01/10/2025
16:40

The most widespread Phishing attempts in OCTOBER 2025


Find out the most common phishing attempts you might encounter and avoid

PHISHING INDEX

Below are the most common email phishing attempts detected by the TG Soft Anti-Malware Research Center in October 2025:

16/10/2025 => PayPal
15/10/2025 => Webmail
10/10/2025 => Email Account
08/10/2025 => Judicial Police Scam
07/10/2025 => Survey - Esselunga / Telepass
07/10/2025 => Netflix
06/10/2025 => SexTortion
06/10/2025 => WeTransfer
05/10/2025 => SumUp
03/10/2025 => Aruba - Expired domain
01/10/2025 => Google Cloud

These emails aim to deceive unsuspecting victims into providing sensitive information, such as bank account details, credit card codes, or personal login credentials, with all the easily imaginable consequences.


16 October 2025 ==> Phishing PayPal

SUBJECT: <Identification required by 16 October.>

Below, we analyse a new phishing attempt that aims to steal login credentials for PayPal accounts, the well-known US digital payments company.

Clicca per ingrandire l'immagine della falsa e-mail che cerca di indurre il ricevente a inserire le credenziali di accesso all'account di PayPal.
The message informs the recipient that he/she must identify himself/herself online by logging into his/her PayPal account to avoid the block of online banking services. A code valid for 24 hours is then provided to be entered for identification,  and then the account will be blocked. The user is then invited to identify himself/herself via the following link:

https://www[dot]paypal[dot]com/id[=]672300648776

When we analyse the email, we notice that the message comes from an email address <postmaster[at]06fd44e6c9[dot]nxcli[dot]io> that is clearly not linked to the PayPal official domain. This is definitely unusual and should make us suspicious.
Clicca per ingrandire l'immagine della falso sito di PayPal che cerca di indurre il ricevente a inserire le credenziali di accesso all'account di PayPal.
Anyone who unluckily clicks on the link will be taken to the screen shown in the image on the right.
As we can see, the user is redirected to a site that graphically simulates the PayPal login page. However, the site is hosted on an unusual address/domain.

Given these considerations, we advise you to NEVER enter your credentials on websites whose origin you do not know, as they will be sent to a remote server and used by cyber fraudsters, with all the associated risks easy to imagine.



15 October 2025 ==> Phishing Webmail

SUBJECT: <Y­ou­r P­as­sw­o­rd i­s A­b­out t­o E­x­p­ir­e>

Below, we analyse another phishing attempt that aims to steal the victim's Webmail account credentials.

Clicca per ingrandire l'immagine della falsa e-mail che si spaccia per il server di posta elettronica e che induce l'utente a cliccare sul link per mantenere la sua password...in realtà è una TRUFFA!
The message, in English, informs the recipient that his/her email account password is about to expire. It then invites him/her to update his/her password before it expires, in order to avoid service interruptions, via the following link:

Keep My Password o Modify My Password

When we analyse the email, we see that the message appears to come from the recipient's own email account. Cybercriminals use this trick to induce users to enter their real credentials, which are then used for criminal purposes. This is highly unusual and should make us very suspicious.

Anyone who unluckily clicks on the link will be redirected to a fake web page, which is designed to look like the Webmail login page.

Clicca per ingrandire l'immagine del falso sito di Webmail dove viene richiesto di effettuare l'accesso al proprio account...in realtà si tratta di una TRUFFA!
On this page, users are asked to log in to their account by entering their email password to confirm or change their password, which is due to expire.

Actually, the page where the user is redirected to enter his/her email account credentials is hosted on an unusual address/domain, which we report below:

 https[:]//[FakeDomainName*].com/.....

We urge you to always pay attention to every detail, even trivial ones, and not to enter your personal details and/or passwords on forms hosted on counterfeit web pages, as they will be sent to a remote server and used by cyber fraudsters, with all the associated risks that this entails.



10 October 2025 ==> Phishing Email Account

SUBJECT: <Action required: ***** Your password is set to expire today.>

Below, we analyse a phishing attempt that aims to steal the email account credentials of the victim.

Clicca per ingrandire l'immagine della falsa e-mail che si spaccia per il server di posta elettronica e che induce l'utente a cliccare sul link per rubare le credenziali di accesso...in realtà è una TRUFFA!
The message informs the recipient that his/her email account password expires today. It then invites him/her to update his/her password before the expiry date, in order to avoid service interruptions, via the following link:

Keep your current password

When we analyse the message, we see that it has an email address <marie(dot)trnkova(at)techlib(dot)cz> that cannot be traced back to the email server. This is definitely unusual and should make us suspicious.

Anyone who unluckily clicks on the link will be redirected to a fake web page, which is designed to look like the email account login page.

Clicca per ingrandire l'immagine del falso sito del server di posta elettronica dove viene richiesto di effettuare l'accesso al proprio account...in realtà si tratta di una TRUFFA!
On this page, users are asked to log in to their account by entering their email password to confirm or change their current password, which is due to expire.

Actually, the page where we are redirected to enter our email account credentials is hosted on an unusual address/domain, which we report below:

 https[:]//[FakeDomainName*].com/.....

We urge you to always pay attention to every detail, even trivial ones, and not to enter your personal details and/or passwords on forms hosted on counterfeit web pages, as they will be sent to a remote server and used by cyber fraudsters, with all the associated risks that this entails.


08 October 2025 ==> Judicial Police scam

«SUBJECT: <POLICE SUMMONS LETTER>

Below is an example of a SCAM attempt, consisting of a false summons for child pornography that comes via email, supposedly from the Central Directorate of the Criminal Police.

Clicca per ingrandire l'immagine della falsa e-mail di una presunta convocazione da parte dell'Arma dei Carabinieri, ma che in realtà è una TRUFFA!
The message, which has a highly suspicious email address <boboy08993672[at]gmail[dot]com>, contains the following message: ‘ATTENTION: THE ATTACHED FILE IS A POLICE REPORT. PLEASE READ THE ATTACHED FILE AND RESPOND IMMEDIATELY.’ 
When we open the PDF attachment named <State Police>, shown below, we notice that it is graphically misleading and appears to  come from Mauro Falesiedi from the Central Directorate of the Criminal Police. The fasle complaint accuses the victim of child pornography, paedophilia, exhibitionism and cyber pornography, as he allegedly visited a child pornography website.

Clicca per ingrandire l'immagine dell'allegato relativo alla convocazione per inchiesta giudiziaria da parte della Polizia Giudiziaria, ma che in realtà è una TRUFFA!This is an attempt at fraud by cybercriminals, whose aim is to extort money, in this case in the form of a fine. In fact, the message states the following:

" [...[ We hereby request that you respond to these (three) charges within a strict time limit of 48 hours.."

If the victim does not respond within 48 hours, an arrest warrant will be issued, punishable by imprisonment for six to twelve years and a fine from €78,000 to €250,000.
The complaint is clearly fake because it is not personal.

This is clearly an attempt at fraud with the aim of stealing sensitive user data and extorting money.



4-7 October 2025 ==> Phishing customer survey: ESSELUNGA / TELEPASS

This month, we are once again seeing phishing campaigns themed around customer surveys that exploit the brands of well-known companies. In the two cases reported below, the companies involved are large retailers and mobility service providers.   
In the first example, the cybercriminal used the well-known ESSELUNGA, brand to launch a promotional message that seems to offer the chance to win an exclusive prize: <Set Tupperware da 36 pezzi!>. To claim the prize, all the user has to do is to answer a few short questions.
Clicca per ingrandire sondaggio che sembra provenire da ESSELUNGA e che permetterebbe di vincere un premio...ma che in realtà è una TRUFFA!
In the second example, the cybercriminal used the well-known TELEPASS, brand to launch a promotional message that seems to offer the chance to win an exclusive prize: <EMERGENCY CAR KIT>. To claim the prize, all the user has to do is to answer a few short questions.
Clicca per ingrandire sondaggio che sembra provenire da TELEPASS e che permetterebbe di vincere un premio...ma che in realtà è una TRUFFA!
Clearly, the brands exploited in these campaigns are unrelated to the mass sending of these malicious emails, which are genuine scams whose aim remains, as always, to steal sensitive data from unsuspecting recipients.
In the two examples shown, we can see that the emails clearly come from addresses <it004passa[at]leggiparrucchieri[dot]it> and <solina[at]villaronche[dot]it>unrelated to the official TELEPASS and ESSELUNGA  domains. This is definitely unusual and should  make us suspicious.

When we click on the links in the e-mail, we are directed to a landing page that may look graphically deceptive (with misleading images and the brand's authentic logo), but is hosted on an abnormal address/domain that is not  trustworthy or traceable to the exploited brand.

The cybercriminals behind the scam, in order to achieve their goal, use various tricks, such as reporting false testimonials from customers who have won the prize. They try to persuade the user to complete the survey quickly, by making him/her believe that only a few can win, and that the offer expires today.
Surely if so many users were lucky why not take a chance?!

When the survey is completed, the user is usually sent to a page for the entry of the shipping address and subsequent payment of shipping costs.
The cybercriminals' purpose, is to induce the victim to enter his/her personal information to ship the prize and then, likely, also the credit card information to pay the shipping costs.

To conclude, we always urge you to be wary of advertising/promotional messages that boast of "giving away" valuables, and avoid clicking on suspicious links whose links may lead to a counterfeit site. In fact, if you trust these messages, your most valuable data is stolen by cyber crooks who can use it at will.


07 October 2025 ==> Phishing NETFLIX

SUBJECT: <Your payment has not been processed. —  update your details>

We examine another phishing attempt coming as a fake communication from NETFLIX, the well-known streaming platform for films, television series, and other paid content, which aims to steal the credit card details of the victim.

Clicca per ingrandire l'immagine della falsa e-mail di NETFLIX, che cerca di rubare i dati della carta di credito...
The message informs the user that a problem has been encountered in processing the payment of £6.99 for his/her subscription. To continue using the service without interruption, the user must update his/her payment details within 48 hours via the following link:

Update payment

When we examine the email, we see that the message has an email address <alp(at)fidelfatti-impianti(dot)it> that is not traceable to the official NETFLIX domain. This is definitely unusual and should make us suspicious.

Anyone who unluckily clicks on the Update payment link will be redirected to a web page unrelated to NETFLIX but designed to steal your most valuable data for criminal purposes.


06 October 2025 ==> SexTortion

The SexTortion-themed SCAM campaign is back. The e-mail seems to hint that the scammer had access to the victim's device. In fact, he appears to have used it to collect data and personal videos and then blackmailed the user by demanding payment of a sum of money, in the form of Bitcoin, not to divulge among his/her email and social contacts a private video of him/her looking at adult sites.

Below is an extract from the text of the email shown on the side:

Clicca per ingrandire l'immagine del tentativo di RICATTO VIA E-MAIL, che minaccia l'utente di inviare un video di lui mentre guardi SITI x Adulti..."Good morning. I am an experienced programmer who has hacked into your device's operating system. I have been watching you for several months now. My virus infected your device via an adult website you visited recently. If you don't know how it works, please read the information below. The Trojan virus gives me full access and control of the device you are using. As a result, I can see your entire screen, as well as turn on your camera and microphone without you ever knowing. In addition, I also have full access to your entire list of contacts on social networks and your catalogue. So why couldn't your antivirus detect the malicious malware? • The malware uses a special driver, updated every 4 hours, so your antivirus cannot detect it. I have created a video showing you masturbating on the left side of the screen, and on the right side, I have displayed the video you were watching at that moment. With a single click of the mouse, I can send your private video directly to your email contacts and social networks. In addition, I can also share your email and messenger login details."

At this stage, the agreement not to disclose the video is to send 1,200 USD in Bitcoin to the wallet indicated below: “bc1XXXXXXXXXXXXXxXXXXXXXXmkz”. After receiving the transaction, all data will be deleted. Otherwise, a video depicting the user will be sent to all colleagues, friends and relatives. The victim has 50 hours to make the payment!

An analysis of the payments made to the wallet on 08/10/2025 shows no transactions.

In such cases we always invite you:
  1. not to respond to these kinds of emails and not to open attachments or click unsafe links, and certainly NOT to send any money. You can safely ignore or delete them.
  2. if the criminal reports an actual user’s password – usually it is a password obtained from public Leaks (compromised data theft) of official sites occurred in the past (e.g., LinkedIn, Yahoo, etc.) - it is recommended to change it and enable two-factor authentication on that service.


06 October 2025 ==> Phishing WeTransfer

SUBJECT:< Your files have not yet been downloaded...>

Clicca per ingrandire l'immagine della falsa e-mail di WeTransfer, che cerca di indurre il ricevente a cliccare sui link per rubare le credenziali di accesso all'account.
Below, we analyse a phishing attempt that aims to steal WeTransfer account credentials.
 
The message informs the recipient that there are files that have not yet been downloaded and there is until 7 October to download them. After that date, only Ultimate users will be able to access the documents within a certain number of days. It then invites him or her to upgrade the account to postpone the expiry date of the pending files via the following link:

Upgrade now

When we analyse the email, we see that the message comes from an email address <merry(at)merryriana(dot)com> that is not linked to the WeTransfer domain. This is definitely unusual and should make us suspicious.

Anyone who unluckily clicks on the  Upgrade now link, will be redirected to an anomalous WEB page,  which has already been reported as DECEPTIVE WEBSITE/PAGE. In fact it is run by cyber-criminals whose goal is to get hold of your most valuable data in order to use it for malicious purposes.


05 October 2025 ==> Phishing SumUp

SUBJECT: <Confirm your email address so as not to miss any communications from SumUp>

Below, we analyse a new phishing attempt that pretends to be an official communication from SumUp, a well-known London-based digital payments company.

Clicca per ingrandire l'immagine della falsa e-mail che cerca di indurre il ricevente a inserire le credenziali di accesso all'account di SumUp
The message asks the recipient to verify his/her email address immediately to ensure the security and proper functioning of the SumUp account.

To confirm, the user just needs to click on the following link:


Check Now

The well-known London-based company is clearly not involved in the mass sending of these emails, which are genuine scams whose aim, as always, is to steal sensitive data from unsuspecting recipients.

If we look closely at the message, there are a few clues that should raise suspicion. First of all the email address of the  message <danysamyue[at]myt[dot]mu>  does not belong to the official SumUp domain. This is definitely unusual and should raise suspicion. Another strange fact is that the email does not provide any customer identification details and asks the user to enter his/her account credentials via a link provided in the email. 

Anyone who unluckily clicks on the Check Now link, will be redirected to an anomalous WEB page,  which has already been reported as DECEPTIVE WEBSITE/PAGE. In fact it is run by cyber-criminals whose goal is to get hold of your most valuable data in order to use it for malicious purposes.

We therefore urge you to always pay close attention to even the smallest details and not to enter your personal details and/or passwords on forms hosted on counterfeit web pages, as they will be used by cyber criminals for illegal purposes.



03 October 2025 ==> Phishing Aruba - Expired domain

SUBJECT: <Expired domain: imminent suspension risk­­>

Phishing attempts, claiming to be communications from the Aruba brand, continue this month.

Clicca per ingrandire l'immagine della falsa e-mail di Aruba che induce l'utente ad effettuare l'accesso per rinnovare il dominio scaduto, ma in realtà è una TRUFFA!
The message informs the recipient that his/her domain hosted on Aruba has expired. It then warns him/her that in order to avoid service interruptions, he/she can immediately renew the domain  via the following link:

Renew your domain

Let's always be careful with requests to enter personal credentials via suspicious links sent by e-mail.
Clearly, the well-known web hosting, e-mail and domain registration company, Aruba, is not involved in the mass sending of these emails, which are genuine scams whose aim, as always, is to steal sensitive data from unsuspecting recipients

We immediately see that the email address of the message <postmaster[at]vmt[dot]alicornaqua[dot]com> does not belong to the official Aruba domain. This is highly unusual and should make us suspicious.
The cybercriminal, to induce the victim to act quickly, the cybercriminal allows little time to respond. This technique is clearly intended to intimidate the user, who, fearing that he/she will be unable to access his/her account and use the services linked to it, is prompted to act without paying due attention. 

Anyone who unluckily clicks on the  link, will be redirected to an anomalous WEB page,  which has already been reported as DECEPTIVE WEBSITE/PAGE. In fact it is run by cyber-criminals whose goal is to get hold of your most valuable data in order to use it for illegal purposes.



01 October 2025 ==> Google Cloud

SUBJECT: <"Your 50 GB cloud offer is pending" >

Below, we analyse the scam attempt hidden behind a fake communication supposedly from Google Cloud, a service that allows users to store photos, videos and documents. Specifically, it is a message warning users that their documents will soon be deleted. 

Clicca per ingrandire l'avviso di spazio di archiviazione terminato...ma che in realtà è una TRUFFA!
As we can see in the image on the side, the message warns the user that his/her storage space on Google Cloud is full, and that if he/she does not take action as soon as possible, his/her photos, videos, contacts, files and data will be lost. The user is then invited to purchase additional space in order to prevent the loss of all data.

Google Cloud is clearly not involved in sending these malicious campaigns, which are outright scams whose goal remains, as always, to steal sensitive data from unsuspecting recipients.
This is, in fact, a phishing attempt aimed at stealing the personal data of unsuspecting users.
So keep your eyes open... a little caution and a quick glance are all it takes to avoid unpleasant surprises.

If we look at the email, we see that the sender <service[at]sk[dot]tapajosdepremios[dot]com[dot]br> is  clearly not linked to the official Google Cloud domain, a decidedly unusual fact that should make us suspicious.  

Moreover, if we click on UPDATE SPACE, we are redirected to a “landing” page which, although graphically well designed, does not seem at all trustworthy. In fact,  it is hosted on an unusual address/domain unrelated to the official Google Cloud domain. 


Clicca per ingrandire l'immagine dell'avviso spazio di archiviazione terminato...ma che in realtà è una TRUFFA!

If we click on Continue, a page will open showing us how to prevent photos, videos and documents from being lost forever.
In fact, thanks to a loyalty programme, an additional 50 GB of storage space can be obtained for just £1.95. To take advantage of this special offer, we need to answer three simple, generic questions, which provide cyber fraudsters with information about the users, such as their country of origin.

Clicca per ingrandire il falso sito di Google Colud dove viene richiesto di aggiornare lo spazio di archiviazione per ottenere 50GB...ma che in realtà è una TRUFFA!
Once all questions have been answered, it will finally be possible to request the additional storage space that will allow us to save all the data stored so far.

Clicca per ingrandire il falso sito di  Google Colud dove l'utente viene invitato a richiedere 50GB di spazio aggiuntivo...

Then, when we click  Continue, we will be taken back to the last screen where we are asked to enter our personal details and proceed with the payment of $1.95 to obtain the additional 50 GB of storage space.  

Clicca per ingrandire l'immagine del sito su cui si viene rimandati per effettuare il pagamento di un prodotto estraneo a Google Cloud... The aim of cyber criminals is precisely to induce users to enter their sensitive data!

The page where we are redirected to enter our personal data is hosted on the following anomalous address/domain, which we report below

https[:]//gryoulucky[.]com/it/....

To conclude, we urge you to always be vigilant and avoid clicking on suspicious links which could lead you to a fake website, putting your most valuable data in the hands of cyber criminals who can use use it at will.




A little attention and glance can save a lot of hassles and headaches

We urge you NOT to be fooled by these types of e-mails, which, even though they use familiar and not particularly sophisticated approach techniques, if there is a resurgence, with reasonable likelihood more than a few unfortunates will be fooled.
 
We invite you to check the following information on phishing techniques for more details:


04/09/2025 09:45Phishing: the most common credential and/or data theft attempts in September 2025...
05/08/2025 08:58Phishing: the most common credential and/or data theft attempts in August 2025...
01/07/2025 16:04 - Phishing: the most common credential and/or data theft attempts in July 2025.
05/06/2025 09:22 - Phishing: the most common credential and/or data theft attempts in  June 2025...
05/05/2025 15:03 - Phishing: the most common credential and/or data theft attempts in  May 2025...
07/04/2025 14:22 - Phishing: the most common credential and/or data theft attempts in April 2025...
07/03/2025 15:10 - Phishing: the most common credential and/or data theft attempts in  March 2025..
03/02/202514:54Phishing: the most common credential and/or data theft attempts in  February 2025...
03/01/2025 14:40Phishing: the most common credential and/or data theft attempts in January 2025...
03/12/2024 14:47 - Phishing: the most common credential and/or data theft attempts in  December 2024...
06/11/2024 14:33
Phishing: the most common credential and/or data theft attempts in November 2024...
07/10/2024 09:55
Phishing: the most common credential and/or data theft attempts in October 2024...

Try Vir.IT eXplorer Lite

If you are not yet using Vir.IT eXplorer PRO, it is advisable to install Vir.IT eXplorer Lite -FREE Edition- to supplement the antivirus in use to increase the security of your computers, PCs and SERVERS.

Vir.IT eXplorer Lite  has the following special features:
  • freely usable in both private and corporate environments with Engine+Signature updates without time limitation;
  • fully interoperable with other AntiVirus software and/or Internet Security products (both free and commercial) already installed on your computer. It doesn't need any uninstallation and it doesn't cause slowdowns, as some features have been appropriately reduced to ensure interoperability with the AntiVirus software already on your PC/Server. This, however, allows cross-checking through the scan;
  • it identifies and, in many cases, even removes most of the viruses/malware actually circulating or, alternatively, allows them to be sent to the C.R.A.M. Anti-Malware Research Center for further analysis to update Vir.It eXplorer PRO;
  • through Intrusion Detection technology, also made available in the Lite version of Vir.IT eXplorer, the software is able to report any new-generation viruses/malware that have set in automatically and send the reported files to TG Soft's C.R.A.M
  • Download Vir.IT eXplorer Lite from the official distribution page of TG Soft's website.
 

VirIT Mobile Security AntiMalware ITALIAN for ALL AndroidTM Devices

VirIT Mobile Security Italian Anti-Malware software that protects Android™ smartphones and tablets, from Malware intrusions and other unwanted threats, and empowers the user to safeguard his/her privacy with an advanced heuristic approach (Permission Analyzer).
 

VirIT Mobile Security l'Antimalware di TG Soft per Android(TM)

TG Soft makes VirIT Mobile Security available for free by accessing the Google Play Store market (https://play.google.com/store/apps/details?id=it.tgsoft.virit) from which you can download the Lite version, which can be freely used in both private and corporate settings.

You can upgrade to the PRO version by purchasing it directly from our website=> click here to order
 


Acknowledgements

TG Soft's Anti-Malware Research Center would like to thank all users, customers, reseller technicians, and all people who have transmitted/reported material attributable to Phishing activities to our Research Center, that allowed us to make this information as complete as possible.


How to submit suspicious emails for analysis as possible phishing but also virus/malware or Crypto-Malware

You can submit materials to TG Soft's Anti-Malware Research Center safely and free of charge in two ways:
  1. any suspect email can be sent directly by the recipient's e-mail, to the following mail lite@virit.com,choosing as sending mode "Forward as Attachment" and inserting in the subject section "Possible phishing page to verify" rather than "Possible Malware to verify";
  2. save the e-mail to be sent to TG Soft's C.R.A.M. for analysis as an external file to the e-mail program used. The resulting file must be sent by uploading it from the page Send Suspicious Files (http://www.tgsoft.it/italy/file_sospetti.asp). Obviously if you want a feedback on the analysis of the data submitted, you have to indicate an e-mail address and a brief description of the reason for the submission (for example: possiible / probable phishing; possible / probable malware or other).
For more details on how to safely forward suspicious e-mails, we invite you to consult the following public page: How to send suspicious emails for analysis
We provide all this information to help you prevent credential theft, viruses/malware or, even worse, next-generation Ransomware / Crypto-Malware.


TG Soft Anti-Malware Research Centre (C.R.A.M.)




Any information published on our site may be used and published on other websites, blogs, forums, facebook and/or in any other form both in paper and electronic form as long as the source is always and in any case cited explicitly “Source: CRAM by TG Soft www.tgsoft.it” with a clickable link to the original information and / or web page from which textual content, ideas and / or images have been extrapolated.
It will be appreciated in case of use of the information of C.R.A.M. by TG Soft www.tgsoft.it in the report of summary articles the following acknowledgment/thanks “Thanks to Anti-Malware Research Center C.R.A.M. by TG Soft of which we point out the direct link to the original information: [direct clickable link]”

Vir.IT eXplorer PRO is certified by the biggest international organisation: