Phishing campaign targets customers of major Italian web hosting provider

Researchers have uncovered a large-scale phishing campaign targeting customers of one of Italy’s largest web hosting and IT service providers in an effort to steal sensitive data and payment information.

The operation used a sophisticated phishing kit designed to impersonate the login and payment pages of Aruba S.p.A., stealing customer credentials and credit card details. Aruba operates several major data centers in Italy and abroad and serves more than 5.4 million customers.

“Such a target offers significant payoff: compromising a single account can expose critical business assets, from hosted websites to domain controls and email environments,” researchers at cybersecurity firm Group-IB said in a report published Thursday.

The phishing kit — sold as a service to other cybercriminals — goes far beyond a simple fake website. It includes CAPTCHA filtering to evade security scanners, pre-fills user data to appear more legitimate and uses Telegram bots to instantly exfiltrate stolen information.

“Telegram is the central nervous system for this entire operation,” the researchers said, adding that they identified multiple Telegram chats used to coordinate the Aruba campaign and promote phishing kits to other criminals.

Victims typically receive an email claiming their Aruba service is about to expire or that a payment has failed. The message directs them to a fake Aruba login page, where their email address is preloaded for credibility. Once credentials are entered, they are sent directly to the attackers while the victim is redirected to the legitimate Aruba website.

The attackers also use a fake payment page requesting a small fee — typically around $5 — to trick users into entering their credit card information and one-time password, giving the criminals all the details needed to authorize fraudulent transactions in real time.

Group-IB has not attributed the operation to any specific threat actor. Aruba did not immediately respond to a request for comment. It remains unclear how many users were affected or how much money the attackers stole.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

Operation Endgame: Police reveal takedowns of three key cybercrime tools

Next Post

Russian Hackers Create 4,300 Fake Travel Sites to Steal Hotel Guests’ Payment Data

Related Posts

Webinar: The “Agentic” Trojan Horse: Why the New AI Browsers War is a Nightmare for Security Teams

The AI browser wars are coming to a desktop near you, and you need to start worrying about their security challenges. For the last two decades, whether you used Chrome, Edge, or Firefox, the fundamental paradigm remained the same: a passive window through which a human user viewed and interacted with the internet. That era is over. We are currently witnessing a shift that renders the old
Read More

TikTok Forms U.S. Joint Venture to Continue Operations Under 2025 Executive Order

TikTok on Friday officially announced that it formed a joint venture that will allow the hugely popular video-sharing application to continue operating in the U.S. The new venture, named TikTok USDS Joint Venture LLC, has been established in compliance with the Executive Order signed by U.S. President Donald Trump in September 2025, the platform said. The new deal will see TikTok's Chinese
Read More

Python-Based WhatsApp Worm Spreads Eternidade Stealer Across Brazilian Devices

Cybersecurity researchers have disclosed details of a new campaign that leverages a combination of social engineering and WhatsApp hijacking to distribute a Delphi-based banking trojan named Eternidade Stealer as part of attacks targeting users in Brazil. "It uses Internet Message Access Protocol (IMAP) to dynamically retrieve command-and-control (C2) addresses, allowing the threat actor to
Read More