Sophisticated Phishing Attack Exploits Niftycom to Evade Detection and Harvest Credentials

Listen to this Post

Featured Image
Cybercriminals Weaponize Legitimate Japanese ISP Infrastructure in Multi-Wave Campaign

In an alarming development, cybersecurity researchers at Raven have uncovered a highly sophisticated phishing campaign that managed to bypass most traditional email defenses. What sets this campaign apart is not just its technical prowess but its cunning use of legitimate platforms to deliver malicious content. Instead of spoofing domains or using fake senders—common tactics in phishing attempts—the attackers cleverly exploited Nifty.com, a trusted Japanese internet service provider (ISP), to send authenticated phishing emails that easily slipped past secure email gateways.

This campaign showcases a new era of phishing, where threat actors use legitimate infrastructure and advanced evasion methods to remain undetected. The attacks were not only technically complex but also strategically timed and thematically consistent, mimicking business-related communication such as execution agreements and SAFE contracts. This deliberate targeting of professional workflows, paired with automation, suggests the involvement of sophisticated phishing toolkits—possibly powered by AI.

As the campaign evolved through multiple waves from late April into May, it demonstrated adaptive behavior and a keen awareness of security detection mechanisms. Raven’s detection and investigation highlight how phishing has evolved far beyond poorly written emails and suspicious links. Now, attackers use professional-looking attachments, redirection chains, and email authentication protocols to carry out stealthy credential harvesting campaigns—posing a serious challenge to outdated cybersecurity models.

Behind the Mask: Inside the Multi-Wave Phishing Operation

The campaign began quietly on April 28 with emails disguised as “Execution Agreements.” Instead of sending emails from suspicious domains, the attackers used real accounts created on Nifty.com—a reputable ISP—to send their phishing messages. Because these emails came from legitimate infrastructure and passed key email authentication protocols like SPF, DKIM, and DMARC, they sailed through most email filters and reached inboxes without raising red flags.

Over the following weeks, the attackers evolved their strategy. They repeated the theme with different labels, such as “SAFE agreement,” to increase their chances of success. In the final phase of the campaign, there was a noticeable uptick in email volume, with dozens being sent within minutes—signaling automation and the likely use of preconfigured phishing kits.

The emails were crafted with impressive attention to detail. They lacked the hallmarks of typical phishing, such as grammar mistakes or odd formatting. The body of the email contained no malicious links. Instead, the phishing payloads were hidden inside attachments—mostly PDFs and HTML files—named in a way to seem relevant to business activities. These HTML attachments used redirect chains, beginning with seemingly innocent marketing trackers, that ultimately led victims to phishing sites hosted on obscure domains. These sites used heavily obfuscated JavaScript and included recipient identifiers embedded in the URLs for personalized tracking.

To further evade detection, the attackers used advanced tricks like HTML padding, MIME encoding, and spoofed display names like “Name via DocuSign.” These emails looked exactly like legitimate business messages, making them highly effective at deceiving recipients.

Despite the effort to appear benign, Raven’s threat detection systems caught subtle anomalies—such as strange sender-recipient relationships, repeated use of identical attachments, and behavior patterns inconsistent with genuine business communication. Eventually, the redirect chains were linked to malicious infrastructure, confirming the phishing intent.

The ultimate goal of this campaign was to steal login credentials and session tokens, especially for Gmail. Given the complexity and precision of the attacks, security researchers believe that the perpetrators used automated systems and high-quality phishing kits, possibly enhanced with AI.

This incident demonstrates that traditional defenses, which rely heavily on flagging suspicious content or authentication failures, are no longer sufficient. The attackers cleverly used authenticated, clean emails that blended into regular traffic, revealing the urgent need for smarter, behavior-based email security solutions.

What Undercode Say:

This phishing operation represents a turning point in cyberattack strategy. It’s not just another email scam—it’s a blueprint for how cybercriminals can weaponize trust. By hijacking a legitimate ISP’s infrastructure and following proper email authentication procedures, attackers now have the means to walk right past most of the defenses companies have in place.

What’s particularly dangerous is the campaign’s avoidance of the usual phishing triggers. These emails were clean on the surface—no suspicious domains, no broken language, and no spammy formatting. Instead, the attackers embedded their traps within innocuous attachments and routed their victims through a maze of redirects that only the most advanced detection tools could trace.

The use of business-related lures such as “Execution Agreements” and “SAFE contracts” shows a high level of social engineering. It’s clear that these messages were tailored for professionals, aiming to exploit everyday workflows. This is not just opportunistic phishing—it’s highly targeted, well-researched, and supported by automation.

What we’re seeing is the evolution of phishing from sloppy scams to professional campaigns. With phishing kits possibly powered by AI, threat actors can now produce error-free, convincing emails that look better than the real thing. That changes the entire playing field.

The abuse of platforms like Nifty.com also reveals a serious blind spot in current email security practices. Most systems are still built around blocking bad actors. But what happens when the bad actors look good on paper? That’s the challenge this campaign exposes.

Behavioral analysis, zero-trust architecture, and anomaly detection are now essential. It’s not enough to look at where an email comes from—you need to analyze how it behaves, who it’s targeting, and what it’s trying to accomplish.

For security teams, this incident is a wake-up call. Automation, email authentication, and clean delivery paths are no longer signs of safety. They might just be signs of a smarter, stealthier threat.

If this approach becomes widespread, we could be looking at a new norm where phishing campaigns become indistinguishable from legitimate business emails—unless you’re actively monitoring context, behavior, and intent. The arms race has escalated.

Fact Checker Results:

✅ The campaign abused authenticated Nifty.com accounts

✅ Advanced phishing kits and automation likely involved

✅ Traditional email defenses failed due to trust-based infrastructure use

Prediction:

Expect a rise in phishing campaigns leveraging trusted domains and email infrastructure. Cybercriminals will increasingly use legitimate services, paired with automation and AI, to craft indistinguishable phishing emails. Security systems will need to pivot from static rules to behavioral and contextual analysis to remain effective.

References:

Reported By: cyberpress.org
Extra Source Hub:
https://www.facebook.com
Wikipedia
Undercode AI

Image Source:

Unsplash
Undercode AI DI v2

Join Our Cyber World:

💬 Whatsapp | 💬 Telegram