PULSE NAME
Attackers Abuse Legitimate Cloud and CDN platforms to Host Phishing Kits
WHITE cryptocti 2026-01-17 Modified: 2026-01-17
3
IOCs
LOW VOLUME
Attackers are abusing legitimate infrastructure providers like Google, Microsoft Azure and AWS CloudFront to host phishing kits and credential- harvesting infrastructure. They user legitimate sources to bypass security filters.
Indicators of Compromise (3)
All domain
TYPEINDICATORDESCRIPTIONCREATED
domain aircosspascual.com 2026-01-17
domain kamitore.com 2026-01-17
domain mphdvh.icu 2026-01-17