Cybersecurity researchers have uncovered an advanced phishing campaign that misused the legitimate infrastructure of Nifty.com, a well-known project management platform, to launch attacks on organizations around the world.
The campaign remained undetected for months and highlights a growing trend: attackers are now exploiting trusted web services to bypass traditional security tools and build credibility with their targets.
How the Attack Worked
The attackers used Nifty.com’s URL shortening and redirect features to create deceptive links. These links appeared legitimate and used Nifty’s trusted domain name, making them more likely to pass through email filters and trick recipients.
Victims were redirected to fake login pages designed to steal credentials. Most targets were corporate email accounts, and the phishing emails were made to look like normal business communication.
Highly Personalized Phishing Messages
Security analysts from Raven reported that the campaign showed signs of an advanced persistent threat (APT). The phishing emails included specific details about the targeted companies, such as project names and internal jargon, making the messages highly convincing.
This level of detail suggests that the attackers had conducted careful research and had access to significant resources and technical expertise.
Widespread Impact Across Industries
The campaign affected various sectors, with financial services, healthcare, and technology companies hit hardest. Initial estimates indicate that hundreds of organizations were targeted.
In many cases, attackers gained long-term access to email accounts, waiting for the right moment to extract sensitive data or move laterally within networks.
Technical Sophistication and Evasion Tactics
The attackers used advanced evasion techniques to avoid detection. They created a multi-layered redirection chain, starting with shortened Nifty.com URLs. Victims were taken through several intermediate pages before reaching the final phishing site.
These intermediate pages collected information about the victim’s device and location. If the traffic looked suspicious — such as from a security researcher — the page would redirect to a harmless site instead of the malicious one.
Additional methods used to hide the attack included:
- JavaScript-based browser fingerprinting
- Geolocation filtering
- Time-based redirection delays
- Detection of virtual machines and analysis tools
The final phishing pages were carefully designed to look like real login portals. They used valid SSL certificates and authentic branding elements to trick even cautious users.
Conclusion
This phishing campaign shows how threat actors are adapting to modern security tools by using legitimate services like Nifty.com to hide their malicious activities. Experts warn that such attacks are becoming more common and harder to detect, making it critical for organizations to train staff and monitor for unusual redirect patterns in emails and web traffic.