The subject line read "Please Approve: Funding Agreement Document." The sender, an obscure Italian domain routed through Amazon SES (Simple Email Service), addressed the recipient by first name, claimed the document came from the recipient's own organization's finance department, and presented a polished PDF-viewer interface with a single black button: View PDF.
Behind that button sat a three-layer redirect chain designed to survive every automated scanner between the attacker's infrastructure and the victim's browser.
The target: a VP of Finance. The pretext: an approval workflow that finance leaders process dozens of times a month. The intent: credential theft.
The email arrived at 23:58 UTC on a Thursday evening, timed to land when security teams are thin and approval queues feel urgent. The HTML rendered a convincing document-notification template: a blue app icon labeled "DOCUMENT," a banner reading "Notification of Signed Document," and body copy stating that a funding agreement had been shared by the target organization's finance team for approval.
The formatting was deliberate. The template mimicked SaaS document-sharing platforms that finance teams interact with daily: DocuSign, PandaDoc, Adobe Sign. The body text even addressed the recipient by first name, pulling from reconnaissance or scraped directory data. But several forensic anomalies surfaced on inspection: a stray token ("lior") orphaned in the body text, inconsistent spacing around the banner copy, and no sender display name, just the raw info@[redacted-domain][.]com address.
These are the fingerprints of a phishing kit, a templated HTML payload where variable substitution failed to clean up after itself. The Verizon 2025 Data Breach Investigations Report found that phishing appeared in 36% of breaches involving external actors, with document-approval pretexts ranking among the most effective social engineering lures against finance and executive targets.
The campaign's technical sophistication lived in its link architecture: a three-layer redirect chain that exploited trusted infrastructure at every hop.
Layer 1: Cisco Secure Web redirect. The primary CTA button wrapped the malicious destination inside a secure-web[.]cisco[.]com URL rewriter. Cisco's Secure Web gateway is a legitimate security tool that rewrites URLs for click-time scanning. Attackers exploited this by encoding their payload URL inside the Cisco redirect, leveraging Cisco's domain reputation to pass URL-reputation checks at the Secure Email Gateway (SEG) level.
Layer 2: Argentinian landing domain. The Cisco redirect resolved to hxxp://waterpowerinn[.]com[.]ar/12, a domain with no relationship to document signing, finance, or the purported sender. The use of a .com.ar ccTLD (country-code top-level domain) and bare HTTP (no TLS encryption) are hallmarks of compromised infrastructure repurposed as a redirect waypoint.
Layer 3: Display-URL spoofing. Below the CTA button, a fallback link displayed hxxps://[TargetOrg][.]haystack[.]so/post/[UUID], visually suggesting the document was hosted on a platform associated with the target organization. But the actual href pointed to hxxps://4creeks[.]haystack[.]so/post/[UUID], a completely different subdomain. This display/href mismatch is a textbook credential-harvesting technique documented under MITRE ATT&CK T1566.002 (Spearphishing Link) and T1036.005 (Masquerading: Match Legitimate Name or Location).
The redirect chain served a dual purpose: each hop added a layer of domain-reputation laundering, and the multi-step resolution made it harder for sandboxed URL scanners to follow the full chain to the terminal payload. CISA's guidance on evolving phishing techniques highlights redirect-chain abuse as a growing evasion method precisely because automated tools often evaluate only the first-hop URL.
The relay analysis revealed a textbook case of infrastructure-versus-identity mismatch.
eu-west-1[.]amazonses[.]com), not the claimed From: header domainamazonses[.]comFrom: domain, but with action=none, meaning the message was delivered anywayreason=001): Microsoft's composite authentication flagged the mismatch but took no blocking actionThe sending IP 54[.]240[.]3[.]30 geolocated to the United States and belongs to Amazon SES's EU-West-1 region. The sender domain, registered in 2020 with GDPR-masked WHOIS data, showed no public organizational identity. Amazon SES is a legitimate cloud email service used by thousands of businesses, but like any cloud infrastructure, it can be provisioned by attackers who obtain credentials or create trial accounts.
This pattern, SPF passing for the relay infrastructure while DKIM and DMARC fail for the claimed identity, is exactly the gap that authentication-only defenses leave open. As the FBI's 2024 Internet Crime Report documented, BEC and phishing schemes accounted for $2.7 billion in losses, with infrastructure abuse increasingly cited as a key enabler. IBM's 2024 Cost of a Data Breach Report found that phishing-initiated breaches carried an average cost of $4.88 million, and credential theft was the most common initial access vector.
Themis, the IRONSCALES agentic SOC analyst, classified this email as phishing with 90% confidence and quarantined it before the recipient engaged. The detection relied on three converging behavioral signals:
The affected mailbox was quarantined within seconds of delivery. No recipient interaction with the redirect chain was recorded.
For security teams facing document-approval phishing campaigns, four actions matter now:
p=none DMARC policy is a monitoring tool, not a defense. Move to p=quarantine or p=reject to prevent delivery of messages that fail domain authentication.| Type | Indicator | Context |
|---|---|---|
| Sender Domain | elettro-coltura[.]com |
Privacy-masked Italian domain. DKIM/DMARC failure |
| Sender Address | info@elettro-coltura[.]com |
From header, no display name |
| Relay IP | 54[.]240[.]3[.]30 |
Amazon SES EU-West-1 outbound server |
| Redirect URL | hxxp://waterpowerinn[.]com[.]ar/12 |
Argentinian domain. HTTP, no TLS |
| Redirect Wrapper | secure-web[.]cisco[.]com/1jyt4Tn461Dw[...] |
Cisco Secure Web redirect abused as trust layer |
| Landing URL | hxxps://4creeks[.]haystack[.]so/post/3f4fc4a3-[...] |
Actual credential-harvesting destination |
| Display URL (spoofed) | hxxps://[TargetOrg][.]haystack[.]so/post/3f4fc4a3-[...] |
Visible link text did not match actual href |
| Return-Path | 0102019cc0706f92-[...]@eu-west-1[.]amazonses[.]com |
Amazon SES bounce address |
| MITRE ATT&CK | T1566.002 | Spearphishing Link |
| MITRE ATT&CK | T1204.001 | User Execution: Malicious Link |
| MITRE ATT&CK | T1036.005 | Masquerading: Match Legitimate Name or Location |
| MITRE ATT&CK | T1071.001 | Application Layer Protocol: Web Protocols |