Menace actors have orchestrated a multi-wave phishing marketing campaign between April and Might 2025, leveraging the respectable infrastructure of Nifty[.]com, a distinguished Japanese Web Service Supplier (ISP), to execute their assaults.
Uncovered by Raven, a number one risk detection entity, this operation stands out attributable to its skill to evade standard e mail safety programs by abusing trusted domains reasonably than spoofing them.
A Stealthy Marketing campaign Bypassing Conventional Defenses
By registering free shopper accounts on Nifty[.]com, attackers despatched phishing emails instantly by way of the ISP’s mail servers, reminiscent of mta-snd-e0X.mail.nifty[.]com, utilizing IP ranges like 106.153.226.0/24 and 106.153.227.0/24.
The emails handed all customary authentication protocols, together with SPF, DKIM, and DMARC, rendering them invisible to most safe e mail gateways (SEGs) that depend on these checks to flag malicious exercise.
This exploitation of respectable infrastructure highlights a crucial vulnerability in legacy defenses that usually give attention to damaged authentication or blacklisted domains.
The marketing campaign unfolded in a number of waves, starting on April 28, 2025, with an preliminary lure themed round an “Execution Settlement,” adopted by subsequent waves on Might 7, Might 16 with a SAFE settlement variant, and a high-volume burst on Might 23, the place dozens of emails had been despatched in below a minute.
This sample suggests automation and probably the usage of phishing kits for orchestration. The emails contained no direct malicious hyperlinks within the physique, as an alternative embedding payloads in attachments like PDFs and HTML recordsdata with names reminiscent of “SAFE_Terms_May2025.pdf” and “Execution_Agreement.html.”
These attachments initiated redirect chains by way of seemingly benign advertising and marketing trackers earlier than resulting in phishing websites hosted on obfuscated domains like 2vf78gnafutdc5zqmhng[.]iqmwpx[.]ru, designed for credential harvesting, together with Gmail session and token theft.
Adaptive Assault Waves
Strategies reminiscent of HTML padding with whitespace characters, multipart MIME constructions to cover payloads, show title spoofing (e.g., “Identify by way of DocuSign”), and flawless AI-generated grammar additional ensured the emails bypassed conventional filters.

Raven recognized the risk by way of behavioral indicators, together with uncommon sender-recipient mixtures, repeated use of contract-related lures, model impersonation, similar attachment patterns, and suspicious redirect chains.
This medium-to-high sophistication assault underscores the constraints of legacy e mail safety programs, which regularly fail to detect threats missing apparent pink flags like damaged authentication or suspicious URLs within the e mail physique.
The abuse of authenticated infrastructure and the adaptive, evasive nature of the marketing campaign sign a rising development in phishing operations the place attackers mix into trusted environments to maximise impression.
Raven’s detection of this marketing campaign, regardless of clear headers and legitimate authentication, emphasizes the necessity for superior behavioral evaluation and anomaly detection to fight such threats.
Organizations should evolve past conventional defenses, adopting options that scrutinize person conduct, content material patterns, and hidden redirect mechanisms to safeguard in opposition to more and more refined phishing makes an attempt exploiting respectable platforms.
Discover this Information Attention-grabbing! Comply with us on Google Information, LinkedIn, & X to Get Immediate Updates!