Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

Employees Searching Payroll Portals on Google Tricked Into Sending Paychecks to Hackers

The Hacker News by The Hacker News
May 27, 2025
Home Cybersecurity
Share on FacebookShare on Twitter


Threat hunters have exposed a novel campaign that makes use of search engine optimization (SEO) poisoning techniques to target employee mobile devices and facilitate payroll fraud.

The activity, first detected by ReliaQuest in May 2025 targeting an unnamed customer in the manufacturing sector, is characterized by the use of fake login pages to access the employee payroll portal and redirect paychecks into accounts under the threat actor’s control.

“The attacker’s infrastructure used compromised home office routers and mobile networks to mask their traffic, dodging detection and slipping past traditional security measures,” the cybersecurity company said in an analysis published last week.

“The adversary specifically targeted employee mobile devices with a fake website impersonating the organization’s login page. Armed with stolen credentials, the adversary gained access to the organization’s payroll portal, changed direct deposit information, and redirected employees’ paychecks into their own accounts.”

While the attacks have not been attributed to a specific hacking group, ReliaQuest said it’s part of a broader, ongoing campaign owing to two similar incidents it investigated in late 2024.

It all starts when an employee searches for their company’s payroll portal on search engines like Google, with deceptive lookalike websites surfacing to the top of the results using sponsored links. Those who end up clicking on the bogus links are led to a WordPress site that redirects to a phishing page mimicking a Microsoft login portal when visited from a mobile device.

The credentials entered on the fake landing page are subsequently exfiltrated to an attacker-controlled website, while also establishing a two-way WebSocket connection in order to alert the threat actor of stolen passwords using a push notifications API powered by Pusher.

Cybersecurity

This gives attackers an opportunity to reuse the credentials as soon as possible before they are changed and gain unauthorized access to the payroll system.

On top of that, the targeting of employee mobile devices offers twofold advantages in that they lack enterprise-grade security measures typically available in desktop computers and they connect outside of the corporate network, effectively reducing visibility and hampering investigation efforts.

“By targeting unprotected mobile devices that lack security solutions and logging, this tactic not only evades detection but also disrupts efforts to analyze the phishing website,” ReliaQuest said. “This prevents security teams from scanning the site and adding it to indicators of compromise (IOC) threat feeds, further complicating mitigation efforts.”

In a further attempt to sidestep detection, the malicious login attempts have been found to originate from residential IP addresses associated with home office routers, including those from brands like ASUS and Pakedge.

This indicates that the threat actors are exploiting weaknesses like security flaws, default credentials, or other misconfigurations often plaguing such network devices to launch brute-force attacks. Compromised routers are then infected with malware that enlists them into proxy botnets, which are eventually rented out to cybercriminals.

“When attackers use proxy networks, especially ones tied to residential or mobile IP addresses, they become much harder for organizations to detect and investigate,” ReliaQuest said. “Unlike VPNs, which are often flagged because their IP addresses have been abused before, residential or mobile IP addresses let attackers fly under the radar and avoid being classified as malicious.”

“What’s more, proxy networks allow attackers to make their traffic look like it originates from the same geographical location as the target organization, bypassing security measures designed to flag logins from unusual or suspicious locations.”

The disclosure comes as Hunt.io detailed a phishing campaign that employs a fake Adobe Shared File service web page to steal Microsoft Outlook login credentials under the pretext of allowing access to files purportedly shared by a contact. The pages, per the company, are developed using the W3LL phishing kit.

It also coincides with the discovery of a new phishing kit codenamed CoGUI that’s being used to actively target Japanese organizations by impersonating well-known consumer and finance brands such as Amazon, PayPay, MyJCB, Apple, Orico, and Rakuten. As many as 580 million emails have been sent between January and April 2025 as part of campaigns using the kit.

“CoGUI is a sophisticated kit that employs advanced evasion techniques, including geofencing, headers fencing, and fingerprinting to avoid detection from automated browsing systems and sandboxes,” enterprise security firm Proofpoint said in an analysis released this month. “The objective of the campaigns is to steal usernames, passwords, and payment data.”

The phishing emails observed in the attacks include links that lead to credential phishing websites. That said, it’s notable that CoGUI campaigns do not include capabilities to collect multi-factor authentication (MFA) codes.

CoGUI is said to have been put to use since at least October 2024, and is believed to share some similarities with another well-known phishing toolkit codenamed Darcula – suggesting that the former could be part of the same Chinese PhaaS ecosystem dubbed Smishing Triad that also includes Lucid and Lighthouse.

That said, one crucial aspect that separates Darcula from CoGUI is that the former is focused more on mobile and smishing, and aims to steal credit card details.

“Darcula is becoming more accessible, both in terms of cost and availability, so it could pose a significant threat in the future,” PRODAFT told The Hacker News in a statement. “On the other hand, Lucid continues to stay under the radar. It remains challenging to identify phishing kits just by looking at SMS messages or URL patterns, as they often use common delivery services.”

Cybersecurity

Another new customizable smishing kit that has emerged out of the Chinese cybercrime landscape is Panda Shop, which uses a network of Telegram channels and interactive bots to automate service delivery. The phishing pages are designed to mimic popular brands and government services to steal personal information. Intercepted credit card data is sent to underground carding shops and sold to other cybercriminals.

“Notably, the Chinese cybercriminal syndicates involved in smishing are brazen because they feel untouchable,” Resecurity said. “They have emphasized in their communications that they do not care about U.S. law enforcement agencies. Residing in China, they enjoy complete freedom of action and engage in many illegal activities.”

Resecurity, which identified Panda Shop in March 2025, said the threat actor operates a crime-as-a-service model similar to that of Smishing Triad, offering customers the ability to distribute smishing messages via Apple iMessage and Android RCS using compromised Apple and Gmail accounts purchased in bulk.

It’s believed that Panda Shop includes Smishing Triad members based on the similarities in the phishing kits used. A plurality of threat actors have also been observed leveraging the smishing kit for Google Wallet and Apple Pay fraud.

“The actors behind smishing campaigns are tightly connected with those involved in merchant fraud and money laundering activity,” Resecurity said. “Smishing is one of the main catalysts behind carding activities, providing cybercriminals with substantial volumes of compromised data collected from victims.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.





Source link

Tags: computer securitycyber attackscyber newscyber security newscyber security news todaycyber security updatescyber updatesdata breachhacker newshacking newshow to hackinformation securitynetwork securityransomware malwaresoftware vulnerabilitythe hacker news
The Hacker News

The Hacker News

Next Post
Carl Pei Thinks the Phone of the Future Will Only Have One App

Carl Pei Thinks the Phone of the Future Will Only Have One App

Recommended.

ESG Has a Branding Problem

ESG Has a Branding Problem

August 30, 2024
STL vertieft Partnerschaft mit Netomnia zur Beschleunigung des zukunftsfähigen Glasfaserausbaus in Großbritannien

STL vertieft Partnerschaft mit Netomnia zur Beschleunigung des zukunftsfähigen Glasfaserausbaus in Großbritannien

September 27, 2025

Trending.

⚡ Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More

⚡ Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More

October 6, 2025
Cloud Computing on the Rise: Market Projected to Reach .6 Trillion by 2030

Cloud Computing on the Rise: Market Projected to Reach $1.6 Trillion by 2030

August 1, 2025
Stocks making the biggest moves midday: Autodesk, PayPal, Rivian, Nebius, Waters and more

Stocks making the biggest moves midday: Autodesk, PayPal, Rivian, Nebius, Waters and more

July 14, 2025
The Ultimate MSP Guide to Structuring and Selling vCISO Services

The Ultimate MSP Guide to Structuring and Selling vCISO Services

February 19, 2025
Translators’ Voices: China shares technological achievements with the world for mutual benefit

Translators’ Voices: China shares technological achievements with the world for mutual benefit

June 3, 2025

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio