DHL Phish Uses Fake OTP to Steal Credentials and Device Data

A delivery email promising a waybill confirmation nudges recipients into a slick OTP check that never leaves the browser yet feels authentic enough to lower guard rails before the real theft begins. The campaign leaned on brand familiarity and quiet, believable steps to make a low-cost kit behave like a trusted service.

Research Focus: Unpacking a Trust-First, 11-Step DHL Impersonation That Steals Credentials and Device Telemetry

This study examined how a fake OTP gate and subtle UX pacing primed compliance, boosting the odds that victims would type credentials without pause. The central thread was trust: brief delays, prefilled identity fields, and a redirect to the genuine site fused into a seamless story.

The work also confronted a recurring challenge for defenders: low-infrastructure phishing that passes basic email checks and hides inside reputable tools. The scope covered the lure, OTP deception, identity injection, credential harvest, device fingerprinting, browser-based exfiltration, and the final redirect that masks compromise.

Background and Significance: Why This Campaign Matters to Users, Enterprises, and Defenders

DHL’s brand reach and the anxiety of missed deliveries formed a potent social lever, enabling global, opportunistic targeting without a sector focus. The message line—“WAYBILL CONFIRMATION REQUIRED”—pressed for quick action, while the sender display name masked a mismatched domain.

Meanwhile, lightweight kits increasingly avoid custom servers by abusing trusted platforms, shifting the detection burden away from obvious command-and-control traffic. Passing DKIM on attacker-owned domains further diluted filter confidence and dulled user suspicion in inboxes built to reward authenticated mail.

Research Methodology, Findings, and Implications

Methodology

The analysis centered on a newly observed kit, collecting artifacts across the email lure, OTP page, fake login, and data-handling scripts. Evidence was mapped end to end to preserve timing, content, and user-flow context.

Investigators reviewed headers and authentication outcomes, then performed static and dynamic JavaScript analysis to trace OTP rendering, delays, identity injection, and storage behaviors. Network and client-side telemetry captured browser-to-EmailJS exfiltration and enabled domain profiling for cupelva.com, perfectgoc.com, and the attacker mailbox.

Replay of the full 11-step chain validated credential capture, device fingerprinting, and the post-harvest redirect. Fingerprinting included IP, device and OS, browser version, geolocation at city and country levels, and local storage writes that staged data before transmission.

Findings

The lure posed as “DHL EXPRESS WAYBILL CONFIRMATION REQUIRED,” pairing a DHL display name with cupelva.com; DKIM passed for that domain, aiding deliverability. Clicking led to perfectgoc.com, where a six-digit OTP was generated locally with a brief delay to mimic processing.

After the trust primer, a fake DHL login appeared with the victim’s email prefilled via URL parameters, smoothing the path to enter a password. The kit then collected device telemetry, persisted it in local storage, and prepared it for outbound delivery.

Exfiltration relied on EmailJS, sending credentials and fingerprints directly from the browser to [email protected]. With no bespoke C2 beacons, the kit reduced infrastructure needs and blended with legitimate API use before redirecting the user to the real DHL site to mute suspicion.

Implications

Defenders should block and monitor perfectgoc.com, cupelva.com, and known attacker mailboxes, and watch for client-side email services used as exfiltration channels. DKIM or DMARC passes on low-reputation domains should be treated as weak trust signals and paired with brand impersonation analytics.

User training ought to stress sender-domain verification and skepticism toward “verification” flows that trigger no external messages. Prefilled login prompts on unexpected pages should be treated as a red flag, and streamlined reporting should hasten takedown.

Reflection and Future Directions

Reflection

Reconstructing the full chain clarified attacker intent and exposed the subtle UX mechanics that carried users from curiosity to compromise. Viewing email authentication, web design, and client-side exfiltration together revealed where layered defenses left gaps.

Attribution remained difficult because the kit leaned on short-lived domains and reputable third-party services. Rapid domain turnover restricted long-term tracking and complicated correlation with adjacent campaigns.

Future Directions

Promising avenues include behavioral fingerprints for fake OTP flows and scripted delays, plus heuristics that flag identity injection via URL parameters on branded logins. Detection models for client-side email/API misuse across major providers would raise friction for similar kits.

Defenses can also advance by correlating sender identity, domain reputation, and page artifacts, and by deploying browser-level warnings for unexpected prefilled credentials. SIEM and SOAR playbooks should prioritize alerts tied to client-side exfiltration endpoints for faster triage.

Conclusion: Trust Cues Over Complexity—Key Takeaways and the Campaign’s Broader Impact

The campaign demonstrated how a staged OTP, identity prefill, and browser-to-API exfiltration efficiently captured passwords and device data while keeping infrastructure light. The use of legitimate services blunted traditional network detections and delayed discovery through a credible redirect.

Moving forward, the most effective countermeasures paired brand impersonation analytics with patterns of deceptive UX and client-side exfiltration. The study underscored that social trust engineering had rivaled technical sophistication, pointing security programs toward behavior, not just infrastructure, as the next control surface.

Advertisement

You Might Also Like

Advertisement
shape

Get our content freshly delivered to your inbox. Subscribe now ->

Receive the latest, most important information on cybersecurity.
shape shape