Skip to main content
Mallory

Credential Theft and Evasion Techniques Across Phishing, Webmail Exploitation, and Commodity Malware

credential-access-methodphishing-campaign-intelligencedefense-evasion-methodcredential-stealer-activitystate-sponsored-espionage
Updated March 26, 2026 at 03:05 PM5 sources
Share:
Credential Theft and Evasion Techniques Across Phishing, Webmail Exploitation, and Commodity Malware

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

Threat actors are continuing to prioritize credential theft while using defensive and trusted services to evade detection. DomainTools reported a Microsoft 365 phishing operation that weaponizes Cloudflare protections (including Turnstile human verification) to block automated analysis and security crawlers, then selectively serves a credential-harvesting flow only to “clean” visitors. The infrastructure used additional gatekeeping such as IP reputation checks (including lookups via api.ipify.org), hardcoded blocks for security-vendor and cloud-provider ranges, and user-agent filtering that returns a fake 404 page to bots, with the theft logic hidden behind heavy obfuscation.

Separately, Hunt.io documented Operation Roundish, assessed with medium-high confidence as aligned to APT28 (Fancy Bear), after discovering an exposed open directory hosting a Roundcube exploitation toolkit used against Ukrainian targets (including mail.dmsu.gov.ua). The toolkit included XSS payloads, a Flask-based C2, and modules for credential harvesting, mail forwarding persistence, bulk email exfiltration, address book theft, and 2FA secret extraction, plus a Go-based Linux implant (httd) found on a compromised Ukrainian web application. In parallel reporting on credential-access tradecraft, Flashpoint analysis highlighted the low-cost DarkCloud infostealer (sold for about $30) that steals browser logins/cookies and other data and exfiltrates via common channels (email/FTP/Telegram/HTTP), while Aryaka Threat Labs described the BlackSanta campaign using steganographic lures and BYOVD techniques to disable EDR and enable stealthy data theft over HTTPS—underscoring that credential access and defense evasion remain common precursors to broader enterprise compromise.

Timeline

  1. Mar 24, 2026

    Phishing campaign targets TikTok for Business accounts

    Push Security reported a phishing campaign targeting TikTok for Business users with Cloudflare-hosted pages, Google Storage redirects, and Cloudflare Turnstile checks to evade analysis. The operation uses reverse-proxy phishing pages to steal credentials and session cookies, enabling account hijacking even when two-factor authentication is enabled, with attacker domains registered on 2026-03-24.

  2. Mar 12, 2026

    DomainTools identifies Cloudflare-assisted Microsoft 365 phishing campaign

    DomainTools reported a Microsoft 365 credential-harvesting campaign that used Cloudflare Turnstile, IP filtering, and user-agent checks to block bots and researchers before serving phishing pages to real users. The campaign hid credential theft logic in an obfuscated custom virtual machine and could be tracked via a shared Turnstile sitekey.

  3. Jan 1, 2026

    Researchers discover exposed Roundish exploitation server

    In January 2026, researchers found an open directory on 203.161.50[.]145:8889 containing a full Roundcube exploitation toolkit, operator artifacts, a Flask-based C2, a CSS-injection side-channel server, and a Go-based Linux implant. The server also contained exfiltrated data from blog.pentagonteam[.]com, including source code and secrets.

  4. Dec 31, 2025

    APT28-linked Roundish toolkit targets Ukraine's State Migration Service

    The Roundish toolkit was used against mail.dmsu.gov.ua, the webmail system of Ukraine's State Migration Service, to steal credentials, exfiltrate mail and contacts, extract 2FA secrets, and establish persistence through Sieve mail-forwarding rules. Researchers assessed the activity with medium-high confidence as aligned with APT28 based on overlaps with Operation RoundPress.

  5. Mar 10, 2025

    BlackSanta campaign begins targeting HR recruitment workflows

    Aryaka Threat Labs reported that the BlackSanta campaign has been active for about a year, using resume-themed ISO files in recruiting channels to deliver malware. The intrusion chain culminates in a BYOVD-based payload that disables AV/EDR, Microsoft Defender protections, and system logging to support stealthy theft.

  6. Jan 1, 2022

    DarkCloud infostealer begins circulating on Telegram and public storefronts

    Flashpoint reported that the low-cost DarkCloud infostealer has been circulating since 2022, sold for about $30 through Telegram and public storefronts. The malware steals browser credentials, cookies, financial data, and email-application details, lowering the barrier for credential theft.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Related Stories

Phishing Campaigns Abuse Trusted Platforms and Collaboration Tools to Steal Credentials

Phishing Campaigns Abuse Trusted Platforms and Collaboration Tools to Steal Credentials

Multiple reports describe a broader **credential-theft trend** in which attackers abuse trusted services and familiar business workflows to make phishing more convincing and harder to detect. One campaign used **compromised WordPress sites** and redirects through `skimresources[.]com` to deliver pixel-perfect fake login pages for **Microsoft Teams**, **Xfinity**, and **UAE Pass**, with lures such as missed voicemail and shared-document alerts. Another campaign abused **LiveChat**'s `lc[.]chat` infrastructure to impersonate brands like **PayPal** and **Amazon**, moving victims into fake support conversations designed to extract sensitive information under the guise of refunds or order issues. A separate industry report reinforces the same operational pattern: attackers increasingly rely on **valid credentials** and trusted collaboration tools rather than software exploits, with cloud identity compromise driving most investigated incidents and some intrusions using **Microsoft Teams voice phishing** and **Quick Assist** to gain access, move laterally, and deploy ransomware. Other references in the set cover different stories entirely, including the **CamelClone** espionage operation, a **FancyBear/APT28** infrastructure exposure, and a general weekly security recap, and do not describe the same phishing activity. This is **not fluff** because the relevant items contain substantive threat intelligence on active attack methods, delivery infrastructure, and attacker tradecraft.

1 months ago
Credential Theft and Identity-Based Intrusions Surge Across Enterprises

Credential Theft and Identity-Based Intrusions Surge Across Enterprises

**Credential compromise** and identity abuse are increasing as attackers rely more on stolen logins, session artifacts, and phishing rather than noisy exploitation alone. Recorded Future reported a sharp rise in exposed credentials during 2025, including nearly **2 billion** credentials indexed from malware combo lists, with the second half of the year up **50%** over the first and Q4 up **90%** over Q1. The trend is being driven by the industrialization of **infostealer malware**, malware-as-a-service ecosystems, and AI-enabled phishing and social engineering, while weak identity governance continues to expand the attack surface. A separate survey of UK organizations found **77%** fail to promptly disable former employees' accounts, **34%** grant overly broad access, and many still use manual processes such as spreadsheets for account validation, creating persistent opportunities for unauthorized access. A targeted phishing attempt against **Outpost24** illustrates how these identity-focused attacks are being operationalized against even security vendors. Attackers used a convincing fake JP Morgan email, valid **DKIM** authentication via Amazon SES infrastructure, and a **seven-stage redirect chain** leveraging trusted brands including Cisco to steer a C-suite executive toward a Microsoft Office credential-harvesting page while evading email defenses. The broader threat environment shows the same shift toward access abuse and stealthier post-compromise tradecraft: Google Threat Intelligence Group found ransomware actors increasingly favor native Windows tools over **Cobalt Strike**, with data theft present in **77%** of incidents and exploitation of VPNs and firewalls still common for initial access. Together, the reporting shows attackers are increasingly **logging in rather than breaking in**, then using legitimate access and built-in tools to deepen compromise and extort victims.

1 weeks ago
Credential-Theft Malware Campaigns Targeting Windows via Social Engineering and Trusted Services

Credential-Theft Malware Campaigns Targeting Windows via Social Engineering and Trusted Services

Multiple reports describe **active malware campaigns targeting Windows users** with a focus on **credential, session, and wallet theft** delivered through social engineering and abuse of legitimate services. **CharlieKirk Grabber**, a Python infostealer packaged with *PyInstaller*, is distributed via phishing, cracked software, cheats, and social-media lures; it kills browser processes (via `TASKKILL`) to access credential stores, collects passwords/cookies/autofill/Wi‑Fi data, zips the loot, uploads it to *GoFile*, and relays the download link to operators via **Discord webhooks** or **Telegram bots**. Separately, attackers are buying **Facebook ads** impersonating Microsoft to drive victims to cloned Windows 11 download pages on lookalike domains (e.g., `ms-25h2-update[.]pro`), delivering a malicious installer that steals saved passwords, browser sessions, and **cryptocurrency wallet** data; the campaign uses **geofencing/sandbox evasion** to show benign content to data-center IPs while serving malware to likely end users. Other contemporaneous activity highlights broader Windows-targeted intrusion tradecraft and adjacent threats. FortiGuard Labs reported **Winos 4.0 (ValleyRat)** phishing campaigns in Taiwan using tax and e-invoice lures, with delivery chains including malicious **LNK** downloaders, **DLL sideloading**, and **BYOVD** using the vulnerable driver `wsftprm.sys`, supported by rapidly rotating domains and cloud hosting. In LATAM, a fake bank-receipt lure delivers **XWorm v5.6** via a `.pdf.js` double-extension WSH dropper that uses junk-padding and Unicode obfuscation, then reconstructs and runs PowerShell (spawned via WMI) and abuses trusted hosting (e.g., Cloudinary) for later stages—enabling credential theft and potential ransomware follow-on. Additional reporting covered a USB-propagating **Monero cryptomining** operation capable of crossing air-gapped environments, a new Linux **SysUpdate** variant with encrypted C2 traffic (and a Unicorn Engine-based decryption approach developed during DFIR), and the **Foxveil** loader abusing **Cloudflare Pages, Netlify, and Discord** to stage shellcode and persist via services or *SysWOW64* masquerading—these are separate threats but reinforce the trend of attackers blending into trusted infrastructure and common user workflows.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.