The potential victims receive a bogus "Internet Server Service Alert" seemingly coming from their email provider, with an offer to secure their mailbox from spamming mailing lists that seems just a click on a link away.
Bizarrely enough, the page on which they land bears a logo of a real estate company and offers access to a secured auction page:
Now, where have I seen this already?
As it turns out, the page is an exact copy of one used in another phishing campaign spotted in May, when the spammy email and phishing page actually pushed the same agenda, and were trying to take advantage of the users' vague familiarity with the OpenID authentication method.
As it was then, the current phishing is hosted on a compromised legitimate site, which is currently detected by all 28 phishing URL scanning services used by the VirusTotal service as a "clean site."
"Cybercriminals are masters of multi-tasking," comments Webroot's Dancho Danchev. "For instance, whenever a web server gets compromised, they will not only use its clean IP reputation to host phishing, spam and malware samples on it, they will also sell access to the shell allowing other cybercriminals the opportunity to engage in related malicious activities such as, mass scanning of remotely exploitable web application vulnerabilities."
By subscribing to our early morning news update, you will receive a daily digest of the latest security news published on Help Net Security.
With over 500 issues so far, reading our newsletter every Monday morning will keep you up-to-date with security risks out there.