Sophisticated Phishing Campaign Targets Gmail Users with Microsoft Dynamics Infrastructure
Table of Contents
A highly advanced phishing campaign is currently targeting Gmail users,employing a multi-layered attack that exploits legitimate Microsoft Dynamics infrastructure to bypass standard security protocols and steal sensitive login information. The campaign, first observed on August 16, 2025, represents a significant escalation in phishing tactics, combining social engineering with technical sophistication.
The Attack Vector: Deceptive Voicemail Notifications
The attack initiates with deceptively crafted “New Voice Notification” emails, designed to mimic legitimate voicemail services. These emails feature spoofed sender addresses and prominently display “Listen to Voicemail” buttons.Clicking these buttons redirects victims through a complex network of compromised websites, initiating the credential-harvesting process.

What sets this campaign apart is its initial use of Microsoft’s Dynamics marketing platform (assets-eur.mkt.dynamics.com).This strategic choice lends immediate credibility to the attack and helps circumvent email security filters that typically flag suspicious domains. Attackers are increasingly leveraging trusted services to enhance the believability of their phishing attempts,
notes security analyst Anurag.
Did You Know? Phishing attacks are responsible for over 90% of data breaches, according to the 2024 verizon Data Breach Investigations Report.
The Phishing Chain: CAPTCHA and Fake Login Pages
After a victim clicks the malicious link, they are redirected to a CAPTCHA page hosted on horkyrown[.]com, a domain registered in Pakistan. This CAPTCHA serves as a deceptive trust-building measure, creating the illusion of legitimate security protocols. Following the CAPTCHA, users are presented with a meticulously crafted replica of the Gmail login page, complete with authentic Google branding and interface elements.
The fake login form is designed to capture not only primary email and password combinations but also advanced security credentials, including two-factor authentication codes, backup codes, and security question answers. This complete data collection significantly increases the potential damage to compromised accounts.
Advanced Evasion Techniques Employed
Security analyst Anurag observed that the malicious javascript powering the fake login page utilizes sophisticated obfuscation techniques. The code employs AES encryption to conceal its true functionality and incorporates anti-debugging features that redirect users to legitimate Google login pages when developer tools are activated. This makes analysis and detection significantly more challenging.

the attack leverages multiple redirection layers and cross-site requests to servers located in Russia (purpxqha[.]ru), indicating a complex international infrastructure designed to evade detection and complicate forensic investigations. Once victims submit their information, the malicious script systematically captures and exfiltrates all entered data through encrypted channels.
| Component | function | Location |
|---|---|---|
| Initial email | Deceptive voicemail notification | Spoofed sender address |
| Redirection Host | Hosts first stage of attack | Microsoft Dynamics (assets-eur.mkt.dynamics.com) |
| CAPTCHA Host | Builds trust, part of attack infrastructure | horkyrown[.]com (Pakistan) |
| Data Exfiltration Server | Receives stolen credentials | purpxqha[.]ru (Russia) |
Pro Tip: Always verify the URL of a login page before entering your credentials. Look for HTTPS and ensure the domain name is correct.
Protecting Yourself from Phishing Attacks
This campaign underscores the evolving sophistication of phishing techniques, combining social engineering with the abuse of legitimate infrastructure and advanced technical evasion methods. Gmail users should exercise extreme caution when encountering unsolicited voicemail notifications and verify the authenticity of login requests through official channels. Organizations should implement robust email security measures and provide comprehensive user education on these emerging threat vectors.
Security teams are advised to block the domain horkyrown[.]com and actively monitor for similar campaigns that leverage legitimate marketing platforms as initial compromise vectors. Users who suspect they may have been targeted should immediately change their Google account passwords and thoroughly review their recent account activity.
As the Federal Trade Commission notes, phishing scams frequently enough rely on creating a sense of urgency and requesting sensitive information [[1]]. Remaining vigilant and skeptical is crucial in preventing triumphant attacks.
The Evolving landscape of Phishing
Phishing attacks have become increasingly sophisticated over the years, moving beyond simple email scams to encompass SMS phishing (smishing), voice phishing (vishing), and even attacks targeting social media platforms. Attackers are constantly adapting their tactics to exploit human psychology and bypass security measures. The use of legitimate infrastructure, as seen in this campaign, is a particularly concerning trend, as it adds a layer of credibility that can deceive even experienced users. The [[2]] highlights the importance of being aware of these tactics.
Frequently Asked Questions About Gmail Phishing
- What is Gmail phishing? Gmail phishing is a type of online scam where attackers attempt to steal your Google account credentials by disguising themselves as legitimate entities.
- How can I identify a phishing email? Look for suspicious sender addresses, grammatical errors, urgent requests, and links that don’t match the expected domain.
- What should I do if I click on a phishing link? Immediately change your Google account password and review your account activity for any unauthorized access.
- Is two-factor authentication enough to protect me from phishing? While two-factor authentication adds an extra layer of security,it’s not foolproof. Attackers can still bypass it if you grant them access.
- How can I report a phishing email? Forward the email to Google’s phishing reporting address: phishing@google.com.
We hope this information helps you stay safe online. Please share this article with your friends and family to raise awareness about this critical threat. Have you ever been targeted by a phishing attack? What steps did you take to protect yourself?