Phishing campaign targets customers of major Italian web hosting provider

Researchers have uncovered a large-scale phishing campaign targeting customers of one of Italy’s largest web hosting and IT service providers in an effort to steal sensitive data and payment information.

The operation used a sophisticated phishing kit designed to impersonate the login and payment pages of Aruba S.p.A., stealing customer credentials and credit card details. Aruba operates several major data centers in Italy and abroad and serves more than 5.4 million customers.

“Such a target offers significant payoff: compromising a single account can expose critical business assets, from hosted websites to domain controls and email environments,” researchers at cybersecurity firm Group-IB said in a report published Thursday.

The phishing kit — sold as a service to other cybercriminals — goes far beyond a simple fake website. It includes CAPTCHA filtering to evade security scanners, pre-fills user data to appear more legitimate and uses Telegram bots to instantly exfiltrate stolen information.

“Telegram is the central nervous system for this entire operation,” the researchers said, adding that they identified multiple Telegram chats used to coordinate the Aruba campaign and promote phishing kits to other criminals.

Victims typically receive an email claiming their Aruba service is about to expire or that a payment has failed. The message directs them to a fake Aruba login page, where their email address is preloaded for credibility. Once credentials are entered, they are sent directly to the attackers while the victim is redirected to the legitimate Aruba website.

The attackers also use a fake payment page requesting a small fee — typically around $5 — to trick users into entering their credit card information and one-time password, giving the criminals all the details needed to authorize fraudulent transactions in real time.

Group-IB has not attributed the operation to any specific threat actor. Aruba did not immediately respond to a request for comment. It remains unclear how many users were affected or how much money the attackers stole.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

Operation Endgame: Police reveal takedowns of three key cybercrime tools

Next Post

Russian Hackers Create 4,300 Fake Travel Sites to Steal Hotel Guests’ Payment Data

Related Posts

Nigeria Arrests RaccoonO365 Phishing Developer Linked to Microsoft 365 Attacks

Authorities in Nigeria have announced the arrest of three "high-profile internet fraud suspects" who are alleged to have been involved in phishing attacks targeting major corporations, including the main developer behind the RaccoonO365 phishing-as-a-service (PhaaS) scheme. The Nigeria Police Force National Cybercrime Centre (NPF–NCCC) said investigations conducted in collaboration with
Read More

APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign

The Russian state-sponsored threat actor known as APT28 has been attributed to what has been described as a "sustained" credential-harvesting campaign targeting users of UKR[.]net, a webmail and news service popular in Ukraine. The activity, observed by Recorded Future's Insikt Group between June 2024 and April 2025, builds upon prior findings from the cybersecurity company in May 2024 that
Read More

Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch

A critical security flaw has been disclosed in Apache Tika that could result in an XML external entity (XXE) injection attack. The vulnerability, tracked as CVE-2025-66516, is rated 10.0 on the CVSS scoring scale, indicating maximum severity. "Critical XXE in Apache Tika tika-core (1.13-3.2.1), tika-pdf-module (2.0.0-3.2.1) and tika-parsers (1.13-1.28.5) modules on all platforms allows an
Read More