#EvilProxy

๐Ÿšจ #Phishing on Trusted Cloud Infrastructure: Google, Microsoft, Cloudflare.
Weโ€™re tracking a growing trend where phishing kit infrastructure is hosted on legitimate cloud and CDN platforms, not newly registered domains. In some cases, these campaigns specifically target enterprise users. This creates serious visibility challenges for security teams.

Weโ€™ve observed this pattern across multiple #phishkits:
๐Ÿ”น #Tycoon hosted on alencure[.]blob[.]core[.]windows[.]net (Microsoft Azure Blob Storage): app.any.run/tasks/29b53d89-99b
โš ๏ธ #Sneaky2FA hosted on legitimate cloud platforms, filtering out free email domains via a fake Microsoft 365 login to target corporate accounts:
firebasestorage[.]googleapis[.]com (Cloud Storage for Firebase): app.any.run/tasks/8189dd5e-015
cloudfront[.]net (AWS CloudFront): app.any.run/tasks/9a2d1537-e95
๐Ÿ”น #EvilProxy hosted on sites[.]google[.]com (Google Sites): app.any.run/tasks/07995c22-6e7

Victims see a โ€œtrustedโ€ provider domain, while the network only sees normal HTML being loaded from cloud infrastructure. What looks clean at first glance is exposed by #ANYRUN Sandbox in under 60 seconds, directly reducing MTTD and MTTR.

๐Ÿ” Hunt for related activity and pivot from #IOCs using these search queries in TI Lookup:
๐Ÿ”น Microsoft Azure Blob Storage abuse: intelligence.any.run/analysis/
๐Ÿ”น Firebase Cloud Storage abuse: intelligence.any.run/analysis/
๐Ÿ”น Google Sites abuse: intelligence.any.run/analysis/

Many security vendors will flag these domains as legitimate. Technically, they are. Thatโ€™s why security teams need behavioral analysis and network-level signals to reliably uncover phishing before impact.

๐Ÿš€ Speed up detection and gain full visibility into complex threats with #ANYRUN. Sign up: app.any.run/?utm_source=mastod
#ExploreWithANYRUN

#IOCs:
mphdvh[.]icu
kamitore[.]com
aircosspascual[.]com
Lustefea[.]my[.]id

#cybersecurity #infosec

๐Ÿช #EvilProxy is a #phishing kit that bypasses 2FA via a reverse-proxy architecture.

๐ŸŒ Attackers use it to target credentials of corporate Microsoft 365 users across different industries.

Learn about this threat & see analysis: any.run/malware-trends/evilpro

#cybersecurity #infosec

John Leonardjohnleonard
2025-03-19

Phishing-as-a-service is an area that is increasing rapidly according to research by security vendor Barracuda Networks, which says it has detected a โ€œmassive spikeโ€ in PhaaS attacks in the first two months of this year.

computing.co.uk/news/2025/secu

2025-02-06

Account Compromise Arms Race: The Rise of Phishing-as-a-Service
#EvilProxy #ONNXStore
abnormalsecurity.com/blog/acco

๐Ÿšจ ALERT: Fake #YouTube links redirect to #phishing pages
Using the Uniform Resource Identifier authority (URI), phishers obfuscate links and place a legitimate resource address, like http://youtube, at the beginning of URLs to deceive users and make the link appear authentic and safe.

๐Ÿ“Œ The attackers are also abusing other services. Weโ€™ll keep monitoring and sharing the details with you, so your company can make effective decisions to address the threat.

Take a look at the example and gather #IOCs:
app.any.run/tasks/ace1b2b4-1c1

๐Ÿ‘จโ€๐Ÿ’ป Use this search request to find more sandbox sessions and improve the precision and efficiency of your organization's security response:
intelligence.any.run/analysis/

Technically, the URI Scheme replaces the userinfo field (user:pass) with a domain name: foo:// <user:pass> @ domain . zone

๐Ÿ“ Attributes
#Storm1747 domain infrastructure โ€” checkers, redirectors and main pages โ€” has a standard template for #Tycoon 2FA #phishkit installed.
The technique of replacing userinfo is also employed by various other phishing kits, such as #Mamba 2FA and #EvilProxy.

๐Ÿš€ Analyze and investigate the latest #malware and phishing threats with ANYRUN

Techy Geek :verified:techygeek@infosec.exchange
2023-10-12

Cybercriminals are using a new phishing technique called "EvilProxy" to steal your personal information! Stay safe online.

thehackernews.com/2023/10/cybe

#cybersecurity #phishing #EvilProxy #cybercrime

2023-10-11

This (or something similar) overlaid on your Tenancy Background image might help against #EvilProxy pages

medium.com/@martinconnarty/adv

Phishing warning image that is an overlay for Azure tenancy backgrounds

"STOP!! If the URL doesn't start "login.microsoft.online.com/" Then you may be being phished"
2023-10-10

EvilProxy, which was first documented by Resecurity in September 2022, acts as a reverse proxy between the target and a legitimate login page.

#Cybersecurity #ATM #Phishing #Cyberthreat #USA #EvilProxy

cybersec84.wordpress.com/2023/

Malwar3Ninja | Threatview.ioMalwar3Ninja@infosec.exchange
2023-08-14

[Threatview.io] Checkout our latest collection of IOC for "SUSPECTED" #Evilproxy domains on #virustotal identified using our proactive hunter's domain telemetry.

virustotal.com/gui/collection/

#phishing
#malware
#threatintel

chris actuallackattack
2023-02-10

@evaristegal0is strikes again. Script kiddies are running wild with this lately.

2023-01-24

From the #EvilProxy Telegram channel:
It appears they're using auth.acme-dns.io/ as their way of generating subdomains.
"Hi friends, we have problem with add new domains in system bcs 3party website is down (auth.acme-dns.io) if some one has info what's wrong with it share pls. we are looking for tmp solution."

As of now the site is still down. Returning 404. @DomainTools shows a pDNS record from the acme resolved IP that uses the same subdomain pattern seen in EvilProxy phishing campaigns.

#ThreatIntel #ThreatHunting #DNS #OSINT

Malwar3Ninja | Threatview.ioMalwar3Ninja@infosec.exchange
2023-01-21

[Threatview.io] โšก Latest collection of #evilproxy domains on #virustotal as seen from our proactive hunter domain telemetry ๐Ÿ‘‡

virustotal.com/gui/collection/1906094a8c4a7a9e55b5fecaecda9c68b2f7a2986db9d04c60236a0de92f8099

#Threatintel
#CTI
#Phishing
#DFIR
#cybersecurity

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst