Weaponizing Fear: Iran Conflict-Themed Phishing Uses Fake Emergency Alerts

Weaponizing Fear: Iran Conflict-Themed Phishing Uses Fake Emergency Alerts
Cofense PDC identified a phishing campaign impersonating a government emergency alert (labeled “SEVERE / ACTIVE”) that used a QR code to redirect victims to a Microsoft-themed credential-harvesting page. The campaign leveraged fear of regional conflict and authoritative impersonation to drive quick user action and credential compromise. #MinistryOfInterior #CofensePDC

Keypoints

  • The campaign impersonated a Ministry of Interior / Civil Defense emergency alert with the subject “Public Safety Advisory – Action Recommended.”
  • Emails urged immediate action using fear-driven language like “take cover immediately” and directed recipients to scan a QR code for “official emergency procedures.”
  • The QR code led to a “human verification” page that used a fake checkbox to build trust before redirecting victims.
  • After verification, victims were sent to a Microsoft-themed phishing page crafted to capture credentials.
  • Observed infrastructure included malicious URLs on sharedfilescorps[.]com and wivoumea[.]ru domains and associated IP addresses.

MITRE Techniques

  • [T1566 ] Phishing – Used to send mass emails impersonating government emergency alerts to elicit urgent user action ( ‘Public Safety Advisory – Action Recommended’, ‘SEVERE / ACTIVE’ )
  • [T1566.002 ] Phishing: Link – QR code redirected users to malicious web pages designed to trick users into clicking and following links to credential-harvesting pages ( ‘scan a QR code for “official” instructions’ )
  • [T1036 ] Masquerading – Attackers impersonated an authoritative government entity and a legitimate Microsoft sign-in portal to appear trustworthy and bypass user suspicion ( ‘Ministry of Interior and Civil Defense’, ‘Microsoft-themed phishing page’ )

Indicators of Compromise

  • [Email Address ] Sender observed in phishing email – ministryofinterior-civildefensenetwork@qualitycollection[.]com[.]au
  • [URLs ] Infection and payload landing pages used in the campaign – hXXps://ministry[.]sharedfilescorps[.]com/interior/, hXXps://global[.]sharedfilescorps[.]com/interior/ (and hXXps://wivoumea[.]ru/HAPApOYtrk1Zzs0iF6mk@/)
  • [Domains ] Malicious hosting domains used to host pages – sharedfilescorps[.]com, wivoumea[.]ru
  • [IP Addresses ] Observed IPs associated with infection/payload hosting – 104[.]21[.]91[.]60, 172[.]67[.]167[.]123 (and 104[.]128[.]128[.]129)
  • [Email Subject ] Lure used in phishing emails to prompt action – “Public Safety Advisory – Action Recommended”


Read more: https://cofense.com/blog/weaponizing-fear-iran-conflict-themed-phishing-uses-fake-emergency-alerts