• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

SAP fixed 26 flaws in August 2025 Update, including 4 Critical

 | 

August 2025 Patch Tuesday fixes a Windows Kerberos Zero-Day

 | 

Dutch NCSC: Citrix NetScaler zero-day breaches critical orgs

 | 

Chrome sandbox escape nets security researcher $250,000 reward

 | 

Smart Buses flaws expose vehicles to tracking, control, and spying

 | 

MedusaLocker ransomware group is looking for pentesters

 | 

Google confirms Salesforce CRM breach, faces extortion threat

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 57

 | 

Security Affairs newsletter Round 536 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

Embargo Ransomware nets $34.2M in crypto since April 2024

 | 

Germany limits police spyware use to serious crimes

 | 

Phishing attacks exploit WinRAR flaw CVE-2025-8088 to install RomCom

 | 

French firm Bouygues Telecom suffered a data breach impacting 6.4M customers

 | 

Columbia University data breach impacted 868,969 people

 | 

SonicWall dismisses zero-day fears after Ransomware probe

 | 

Air France and KLM disclosed data breaches following the hack of a third-party platform

 | 

CISA, Microsoft warn of critical Exchange hybrid flaw CVE-2025-53786

 | 

Microsoft unveils Project Ire: AI that autonomously detects malware

 | 

CERT-UA warns of UAC-0099 phishing attacks targeting Ukraine’s defense sector

 | 

Over 100 Dell models exposed to critical ControlVault3 firmware bugs

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Breaking News
  • Cyber Crime
  • Hacking
  • “My Slice”, an Italian adaptive phishing campaign

“My Slice”, an Italian adaptive phishing campaign

Pierluigi Paganini January 22, 2024

Adaptive phishing campaigns are emerging as an increasingly sophisticated threat in the cybersecurity landscape.

The phenomenon

This phenomenon represents an evolution of traditional phishing tactics, as attackers seek to overcome defenses using more personalized and targeted approaches. In an adaptive phishing campaign, attackers gather specific information about victims through various sources, such as social media, public websites, and previous data breaches. This data is then used to tailor attacks, making them more convincing and harder to detect.

One of the key elements of these campaigns is social engineering, which aims to psychologically manipulate victims. Attackers may use personal information, such as names, job roles, or company details, to create fake messages that appear to come from trusted sources.

This significantly increases the likelihood that victims will fall into phishing traps. Adaptive phishing campaigns can be delivered through e-mail, text messages, social media, or even phone calls. Attackers often exploit current events or emergency situations to elicit emotional responses and induce victims to act hastily without carefully evaluating the legitimacy of the communications.

As Cert-AgiD (https://t.me/certagid/599) has also recently put the spotlight on this issue, I take this opportunity to tell you about the “My Slice” campaign which I have personally taken over.

“My slice”, the details of the Italian campaign

Last year, a highly targeted phishing campaign that I renamed “My slice” (derived from the name of a variable in the javascript code of the landing page) targeted e-mail account holders of Italian organisations.

adaptive phishing

The e-mail message attempts to pass itself off as support from its company, which warns the caller that the memory limit of his e-mail account has been exceeded. This would prevent e-mails from being sent and received. To remedy the problem, the message invites you to check the status of your e-mail account via the proposed support page, otherwise the box will be deleted from the management servers.

The propounded web page is highly customized (https://elinajaguar[.]com/wp-admin/index.html) and looks like a form with logos and names of the targeted organization with a preset e-mail address and a password field to be typed.

adaptive phishing

Following the request, you end up handing over your login information to the scammers while being redirected to your organization’s home page. In fact, the information entered in the form is sent via a “POST” method to a manned server listening on the same domain.

To setup the highly targeted phishing campaign, the attackers:

  • First they pass the target’s e-mail address as a parameter to the phishing page. The “Clicca qui” link (https://elinajaguar[.]com/wp-admin/index.html#[someone@example.com]) passes the targeted e-mail address by pointing to it after the “#” character;
adaptive phishing
  • with a JS function they extract the e-mail domain name and invoke the http://logo.clearbit[.]com/[domain name] service to derive the company logo. The organisation’s domain name is extracted, based on the victim’s e-mail address, from the string following the @ symbol (in this case from “someone@example.com” the domain name obtained is example.com);
  • Finally with another JS function they plan to redirect the user after form submission to the home page of the target organization. The home page address is created by putting the string “http://www.” before the domain name obtained in the previous step (in this case from “example.com” the home page address is www.example.com).
adaptive phishing

How to Protect Yourself

To protect against these evolving threats, it is crucial to adopt good cybersecurity practices. Organizations and individuals should be aware of adaptive phishing techniques and implement cybersecurity training to educate users on how to recognize and avoid online scams.

In addition, the use of advanced security solutions, such as anti-phishing filters and AI-based threat detection systems, can help mitigate the risk of falling victim to these sophisticated campaigns.

In conclusion, the phenomenon of adaptive phishing campaigns underscores the need for a proactive approach to cybersecurity. Only through awareness, training and the adoption of advanced defense measures can we effectively protect our personal and business information from this growing digital threat.

Below are the IoCs of the campaign:

https://urlscan.io/result/08e72fcf-0f89-46c2-864c-f4d404764358/

https://urlscan.io/result/232d8b5f-aead-4064-8451-2b4d37d5c2a3/

About the author: Salvatore Lombardo (Twitter @Slvlombardo)

Electronics engineer and Clusit member, for some time now, espousing the principle of conscious education, he has been writing for several online magazine on information security. He is also the author of the book “La Gestione della Cyber Security nella Pubblica Amministrazione”. “Education improves awareness” is his slogan.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, phishing)


facebook linkedin twitter

adaptive phishing Cybercrime Hacking hacking news information security news IT Information Security phishing Pierluigi Paganini Security Affairs Security News

you might also like

Pierluigi Paganini August 12, 2025
August 2025 Patch Tuesday fixes a Windows Kerberos Zero-Day
Read more
Pierluigi Paganini August 12, 2025
Dutch NCSC: Citrix NetScaler zero-day breaches critical orgs
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    SAP fixed 26 flaws in August 2025 Update, including 4 Critical

    Uncategorized / August 13, 2025

    August 2025 Patch Tuesday fixes a Windows Kerberos Zero-Day

    Hacking / August 12, 2025

    Dutch NCSC: Citrix NetScaler zero-day breaches critical orgs

    Hacking / August 12, 2025

    Researchers cracked the encryption used by DarkBit ransomware

    Malware / August 12, 2025

    Chrome sandbox escape nets security researcher $250,000 reward

    Hacking / August 11, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT