#EvilProxy

⚠️ In 2025, stealer and RAT activity tripled. #Lumma led with 31K+ detections, while #XWorm grew 4.3x YoY.

Phishing kept pace, driven by MFA-bypassing PhaaS kits like #Tycoon2FA and #EvilProxy.

👨‍💻 See which threats SOC teams should be preparing for next: any.run/cybersecurity-blog/mal

#cybersecurity #infosec

🚨 Attackers hijacked a supplier mailbox and replied inside a real C-suite thread, delivering an #EvilProxy phish behind Turnstile gates

We exposed the full chain + campaign links

See how this impacts business risk, and how your SOC can catch it earlier: any.run/cybersecurity-blog/ent

#cybersecurity #infosec

🚨 Attackers Took Over a Real Enterprise Email Thread to Deliver #Phishing

⚠️ The hacker replied directly within an active discussion among C-suite executives about a document pending final approval, sharing a phishing link to a fake Microsoft authentication form.
The attackers likely compromised a sales manager account at an enterprise contractor and hijacked a trusted business conversation.

👾 By detonating samples in the #ANYRUN Sandbox and pivoting indicators in TI Lookup, we uncovered a broader campaign powered by the #EvilProxy phishkit. The activity has been ongoing since early December 2025, primarily targeting companies in the Middle East.

🔗 Execution chain:
SCA phishing email ➡️ 7 forwarded messages ➡️ Phishing link ➡️ Antibot landing page w/ Cloudflare Turnstile ➡️ Phishing page w/ Cloudflare Turnstile ➡️ EvilProxy

❗️ Supply chain phishing campaigns now rely on layered social engineering, real conversation hijacking, and infrastructure that closely resembles #PhaaS platforms in both complexity and scale. These attacks exploit business trust, not technical vulnerabilities.

🎯 How companies can reduce supply chain phishing risk:
🔹 Flag HTML/PDF files with dynamic content, review unusual approval flows, and detonate suspicious files in a sandbox before interaction.
🔹 Split responsibility between initiating and approving document or process changes. Apply the four-eyes principle.
🔹 Use realistic supply chain attack scenarios and “perfect-looking” emails in awareness programs.

⚡️ Further technical insights are coming, stay tuned!

With #ANYRUN Sandbox, the threat's full attack chain becomes visible through real behavior and actionable reports with IOCs in under 60 seconds, significantly cutting MTTD and MTTR. Security teams triage faster, reduce Tier-1 overload and escalations, and contain incidents earlier to limit business impact.

👨‍💻 Equip your SOC with stronger phishing detection: any.run/enterprise/?utm_source

#ExploreWithANYRUN

📋 IOCs:
URI pattern: POST ^(/bot/|/robot/)$
Domains:
himsanam[.]com
bctcontractors[.]com
studiofitout[.]ro
st-fest[.]org
komarautomatika[.]hu
eks-esch[.]de
avtoritet-car[.]com
karaiskou[.]edu[.]gr
Domain pattern: ^loginmicrosoft*

#cybersecurity #infosec

🚨 #Phishing on Trusted Cloud Infrastructure: Google, Microsoft, Cloudflare.
We’re tracking a growing trend where phishing kit infrastructure is hosted on legitimate cloud and CDN platforms, not newly registered domains. In some cases, these campaigns specifically target enterprise users. This creates serious visibility challenges for security teams.

We’ve observed this pattern across multiple #phishkits:
🔹 #Tycoon hosted on alencure[.]blob[.]core[.]windows[.]net (Microsoft Azure Blob Storage): app.any.run/tasks/29b53d89-99b
⚠️ #Sneaky2FA hosted on legitimate cloud platforms, filtering out free email domains via a fake Microsoft 365 login to target corporate accounts:
firebasestorage[.]googleapis[.]com (Cloud Storage for Firebase): app.any.run/tasks/8189dd5e-015
cloudfront[.]net (AWS CloudFront): app.any.run/tasks/9a2d1537-e95
🔹 #EvilProxy hosted on sites[.]google[.]com (Google Sites): app.any.run/tasks/07995c22-6e7

Victims see a “trusted” provider domain, while the network only sees normal HTML being loaded from cloud infrastructure. What looks clean at first glance is exposed by #ANYRUN Sandbox in under 60 seconds, directly reducing MTTD and MTTR.

🔍 Hunt for related activity and pivot from #IOCs using these search queries in TI Lookup:
🔹 Microsoft Azure Blob Storage abuse: intelligence.any.run/analysis/
🔹 Firebase Cloud Storage abuse: intelligence.any.run/analysis/
🔹 Google Sites abuse: intelligence.any.run/analysis/

Many security vendors will flag these domains as legitimate. Technically, they are. That’s why security teams need behavioral analysis and network-level signals to reliably uncover phishing before impact.

🚀 Speed up detection and gain full visibility into complex threats with #ANYRUN. Sign up: app.any.run/?utm_source=mastod
#ExploreWithANYRUN

#IOCs:
mphdvh[.]icu
kamitore[.]com
aircosspascual[.]com
Lustefea[.]my[.]id

#cybersecurity #infosec

🪝 #EvilProxy is a #phishing kit that bypasses 2FA via a reverse-proxy architecture.

🌐 Attackers use it to target credentials of corporate Microsoft 365 users across different industries.

Learn about this threat & see analysis: any.run/malware-trends/evilpro

#cybersecurity #infosec

John Leonardjohnleonard
2025-03-19

Phishing-as-a-service is an area that is increasing rapidly according to research by security vendor Barracuda Networks, which says it has detected a “massive spike” in PhaaS attacks in the first two months of this year.

computing.co.uk/news/2025/secu

2025-02-06

Account Compromise Arms Race: The Rise of Phishing-as-a-Service
#EvilProxy #ONNXStore
abnormalsecurity.com/blog/acco

🚨 ALERT: Fake #YouTube links redirect to #phishing pages
Using the Uniform Resource Identifier authority (URI), phishers obfuscate links and place a legitimate resource address, like http://youtube, at the beginning of URLs to deceive users and make the link appear authentic and safe.

📌 The attackers are also abusing other services. We’ll keep monitoring and sharing the details with you, so your company can make effective decisions to address the threat.

Take a look at the example and gather #IOCs:
app.any.run/tasks/ace1b2b4-1c1

👨‍💻 Use this search request to find more sandbox sessions and improve the precision and efficiency of your organization's security response:
intelligence.any.run/analysis/

Technically, the URI Scheme replaces the userinfo field (user:pass) with a domain name: foo:// <user:pass> @ domain . zone

📝 Attributes
#Storm1747 domain infrastructure — checkers, redirectors and main pages — has a standard template for #Tycoon 2FA #phishkit installed.
The technique of replacing userinfo is also employed by various other phishing kits, such as #Mamba 2FA and #EvilProxy.

🚀 Analyze and investigate the latest #malware and phishing threats with ANYRUN

Techy Geek :verified:techygeek@infosec.exchange
2023-10-12

Cybercriminals are using a new phishing technique called "EvilProxy" to steal your personal information! Stay safe online.

thehackernews.com/2023/10/cybe

#cybersecurity #phishing #EvilProxy #cybercrime

2023-10-11

This (or something similar) overlaid on your Tenancy Background image might help against #EvilProxy pages

medium.com/@martinconnarty/adv

Phishing warning image that is an overlay for Azure tenancy backgrounds

"STOP!! If the URL doesn't start "login.microsoft.online.com/" Then you may be being phished"
2023-10-10

EvilProxy, which was first documented by Resecurity in September 2022, acts as a reverse proxy between the target and a legitimate login page.

#Cybersecurity #ATM #Phishing #Cyberthreat #USA #EvilProxy

cybersec84.wordpress.com/2023/

Malwar3Ninja | Threatview.ioMalwar3Ninja@infosec.exchange
2023-08-14

[Threatview.io] Checkout our latest collection of IOC for "SUSPECTED" #Evilproxy domains on #virustotal identified using our proactive hunter's domain telemetry.

virustotal.com/gui/collection/

#phishing
#malware
#threatintel

chris actuallackattack
2023-02-10

@evaristegal0is strikes again. Script kiddies are running wild with this lately.

2023-01-24

From the #EvilProxy Telegram channel:
It appears they're using auth.acme-dns.io/ as their way of generating subdomains.
"Hi friends, we have problem with add new domains in system bcs 3party website is down (auth.acme-dns.io) if some one has info what's wrong with it share pls. we are looking for tmp solution."

As of now the site is still down. Returning 404. @DomainTools shows a pDNS record from the acme resolved IP that uses the same subdomain pattern seen in EvilProxy phishing campaigns.

#ThreatIntel #ThreatHunting #DNS #OSINT

Malwar3Ninja | Threatview.ioMalwar3Ninja@infosec.exchange
2023-01-21

[Threatview.io] ⚡ Latest collection of #evilproxy domains on #virustotal as seen from our proactive hunter domain telemetry 👇

virustotal.com/gui/collection/1906094a8c4a7a9e55b5fecaecda9c68b2f7a2986db9d04c60236a0de92f8099

#Threatintel
#CTI
#Phishing
#DFIR
#cybersecurity

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst