{"id":20662,"date":"2026-05-05T12:59:53","date_gmt":"2026-05-05T12:59:53","guid":{"rendered":"https:\/\/any.run\/cybersecurity-blog\/?p=20662"},"modified":"2026-05-05T13:42:24","modified_gmt":"2026-05-05T13:42:24","slug":"us-fake-invitation-phishing","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/us-fake-invitation-phishing\/","title":{"rendered":"New Phishing\u00a0Campaign Targets US with Credential Theft: What CISOs Need to Know"},"content":{"rendered":"\n<p>A new large-scale phishing campaign is targeting U.S. organizations with fake event invitations that lead to credential theft, OTP interception, or RMM tool installation.<\/p>\n\n\n\n<p><a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=US-fake-invitation-phishing&amp;utm_term=050526&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a> researchers found that the campaign uses a repeatable phishing framework to create event-themed lure pages at scale. Some pages steal email credentials and OTP codes, while others deliver legitimate remote management tools such as ScreenConnect, ITarian, Datto RMM, ConnectWise, and LogMeIn Rescue.<\/p>\n\n\n\n<p>For CISOs, the risk is not just another phishing wave. It is the combination of credential theft, trusted remote access tools, and infrastructure designed to look legitimate. That mix can delay detection, stretch SOC triage, weaken response confidence, and create a path to remote access before the business fully understands what happened.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Key Takeaways<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>A large-scale fake invitation phishing campaign is targeting U.S. organizations<\/strong>: ANY.RUN researchers found nearly 160 suspicious links related to the campaign and around 80 phishing domains.<\/li>\n\n\n\n<li><strong>The campaign creates more than one access risk<\/strong>: Some lure pages steal email credentials and OTP codes, while others deliver legitimate RMM tools for remote management.<\/li>\n\n\n\n<li><strong>The early attack flow can look routine<\/strong>:&nbsp;Victims see a CAPTCHA check and an event invitation page before the campaign moves toward credential theft or RMM delivery.<\/li>\n\n\n\n<li><strong>Repeatable infrastructure gives SOC teams huntable signals<\/strong>: Shared URL patterns, fixed resource paths such as <code>\/Image\/*.png<\/code>, and requests to <code>\/favicon.ico<\/code> and <code>\/blocked.html<\/code> help connect related activity.<\/li>\n\n\n\n<li><strong>For CISOs, the risk is delayed detection and response<\/strong>:&nbsp;One fake invitation can lead to mailbox compromise, OTP interception, or remote access before the business has clear evidence of impact.<\/li>\n\n\n\n<li><strong><a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=US-fake-invitation-phishing&amp;utm_term=050526&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a> helps CISOs strengthen phishing response readiness<\/strong>:&nbsp;SOC teams get the visibility to validate threats faster, reduce gray-zone investigations, and contain risk before it becomes account compromise or remote access.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">The&nbsp;Phishing&nbsp;Blind&nbsp;Spot&nbsp;CISOs&nbsp;Need&nbsp;to&nbsp;Close&nbsp;<\/h2>\n\n\n\n<p>Most enterprise security programs are built to catch obvious signs of compromise: known malicious domains, suspicious payloads, credential abuse, or unauthorized remote access. This campaign creates a harder problem because the early stages can look like normal user behavior.<\/p>\n\n\n\n<p>The attack starts with a CAPTCHA check and a fake event invitation. From there, it can lead to credential theft, OTP interception, or the installation of a legitimate RMM tool. Each step may look harmless inisolation, but together they create a path to account compromise or remote access.<\/p>\n\n\n\n<p>For CISOs, the risk is clear: if the SOC only reacts after credentials are stolen or remote access is established, the organization is already behind the attack.<\/p>\n\n\n\n<p>The&nbsp;outcome&nbsp;can&nbsp;be&nbsp;serious:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Slower&nbsp;detection&nbsp;because&nbsp;early&nbsp;phishing&nbsp;signals&nbsp;look&nbsp;routine&nbsp;<\/li>\n\n\n\n<li>Greater chance of unauthorized access through legitimate RMM tools<\/li>\n\n\n\n<li>Higher&nbsp;risk&nbsp;of&nbsp;credential&nbsp;and&nbsp;OTP&nbsp;compromise&nbsp;<\/li>\n\n\n\n<li>More&nbsp;pressure&nbsp;on&nbsp;SOC&nbsp;teams&nbsp;to&nbsp;connect&nbsp;fragmented&nbsp;signals&nbsp;quickly&nbsp;<\/li>\n\n\n\n<li>Delayed&nbsp;containment&nbsp;when&nbsp;domains&nbsp;and&nbsp;lure&nbsp;pages&nbsp;keep&nbsp;changing&nbsp;<\/li>\n\n\n\n<li>Weaker&nbsp;confidence&nbsp;that&nbsp;phishing&nbsp;activity&nbsp;is&nbsp;being&nbsp;caught&nbsp;before&nbsp;business&nbsp;impact&nbsp;<\/li>\n<\/ul>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nStop fake lures from turning into real incidents. \n <br>\n<span class=\"highlight\">Give your SOC the visibility to detect and contain threats earlier. <br><\/span><\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/any.run\/enterprise\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=US-fake-invitation-phishing&#038;utm_term=050526&#038;utm_content=linktoenterprise#contact-sales\" rel=\"noopener\" target=\"_blank\">\nContact us\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h2 class=\"wp-block-heading\">High-Exposure&nbsp;Sectors&nbsp;for&nbsp;This&nbsp;Campaign&nbsp;<\/h2>\n\n\n\n<p>ANY.RUN\u2019s <a href=\"https:\/\/any.run\/threat-intelligence-lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=US-fake-invitation-phishing&amp;utm_term=050526&amp;utm_content=linktotilookuplanding\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Intelligence<\/a> shows that most analysis tasks related to this campaign came from the <strong>United States<\/strong>, suggesting that U.S. organizations may be the primary target.<\/p>\n\n\n\n<p>As of April 27, nearly <strong>160 suspicious links<\/strong> related to this campaign had been analyzed in <a href=\"https:\/\/any.run\/features\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=US-fake-invitation-phishing&amp;utm_term=050526&amp;utm_content=linktosandboxlanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN\u2019s sandbox<\/a>, with around <strong>80 phishing domains<\/strong> identified. Most of these domains were registered underthe <strong>.de<\/strong> top-level domain, starting from December 2025.<\/p>\n\n\n\n<p>TI&nbsp;Query:&nbsp;<a href=\"https:\/\/intelligence.any.run\/analysis\/lookup?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=US-fake-invitation-phishing&amp;utm_term=050526&amp;utm_content=linktotilookup#{%22query%22:%22url:%5C%22\/blocked.html%5C%22%20AND%20url:%5C%22\/favicon.ico%5C%22%20and%20url:%5C%22\/Image\/*.png%5C%22%22,%22dateRange%22:180}\" target=\"_blank\" rel=\"noreferrer noopener\">url:&#8221;\/blocked.html&#8221; AND&nbsp;url:&#8221;\/favicon.ico&#8221; and&nbsp;url:&#8221;\/Image\/*.png&#8221;<\/a>&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"499\" src=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image24-1024x499.png\" alt=\"TI Lookup showing relevant industries and submission countries for broader context \" class=\"wp-image-20670\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image24-1024x499.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image24-300x146.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image24-768x375.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image24-1536x749.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image24-370x180.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image24-270x132.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image24-740x361.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image24.png 1706w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>TI&nbsp;Lookup&nbsp;showing relevant industries and submission countries for broader context<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>The most affected industries include <strong>Education, Banking, Government, Technology, and Healthcare<\/strong> \u2014 sectors where email access, identity, and remote administration are part of everyday operations.<\/p>\n\n\n\n<p>For CISOs in these sectors, the concern is practical: one fake invitation can lead to stolen mailbox access, intercepted OTP codes, or a remote access tool running inside the environment.<\/p>\n\n\n\n<p>The campaign also shows signs of scale. Threat actors appear to use a single framework to mass-deploy event-themed lure sites, while some page elements suggest possible AI-assisted generation. For security teams, this means the attack surface can change quickly, but the repeatable structure creates detection opportunities. When SOC teams can catch these patterns early, they can reduce investigation uncertainty, validate threats faster, and contain phishing activity before it turns into account compromise or remote access.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How&nbsp;the&nbsp;Campaign&nbsp;Moves&nbsp;From&nbsp;Lure&nbsp;to&nbsp;Access&nbsp;<\/h2>\n\n\n\n<p>On April 22, 2026, ANY.RUN researchers&nbsp;identified&nbsp;a phishing campaign targeting email service credentials and, in some cases, delivering remote management software.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Chain-1024x538.png\" alt=\"Full attack chain of the phishing campaign\" class=\"wp-image-20731\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Chain-1024x538.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Chain-300x158.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Chain-768x403.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Chain-1536x806.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Chain-2048x1075.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Chain-370x194.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Chain-270x142.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Chain-740x389.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Full attack chain of the phishing campaign<\/em><\/figcaption><\/figure><\/div>\n\n\n<h3 class=\"wp-block-heading\">Fake&nbsp;Invitation&nbsp;Pages&nbsp;as&nbsp;the&nbsp;Entry&nbsp;Point&nbsp;<\/h3>\n\n\n\n<p>The campaign uses fake event invitation pages as the main lure. Victims are first taken through a CAPTCHA check, most often from Cloudflare, although other providers also appear in some cases. After that, they land on a phishing page telling them they have received an invitation.<\/p>\n\n\n\n<p>From there, the campaign can move in two directions. Some pages are built to steal credentials. Others are designed to deliver remote management tools.&nbsp;<\/p>\n\n\n\n<p>In the RMM delivery flow, the page may show a single download button or skip the button entirely and start the download automatically. In one ANY.RUN analysis session, the lure page starts the download without requiring further action from the user:<\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/4c2687da-1426-43c3-8e16-868f90fb9361?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=US-fake-invitation-phishing&amp;utm_term=050526&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">View analysis session with lure<\/a>&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"554\" src=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image11-1024x554.png\" alt=\"Fake invitation used as a lure\" class=\"wp-image-20671\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image11-1024x554.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image11-300x162.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image11-768x415.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image11-1536x831.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image11-370x200.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image11-270x146.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image11-740x400.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image11.png 1875w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Fake&nbsp;invitation&nbsp;used&nbsp;as&nbsp;a&nbsp;lure<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>In another session, the page includes a download button, but the file still begins downloading automatically:&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/dcbc4301-f029-491c-afa6-8b896c538887\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=US-fake-invitation-phishing&amp;utm_term=050526&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">View analysis session with download button<\/a>&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"577\" src=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image12-1024x577.png\" alt=\"Analysis session with fake invitation  \" class=\"wp-image-20672\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image12-1024x577.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image12-300x169.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image12-768x433.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image12-1536x865.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image12-370x208.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image12-270x152.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image12-740x417.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image12.png 1871w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Analysis&nbsp;session&nbsp;with&nbsp;fake&nbsp;invitation&nbsp;<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>Additional&nbsp;lure pages following the same pattern were also&nbsp;observed:&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/a99ce750-89b1-4012-82aa-5a125bf029a8?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=US-fake-invitation-phishing&amp;utm_term=050526&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">View analysis session<\/a>&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"555\" src=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image13-1024x555.png\" alt=\"Analysis session with a download button to download the invitation \" class=\"wp-image-20673\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image13-1024x555.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image13-300x163.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image13-768x417.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image13-1536x833.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image13-370x201.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image13-270x146.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image13-740x401.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image13.png 1875w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Analysis session with a download button to download&nbsp;the invitation<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>Check out other&nbsp;sandbox&nbsp;sessions with the fake invitation:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/92d3a4b3-42ba-46b1-b5bb-68ed6e442b24\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=US-fake-invitation-phishing&amp;utm_term=050526&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Analysis session 1<\/a>&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/app.any.run\/tasks\/81afb42c-f072-4df9-a2e4-013a1ac340f4\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=US-fake-invitation-phishing&amp;utm_term=050526&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Analysis session 2<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>ANY.RUN researchers also found signs that some pages were created using a shared phishing site&nbsp;toolkit, or&nbsp;phish kit. The code in several sessions&nbsp;contained&nbsp;instructions for the campaign operator on how to edit the page, suggesting a reusable setup for building and launching new lure sites quickly:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/4c2687da-1426-43c3-8e16-868f90fb9361?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=US-fake-invitation-phishing&amp;utm_term=050526&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Analysis session&nbsp;1<\/a>&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/app.any.run\/tasks\/f9e3acb4-542a-48f1-810c-30bebb209f2f?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=US-fake-invitation-phishing&amp;utm_term=050526&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Analysis session 2<\/a>&nbsp;&nbsp;<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"900\" height=\"395\" src=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Image-16.png\" alt=\"\" class=\"wp-image-20675\" style=\"width:572px;height:auto\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Image-16.png 900w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Image-16-300x132.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Image-16-768x337.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Image-16-370x162.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Image-16-270x119.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Image-16-740x325.png 740w\" sizes=\"(max-width: 900px) 100vw, 900px\" \/><\/figure><\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"281\" src=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Image-17-1024x281.png\" alt=\"Instructions on how to edit the page, written for campaign operators \" class=\"wp-image-20674\" style=\"width:576px;height:auto\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Image-17-1024x281.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Image-17-300x82.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Image-17-768x210.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Image-17-370x101.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Image-17-270x74.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Image-17-740x203.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Image-17.png 1237w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Instructions on how to edit the page, written for&nbsp;campaign operators<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>The examples above represent a sample of the activity observed by ANY.RUN researchers and illustrate the common structure used in phishing pages that deliver RMM tools.<\/p>\n\n\n\n<p>The remote management tools most often installed in these campaigns include <strong>ScreenConnect, ITarian, Datto RMM, ConnectWise, and LogMeIn Rescue<\/strong>.<\/p>\n\n\n\n<p>When the goal is credential theft, the page changes, but the entry point stays the same. In this analysis session, the chain also begins with a CAPTCHA check:<\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/736d9138-d8fd-4934-af74-1780ea0bc80a\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=US-fake-invitation-phishing&amp;utm_term=050526&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Check analysis session<\/a>&nbsp;<\/p>\n\n\n\n<p>After the check, the user is shown an event invitation message and prompted to sign in with one of the available services. An example of this message is shown below:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"545\" src=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image2-1024x545.png\" alt=\"Example message to sign in an event \" class=\"wp-image-20676\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image2-1024x545.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image2-300x160.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image2-768x409.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image2-1536x818.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image2-370x197.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image2-270x144.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image2-740x394.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image2.png 1870w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Example&nbsp;message&nbsp;to&nbsp;sign&nbsp;in&nbsp;an&nbsp;event<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<h3 class=\"wp-block-heading\">Reusable&nbsp;phishing&nbsp;infrastructure&nbsp;<\/h3>\n\n\n\n<p>The&nbsp;credential&nbsp;theft&nbsp;pages&nbsp;follow&nbsp;a&nbsp;consistent&nbsp;structure&nbsp;across&nbsp;the&nbsp;phishing&nbsp;domains. In&nbsp;most&nbsp;cases,&nbsp;only&nbsp;the&nbsp;logo&nbsp;at&nbsp;the&nbsp;top&nbsp;of&nbsp;the&nbsp;page&nbsp;changes.&nbsp;<\/p>\n\n\n\n<p>The phishing URLs also follow a repeatable format: https:\/\/&lt;phish-site&gt;\/&lt;url-pattern&gt;\/&lt;endpoint&gt;<\/p>\n\n\n\n<p>Domain names often include words related to events, invitations, greetings, parties, and similar themes. Examples include <strong>festiveparty.us<\/strong>, <strong>getceptionparty[.]de<\/strong>, and <strong>celebratieinvitiee[.]de<\/strong>, all of whichwere observed in related ANY.RUN analysis sessions:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/a1b85a4f-6985-4b16-b8b4-d802012524af?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=US-fake-invitation-phishing&amp;utm_term=050526&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Analysis session with&nbsp;getceptionparty[.]de<\/a>&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/app.any.run\/tasks\/cf3fed11-dbd7-4541-8e82-a9ecd225e0e6\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=US-fake-invitation-phishing&amp;utm_term=050526&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Analysis session with celebratieinvitiee[.]de<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nTurn phishing patterns into full campaign context. \n <br>\n<span class=\"highlight\">Bring ANY.RUN threat analysis and intelligence into your SOC. <br><\/span><\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/any.run\/plans-ti\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=US-fake-invitation-phishing&#038;utm_term=050526&#038;utm_content=linktotipricing#contact-sales\" rel=\"noopener\" target=\"_blank\">\nContact us\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<p>Another&nbsp;campaign&nbsp;marker&nbsp;is&nbsp;the&nbsp;way&nbsp;service&nbsp;icons&nbsp;are&nbsp;loaded&nbsp;on&nbsp;the&nbsp;phishing&nbsp;page. The&nbsp;icons&nbsp;are&nbsp;consistently&nbsp;stored&nbsp;under&nbsp;the&nbsp;same&nbsp;path:&nbsp;\/Image\/*.png&nbsp;<\/p>\n\n\n\n<p>The&nbsp;typical&nbsp;icon&nbsp;set&nbsp;includes:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>office360.png&nbsp;<br>(SHA-256 887bc414bdb32b83dcfccdd3c688e90d9a87a0033e3756a840f9bdd2d65c5c74);&nbsp;<\/li>\n\n\n\n<li>office.png&nbsp;<br>(SHA-256 6eaa0a448f1306bcf4159783eeafe5d37243bd8ca2728db7d90de1929241dd29);&nbsp;<\/li>\n\n\n\n<li>yahoo.png&nbsp;<br>(SHA-256 4c373bc25cb71dbb75e73b61dff25aa184be8d327053a97202a6b1a5919cab0d);&nbsp;<\/li>\n\n\n\n<li>google.png&nbsp;<br>(SHA-256 a838f99537d35e48e479a34086297f76db5d3363b0456f23d10d308f0d30ed82);&nbsp;<\/li>\n\n\n\n<li>aol.png&nbsp;<br>(SHA-256 8e94c18bbcad0644c4b04de4356fe37da9996fdf1c99bc984ba819862a9b1889);&nbsp;<\/li>\n\n\n\n<li>email.png&nbsp;<br>(SHA-256 9a53e032a6e3e79861d28568c3b6ffc97f4f3c1d3af65a703ec12966420503d9).&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Another distinctive feature of this campaign is the sequential request for the following resources: &lt;evilsite&gt;\/favicon.ico &lt;evilsite&gt;\/blocked.html<\/p>\n\n\n\n<p>As a result, when a user opens the phishing link, the following request chain is always&nbsp;observed:&nbsp;<\/p>\n\n\n\n<p><code>GET \/&nbsp;&nbsp;<br>&nbsp; \u251c\u2500 GET \/favicon.ico&nbsp;<br>&nbsp; \u251c\u2500 GET \/blocked.html&nbsp;<br>&nbsp; \u2514\u2500 GET \/&lt;url-pattern&gt;\/Image\/*.png&nbsp;<\/code><\/p>\n\n\n\n<p>This request chain can be&nbsp;observed&nbsp;in the following ANY.RUN analysis session:<\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/590eb0b6-2738-434d-965e-5dad01ab3bb4?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=US-fake-invitation-phishing&amp;utm_term=050526&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Check analysis with observed request chain<\/a>&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"813\" height=\"335\" src=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image18.png\" alt=\"Request chain observed inside ANY.RUN sandbox \" class=\"wp-image-20677\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image18.png 813w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image18-300x124.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image18-768x316.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image18-370x152.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image18-270x111.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image18-740x305.png 740w\" sizes=\"(max-width: 813px) 100vw, 813px\" \/><figcaption class=\"wp-element-caption\"><em>Request&nbsp;chain&nbsp;observed&nbsp;inside&nbsp;ANY.RUN&nbsp;sandbox<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>&lt;url-pattern&gt; is unique for each domain, but it often follows the same naming logic and includes repeated event-related keywords.<\/p>\n\n\n\n<p>Analysts can use this pattern to find related phishing domains in ANY.RUN\u2019s <a href=\"https:\/\/any.run\/threat-intelligence-lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=US-fake-invitation-phishing&amp;utm_term=050526&amp;utm_content=linktotilookuplanding\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Intelligence Lookup<\/a> with the following query: <a href=\"https:\/\/intelligence.any.run\/analysis\/lookup?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=US-fake-invitation-phishing&amp;utm_term=050526&amp;utm_content=linktotilookup#{%22query%22:%22url:%5C%22\/blocked.html%5C%22%20AND%20url:%5C%22\/favicon.ico%5C%22%20and%20url:%5C%22\/Image\/*.png%5C%22%22,%22dateRange%22:180}\" target=\"_blank\" rel=\"noreferrer noopener\">url:&#8221;\/blocked.html&#8221; AND url:&#8221;\/favicon.ico&#8221; and url:&#8221;\/Image\/*.png&#8221;<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Credential&nbsp;Interception&nbsp;Flows&nbsp;<\/h3>\n\n\n\n<p>The campaign uses two credential interception flows: one for <strong>Google accounts<\/strong> and another for <strong>non-Google services<\/strong>. The following ANY.RUN analysis session shows both flows in action:<\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/590eb0b6-2738-434d-965e-5dad01ab3bb4?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=US-fake-invitation-phishing&amp;utm_term=050526&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Check analysis session with both interception flows<\/a>&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"568\" src=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-05-at-14.45.04-1024x568.png\" alt=\"\" class=\"wp-image-20712\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-05-at-14.45.04-1024x568.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-05-at-14.45.04-300x166.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-05-at-14.45.04-768x426.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-05-at-14.45.04-1536x852.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-05-at-14.45.04-2048x1136.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-05-at-14.45.04-370x205.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-05-at-14.45.04-270x150.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-05-at-14.45.04-740x411.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Analysis session with both interception flows<\/em><\/figcaption><\/figure><\/div>\n\n\n<h4 class=\"wp-block-heading\"><em>Non-Google&nbsp;credential&nbsp;interception<\/em>&nbsp;<\/h4>\n\n\n\n<p>When the user selects any service other than Google, the phishing page opens a login window asking for an email address and password, as shown below.<\/p>\n\n\n\n<p>After the first password entry, the page always displays an <strong>\u201cIncorrect Password\u201d<\/strong> message. This prompts the user to enter the password again, helping the attackers capture a second attempt in case the first one contained a typo.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"584\" height=\"641\" src=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image5.png\" alt=\"Google login window, asking for an email address and password\" class=\"wp-image-20678\" style=\"width:358px;height:auto\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image5.png 584w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image5-273x300.png 273w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image5-370x406.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image5-270x296.png 270w\" sizes=\"(max-width: 584px) 100vw, 584px\" \/><figcaption class=\"wp-element-caption\"><em>Google&nbsp;login&nbsp;window,&nbsp;asking&nbsp;for&nbsp;an&nbsp;email&nbsp;address&nbsp;and&nbsp;password<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>When the user enters their credentials and clicks <strong>Login<\/strong>, the page sends a <strong>POST<\/strong> request to the same server at the \/processmail.php endpoint, submitting the email address and password.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"239\" src=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/screen_1-1024x239.png\" alt=\"POST resuest to the server at the \/processmail.php endpoint\" class=\"wp-image-20679\" style=\"width:650px;height:auto\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/screen_1-1024x239.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/screen_1-300x70.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/screen_1-768x179.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/screen_1-370x86.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/screen_1-270x63.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/screen_1-740x173.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/screen_1.png 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"595\" height=\"112\" src=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image1b.png\" alt=\"\" class=\"wp-image-20680\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image1b.png 595w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image1b-300x56.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image1b-370x70.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image1b-270x51.png 270w\" sizes=\"(max-width: 595px) 100vw, 595px\" \/><figcaption class=\"wp-element-caption\"><em>POST&nbsp;resuest&nbsp;to the server at the \/processmail.php&nbsp;endpoint<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>Then, an OTP code entry form appears. This form is also the same across all phishing sites used in this campaign.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"497\" height=\"340\" src=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image7.png\" alt=\"Fake entry form used in all phishing sites \" class=\"wp-image-20681\" style=\"width:439px;height:auto\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image7.png 497w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image7-300x205.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image7-370x253.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image7-270x185.png 270w\" sizes=\"(max-width: 497px) 100vw, 497px\" \/><figcaption class=\"wp-element-caption\"><em>Fake&nbsp;entry&nbsp;form&nbsp;used&nbsp;in&nbsp;all&nbsp;phishing&nbsp;sites<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>When the user enters the code and clicks <strong>Submit<\/strong>, the page sends a <strong>POST<\/strong> request to the same server at the \/process.php endpoint, submitting the OTP code.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"273\" src=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/screen_3-1024x273.png\" alt=\"\" class=\"wp-image-20682\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/screen_3-1024x273.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/screen_3-300x80.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/screen_3-768x205.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/screen_3-370x99.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/screen_3-270x72.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/screen_3-740x197.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/screen_3.png 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"643\" height=\"85\" src=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image1e.png\" alt=\"POST request to the server \" class=\"wp-image-20683\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image1e.png 643w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image1e-300x40.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image1e-370x49.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image1e-270x36.png 270w\" sizes=\"(max-width: 643px) 100vw, 643px\" \/><figcaption class=\"wp-element-caption\"><em><em>POST&nbsp;request&nbsp;to&nbsp;the&nbsp;server<\/em>&nbsp;<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>After&nbsp;the&nbsp;OTP&nbsp;is&nbsp;entered,&nbsp;the&nbsp;page&nbsp;displays&nbsp;a&nbsp;placeholder&nbsp;message,&nbsp;as&nbsp;shown&nbsp;in&nbsp;the&nbsp;image&nbsp;below.&nbsp;At&nbsp;this&nbsp;stage,&nbsp;the&nbsp;credentials&nbsp;needed&nbsp;to&nbsp;access&nbsp;the&nbsp;service&nbsp;are&nbsp;already&nbsp;in&nbsp;the&nbsp;attacker\u2019s&nbsp;hands.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"646\" height=\"602\" src=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image9.png\" alt=\"A placeholder message displayed inside ANY.RUN sandbox\" class=\"wp-image-20684\" style=\"width:456px;height:auto\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image9.png 646w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image9-300x280.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image9-370x345.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image9-270x252.png 270w\" sizes=\"(max-width: 646px) 100vw, 646px\" \/><figcaption class=\"wp-element-caption\"><em>A&nbsp;placeholder&nbsp;message&nbsp;displayed&nbsp;inside&nbsp;ANY.RUN&nbsp;sandbox<\/em><\/figcaption><\/figure><\/div>\n\n\n<h4 class=\"wp-block-heading\"><em>Google&nbsp;credential&nbsp;interception<\/em>&nbsp;<\/h4>\n\n\n\n<p>When the user selects Gmail as the login method, a different chain is observed. First, the user is redirected to a page disguised as a Google authorization form.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"567\" src=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/imagea-1024x567.png\" alt=\"Google authorization form used for the phishing attack \" class=\"wp-image-20685\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/imagea-1024x567.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/imagea-300x166.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/imagea-768x425.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/imagea-1536x851.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/imagea-370x205.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/imagea-270x150.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/imagea-740x410.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/imagea.png 1870w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Google&nbsp;authorization&nbsp;form&nbsp;used&nbsp;for&nbsp;the&nbsp;phishing&nbsp;attack<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>When&nbsp;the&nbsp;user&nbsp;enters&nbsp;their&nbsp;login&nbsp;and&nbsp;password,&nbsp;the&nbsp;page&nbsp;sends&nbsp;<strong>POST<\/strong>&nbsp;requests&nbsp;to&nbsp;the&nbsp;\/pass.php&nbsp;and&nbsp;\/mlog.php&nbsp;endpoints.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"961\" height=\"133\" src=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image1f.png\" alt=\"POST requests sent to the \/pass.php \" class=\"wp-image-20688\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image1f.png 961w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image1f-300x42.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image1f-768x106.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image1f-370x51.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image1f-270x37.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image1f-740x102.png 740w\" sizes=\"(max-width: 961px) 100vw, 961px\" \/><figcaption class=\"wp-element-caption\"><em>POST&nbsp;requests&nbsp;sent&nbsp;to&nbsp;the&nbsp;\/pass.php<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>The request to&nbsp;\/pass.php&nbsp;sends the login and the request to&nbsp;\/mlog.php&nbsp;sends the password:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"179\" src=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/screen_2-1024x179.png\" alt=\"\" class=\"wp-image-20689\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/screen_2-1024x179.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/screen_2-300x53.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/screen_2-768x134.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/screen_2-370x65.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/screen_2-270x47.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/screen_2-740x130.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/screen_2.png 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Request to&nbsp;\/pass.php&nbsp;sends the login<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>Then, the page sends a request to the `\/check_telegram_updates.php` endpoint, with the user ID included in the request body.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"207\" src=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image23-1024x207.png\" alt=\"Visitor ID exposed inside ANY.RUN sandbox \" class=\"wp-image-20690\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image23-1024x207.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image23-300x61.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image23-768x155.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image23-370x75.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image23-270x55.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image23-740x149.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/image23.png 1045w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Visitor&nbsp;ID&nbsp;exposed&nbsp;inside&nbsp;ANY.RUN&nbsp;sandbox<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>At the end of the chain, the victim is redirected to the legitimate&nbsp;<strong>google.com<\/strong>&nbsp;page.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How CISOs Can Reduce the Risk Behind Fake Invitation Campaigns&nbsp;<\/h2>\n\n\n\n<p>Campaigns like this are difficult because they do not create one obvious security event. The same lure can lead to credential theft, OTP interception, or remote access tool installation. For SOC teams, that means the risk is spread across several small signals that need to be connected quickly.&nbsp;<\/p>\n\n\n\n<p>To reduce exposure, security leaders need visibility earlier in the chain, before stolen credentials are used, before OTP codes are intercepted, and before a remote access tool becomes a foothold inside the environment.&nbsp;<\/p>\n\n\n\n<p>ANY.RUN brings that visibility into the full SOC investigation process. During triage, analysts can open suspicious links safely inside a cloud-based,&nbsp;<a href=\"https:\/\/any.run\/features\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=US-fake-invitation-phishing&amp;utm_term=050526&amp;utm_content=linktosandboxlanding\" target=\"_blank\" rel=\"noreferrer noopener\">interactive&nbsp;sandbox<\/a>&nbsp;and quickly confirm whether the page leads to a fake invitation, credential form, OTP prompt, or RMM download. During behavioral analysis, they can&nbsp;observe&nbsp;network requests, credential submission endpoints, file downloads, execution behavior, and remote access activity as it happens.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"568\" src=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-05-at-12.26.10-1024x568.png\" alt=\"Phishing attack analyzed inside ANY.RUN sandbox \" class=\"wp-image-20691\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-05-at-12.26.10-1024x568.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-05-at-12.26.10-300x166.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-05-at-12.26.10-768x426.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-05-at-12.26.10-1536x852.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-05-at-12.26.10-2048x1136.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-05-at-12.26.10-370x205.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-05-at-12.26.10-270x150.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-05-at-12.26.10-740x411.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Phishing attack analyzed inside ANY.RUN&nbsp;sandbox<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>That visibility gives teams a stronger basis for response.&nbsp;Teams&nbsp;will&nbsp;understand what was exposed, whether access was&nbsp;attempted, and which containment steps are needed. With <a href=\"https:\/\/any.run\/threat-intelligence-lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=US-fake-invitation-phishing&amp;utm_term=050526&amp;utm_content=linktotilookuplanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN Threat Intelligence<\/a>, they can extend the investigation into threat hunting by finding related domains, repeated URL patterns, shared phishing infrastructure, and similar analyses across industries.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"552\" src=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-05-at-12.22.20-1024x552.png\" alt=\"Relevant analysis sessions displayed inside TI Lookup for broader context and full behavior visibility\" class=\"wp-image-20692\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-05-at-12.22.20-1024x552.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-05-at-12.22.20-300x162.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-05-at-12.22.20-768x414.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-05-at-12.22.20-1536x828.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-05-at-12.22.20-2048x1104.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-05-at-12.22.20-370x199.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-05-at-12.22.20-270x146.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-05-at-12.22.20-740x399.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Relevant analysis sessions displayed inside TI&nbsp;Lookup&nbsp;for broader context and full behavior visibility<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>For CISOs, this supports the outcomes that matter most:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Fewer gray-zone investigations<\/strong>&nbsp;where teams struggle to prove whether activity is malicious&nbsp;<\/li>\n\n\n\n<li><strong>Faster threat confirmation<\/strong>&nbsp;before credentials, OTP codes, or remote access are abused&nbsp;<\/li>\n\n\n\n<li><strong>Clearer containment decisions<\/strong>&nbsp;based on visible attack behavior, not assumptions&nbsp;<\/li>\n\n\n\n<li><strong>Stronger phishing coverage<\/strong>&nbsp;across both credential theft and RMM delivery paths&nbsp;<\/li>\n\n\n\n<li><strong>Better confidence in SOC readiness<\/strong>&nbsp;when phishing campaigns scale across domains and industries&nbsp;<\/li>\n<\/ul>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nTurn phishing uncertainty into response-ready evidence.  \n <br>\n<span class=\"highlight\">Make every phishing investigation faster and easier to act on.  <br><\/span><\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/any.run\/enterprise\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=US-fake-invitation-phishing&#038;utm_term=050526&#038;utm_content=linktoenterprise#contact-sales\" rel=\"noopener\" target=\"_blank\">\nPower up your SOC\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h2 class=\"wp-block-heading\">About&nbsp;ANY.RUN&nbsp;<\/h2>\n\n\n\n<p>ANY.RUN, a leading provider of interactive malware analysis and threat intelligence solutions, helps security teams detect, investigate, and respond to threats faster.<\/p>\n\n\n\n<p>ANY.RUN solutions include <a href=\"https:\/\/any.run\/features\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=US-fake-invitation-phishing&amp;utm_term=050526&amp;utm_content=linktosandboxlanding\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Interactive Sandbox<\/strong><\/a>, <a href=\"https:\/\/any.run\/threat-intelligence-lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=US-fake-invitation-phishing&amp;utm_term=050526&amp;utm_content=linktotilookuplanding\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Threat Intelligence Lookup<\/strong><\/a>, <a href=\"https:\/\/any.run\/threat-intelligence-feeds\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=US-fake-invitation-phishing&amp;utm_term=050526&amp;utm_content=linktotifeedslanding\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Threat Intelligence Feeds<\/strong><\/a>, and integrations for SOC workflows across SIEM, SOAR, EDR, and other security tools. Together, they help teams safely analyze suspicious links, files, and scripts, uncover phishing behavior, trace credential theft and remote access activity, and enrich investigations with real-world threat context.<\/p>\n\n\n\n<p>Built for security-conscious organizations, ANY.RUN is <a href=\"https:\/\/any.run\/compliance\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=US-fake-invitation-phishing&amp;utm_term=050526&amp;utm_content=linktocompliance\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>SOC 2 Type II attested<\/strong><\/a> and supports enterprise-ready controls such as <strong>SSO, MFA, granular privacy settings, and AES-256-CBC encryption<\/strong>.<\/p>\n\n\n\n<p>Trusted by more than <strong>15,000 organizations<\/strong> and <strong>600,000 security professionals worldwide<\/strong>, ANY.RUN gives SOC teams the visibility they need to move from uncertain alerts to evidence-based decisions.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Indicators&nbsp;of&nbsp;Compromise&nbsp;<\/h2>\n\n\n\n<p><strong>URL&nbsp;patterns:&nbsp;<\/strong><\/p>\n\n\n\n<p>hxxps:\/\/&lt;phish_site&gt;\/&lt;url-pattern&gt;\/Image\/office360.png&nbsp;<\/p>\n\n\n\n<p>hxxps:\/\/&lt;phish_site&gt;\/&lt;url-pattern&gt;\/Image\/office.png&nbsp;<\/p>\n\n\n\n<p>hxxps:\/\/&lt;phish_site&gt;\/&lt;url-pattern&gt;\/Image\/yahoo.png&nbsp;<\/p>\n\n\n\n<p>hxxps:\/\/&lt;phish_site&gt;\/&lt;url-pattern&gt;\/Image\/google.png&nbsp;<\/p>\n\n\n\n<p>hxxps:\/\/&lt;phish_site&gt;\/&lt;url-pattern&gt;\/Image\/aol.png&nbsp;<\/p>\n\n\n\n<p>hxxps:\/\/&lt;phish_site&gt;\/&lt;url-pattern&gt;\/Image\/email.png&nbsp;<\/p>\n\n\n\n<p>hxxps:\/\/&lt;phish_site&gt;\/blocked.html&nbsp;<\/p>\n\n\n\n<p>hxxps:\/\/&lt;phish_site&gt;\/&lt;url-pattern&gt;\/processmail.php&nbsp;<\/p>\n\n\n\n<p>hxxps:\/\/&lt;phish_site&gt;\/&lt;url-pattern&gt;\/process.php&nbsp;<\/p>\n\n\n\n<p>hxxps:\/\/&lt;phish_site&gt;\/&lt;url-pattern&gt;\/pass.php&nbsp;<\/p>\n\n\n\n<p>hxxps:\/\/&lt;phish_site&gt;\/&lt;url-pattern&gt;\/mlog.php&nbsp;<\/p>\n\n\n\n<p>hxxps:\/\/&lt;phish_site&gt;\/&lt;url-pattern&gt;\/check_telegram_updates.php&nbsp;<\/p>\n\n\n\n<p><strong>Domains<\/strong>:<\/p>\n\n\n\n<p>The current list of domains can be retrieved using the following query in&nbsp;<strong>ANY.RUN Threat Intelligence&nbsp;Lookup<\/strong>:&nbsp;<a href=\"https:\/\/intelligence.any.run\/analysis\/lookup?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=US-fake-invitation-phishing&amp;utm_term=050526&amp;utm_content=linktotilookup#{%22query%22:%22url:%5C%22\/blocked.html%5C%22%20AND%20url:%5C%22\/favicon.ico%5C%22%20and%20url:%5C%22\/Image\/*.png%5C%22%22,%22dateRange%22:180}\" target=\"_blank\" rel=\"noreferrer noopener\">url:&#8221;\/blocked.html&#8221; AND url:&#8221;\/favicon.ico&#8221; and url:&#8221;\/Image\/*.png&#8221;<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A new large-scale phishing campaign is targeting U.S. organizations with fake event invitations that lead to credential theft, OTP interception, or RMM tool installation. ANY.RUN researchers found that the campaign uses a repeatable phishing framework to create event-themed lure pages at scale. Some pages steal email credentials and OTP codes, while others deliver legitimate remote [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":20697,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[57,34,40],"class_list":["post-20662","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware-analysis","tag-anyrun","tag-malware-analysis","tag-malware-behavior"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>US-Targeted Phishing Campaign Exposes a Critical Access Blind Spot for CISOs<\/title>\n<meta name=\"description\" content=\"ANY.RUN researchers uncovered a large-scale fake invitation phishing campaign targeting U.S. organizations with credential theft and RMM delivery.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/us-fake-invitation-phishing\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"15 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/us-fake-invitation-phishing\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/us-fake-invitation-phishing\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"New Phishing\u00a0Campaign Targets US with Credential Theft: What CISOs Need to Know\",\"datePublished\":\"2026-05-05T12:59:53+00:00\",\"dateModified\":\"2026-05-05T13:42:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/us-fake-invitation-phishing\/\"},\"wordCount\":2896,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"malware analysis\",\"malware behavior\"],\"articleSection\":[\"Malware Analysis\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/us-fake-invitation-phishing\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/us-fake-invitation-phishing\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/us-fake-invitation-phishing\/\",\"name\":\"US-Targeted Phishing Campaign Exposes a Critical Access Blind Spot for CISOs\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2026-05-05T12:59:53+00:00\",\"dateModified\":\"2026-05-05T13:42:24+00:00\",\"description\":\"ANY.RUN researchers uncovered a large-scale fake invitation phishing campaign targeting U.S. organizations with credential theft and RMM delivery.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/us-fake-invitation-phishing\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/us-fake-invitation-phishing\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/us-fake-invitation-phishing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Malware Analysis\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/malware-analysis\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"New Phishing\u00a0Campaign Targets US with Credential Theft: What CISOs Need to Know\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"US-Targeted Phishing Campaign Exposes a Critical Access Blind Spot for CISOs","description":"ANY.RUN researchers uncovered a large-scale fake invitation phishing campaign targeting U.S. organizations with credential theft and RMM delivery.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/us-fake-invitation-phishing\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"15 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/us-fake-invitation-phishing\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/us-fake-invitation-phishing\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"New Phishing\u00a0Campaign Targets US with Credential Theft: What CISOs Need to Know","datePublished":"2026-05-05T12:59:53+00:00","dateModified":"2026-05-05T13:42:24+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/us-fake-invitation-phishing\/"},"wordCount":2896,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","malware analysis","malware behavior"],"articleSection":["Malware Analysis"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/us-fake-invitation-phishing\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/us-fake-invitation-phishing\/","url":"https:\/\/any.run\/cybersecurity-blog\/us-fake-invitation-phishing\/","name":"US-Targeted Phishing Campaign Exposes a Critical Access Blind Spot for CISOs","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2026-05-05T12:59:53+00:00","dateModified":"2026-05-05T13:42:24+00:00","description":"ANY.RUN researchers uncovered a large-scale fake invitation phishing campaign targeting U.S. organizations with credential theft and RMM delivery.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/us-fake-invitation-phishing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/us-fake-invitation-phishing\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/us-fake-invitation-phishing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Malware Analysis","item":"https:\/\/any.run\/cybersecurity-blog\/category\/malware-analysis\/"},{"@type":"ListItem","position":3,"name":"New Phishing\u00a0Campaign Targets US with Credential Theft: What CISOs Need to Know"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/20662"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=20662"}],"version-history":[{"count":35,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/20662\/revisions"}],"predecessor-version":[{"id":20733,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/20662\/revisions\/20733"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/20697"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=20662"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=20662"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=20662"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}