Hunt.io researchers have uncovered an ongoing and highly coordinated phishing campaign targeting critical sectors in Kuwait, including fisheries, telecommunications, and insurance. First detected in early 2025, the operation leverages over 230 deceptive domains to harvest user credentials. Attackers use sophisticated tactics to mimic trusted Kuwaiti brands and lure victims into providing sensitive information. The majority of the phishing infrastructure is hosted on servers operated by Aeza International Ltd, known for offering low-cost virtual private servers. Hunt.io analysts observed phishing portals on IPs like 78.153.136.29, 134.124.92.70, and 138.124.78.35. These servers often hosted multiple fake websites simultaneously, impersonating prominent organizations. Shared SSH key fingerprints and ASN overlaps helped researchers connect the various assets into a single campaign. Unlike traditional typosquatting, the attackers register domains that use transliterations and vague brand references to appear legitimate. Examples include alwattnya[.]com, wtanaya[.]com, dalmonfishs[.]com, and zain-kw[.]pro. Fake storefronts such as those mimicking the National Fishing Company of Kuwait included seafood listings and promotions, while zain-kw[.]pro spoofed Zain's mobile payment page to capture phone numbers—potentially for SIM swapping or further phishing. The campaign’s reach extends beyond Kuwait, with infrastructure like 89.208.97.251 used to target Bahraini entities such as Delmon Fish through domains like dalmon-bh[.]com. The coordinated nature and shared infrastructure point to centralized management and continued phishing operations across industries in the Gulf region.
Customers of Renault and its subsidiary Dacia in the United Kingdom have been informed that their personal data was compromised after a cyberattack on one of the carmaker’s third...
DrayTek has recently fixed a serious security problem called CVE-2025-10547 that affects its DrayOS router series. This problem lets attackers take control of weak routers by sendi...
A threat actor known as Cavalry Werewolf, with overlaps in sharing with the hacking group YoroTrooper, has been seen attacking the Russian public sector using malware families like...