • mexapvpqbu[.]life/script/iprp[.]php?t=1

  • track2.111cvm51-s9z-19[.]com

  • e-connexioninfosclients[.]duckdns[.]org/

  • seashell-app-eigd4[.]ondigitalocean[.]app/

  • orca-app-9mwg9[.]ondigitalocean[.]app/

  • king-prawn-app-3aosz[.]ondigitalocean[.]app/

  • securiti009[.]z13[.]web[.]core[.]windows[.]net

  • securitu014[.]z13[.]web[.]core[.]windows[.]net

  • securitl111[.]z13[.]web[.]core[.]windows[.]net/?gad_source=5

  • securitj107[.]z13[.]web[.]core[.]windows[.]net

  • securitj105[.]z13[.]web[.]core[.]windows[.]net

Instagram Zero Day

Recently, a school employee clicked a zero-day Instagram phishing page. Even weeks after we discovered the issue, the URL remains 100% clean on VirusTotal.

What often makes social media cases like this difficult to report is that they are often clicked via native messaging apps like Facebook or Instagram Messenger, which are outside the scope of traditional email-based security architecture.

We further saw a streak of Microsoft credential harvesters clicked at organizations across Washington and Kentucky, like the example below.

Microsoft and Apple Support Phishing

In the second half of January, we witnessed a massive surge in malware sites impersonating Microsoft and Apple support like the example below.  


In a matter of 2 weeks, twenty-three different users at a Texas organization clicked on phishing links hosted on windows.net or redirected to phishing pages on that domain. Sneakily, phishing attacks masquerade as support, prompting users to call a phone number or install malware. They adapt the displayed logos to match either Apple or Windows, depending on the device accessing the URLs. 

Mitigations

  • Add the specified domains to your block lists.

  • Focus awareness efforts on high-risk credentials.

  • Educate users that social media phishing can pose serious organizational risks, particularly when accessed on work devices.

  • Remind users never to dial a support number received via an email. Instead, search Google for the intended support number.


Was this article helpful?

ESC

Eddy AI, facilitating knowledge discovery through conversational intelligence