04/11/2025
14:45

The most widespread Phishing attempts in NOVEMBER 2025


Find out the most common phishing attempts you might encounter and avoid

PHISHING INDEX

Below are the most common email phishing attempts detected by the TG Soft Anti-Malware Research Center in November 2025:

29/11/2025 => Skrill
27/11/2025 => Tigota'
25/11/2025 => Email Account
24/11/2025 => Nexi
22/11/2025 => GLS
16/11/2025 => Email Account
14/11/2025 => Aruba - Renew your domain
11/11/2025 => Survey - Esselunga / Decathlon
09/11/2025 => Netflix
06/11/2025 => Aruba
02/11/2025 => PayPal
01/11/2025 => PayPal

These emails aim to deceive unsuspecting victims into providing sensitive information, such as bank account details, credit card codes, or personal login credentials, with all the easily imaginable consequences.

29 November 2025 ==> Phishing Skrill

SUBJECT: <Sie haben eine Nachricht vom Skrill-Κundservice>
<
You have received a message from Skrill customer service.>

Below, we examine a phishing attempt that aims to steal the account credentials of Skrill, a UK-based company that offers money transfer services.

Clicca per ingrandire l'immagine della falsa e-mail che si spaccia per Skrill, il portafoglio digitae per il trasferimento di denaro, e che induce l'utente a cliccare sul link per rubare le credenziali di accesso...in realtà è una TRUFFA!
The message, in German and seemingly from the Skrill customer service department, aims to gather customers' testimonials and suggestions regarding their experience with the services offered by the company. These surveys, which are normally carried out by various brands, aim to understand the customer's perception of the product/service in order to identify weaknesses and improve that perception. The questions are usually generic, and users do not have to identify themselves to express their opinion; in fact, most of the time they are anonymous. In the example shown, however, by continuing and clicking on the following link:

Hier Klicken
Click here

we are redirected to a fake web page that simulates the login page for our personal Skrill account. When we examine the email, we notice that the message comes from an email address <postmaster(at)eircom(dot)net>, clearly unrelated to the Skrill domain. This is highly unusual and should make us suspicious.

Anyone who unfortunately clicks on the link will be redirected to the web page that we analyse below.

Clicca per ingrandire l'immagine del falso sito di Skrill dove viene richiesto di effettuare l'accesso al proprio account...in realtà si tratta di una TRUFFA!
On this page, users are invited to log in to their Skrill account by entering their email address and password, and then complete the customer satisfaction survey.

Actually, the page where the user is redirected to enter his/her bank account credentials, although graphically misleading and well designed, is hosted on an abnormal address/domain:

https[:]//[FakeDomainName*]

We always urge you to pay attention to every detail, even trivial ones, and not to enter your personal details and/or passwords on forms hosted on counterfeit web pages, as they will be sent to a remote server and used by cyber fraudsters, with all the associated risks that are easy to imagine.

27 November 2025 ==> Phishing customer survey: TIGOTA'

Clicca per ingrandire sondaggio che sembra provenire da TIGOTA e che permetterebbe di vincere un premio...ma che in realtà è una TRUFFA!Below, we analyse another phishing campaign themed around customer surveys that exploits the brand names of well-known companies.
In the example shown, the cybercriminal used the well-known TIGOTA' brand, which seems to be promoting a message offering the chance to win an exclusive ‘Lancome Beauty Box’ prize. To claim the prize, all you have to do is answer a few short questions.
The brands exploited in these campaigns are clearly unrelated to the mass sending of these malicious emails, which are genuine scams whose aim remains, as always, to steal sensitive data from unsuspecting recipients.
In the example shown, we see that the email comes from an address <news[at]edicomedizioni[dot]com> unrelated to the official TIGOTA' domain. This is definitely unusual and should certainly make us suspicious.

When we click on the links in the e-mail, we are directed to a landing page that may look graphically deceptive (with misleading images and the brand's authentic logo), but is hosted on an abnormal address/domain that is not  trustworthy or traceable to the exploited brand.

The cybercriminals behind the scam, in order to achieve their goal, use various tricks, such as reporting false testimonials from customers who have won the prize. They try to persuade the user to complete the survey quickly, by making him/her believe that only a few can win, and that the offer expires today.
Surely if so many users were lucky why not take a chance?

When the survey is completed, the user is usually sent to a page for the entry of the shipping address and subsequent payment of shipping costs.
The cybercriminals' purpose, is to induce the victim to enter his/her personal information to ship the prize and then, likely, also the credit card information to pay the shipping costs.
 

To conclude, we always urge you to be wary of advertising/promotional messages that boast of "giving away" valuables, and avoid clicking on suspicious links whose links may lead to a counterfeit site. In fact, if you trust these messages, your most valuable data is stolen by cyber crooks who can use it at will.



25 November 2025 ==> Phishing Email Account

SUBJECT: <**** - Password expired>

Below, we analyse a phishing attempt that aims to steal the email account credentials of the victim.

Clicca per ingrandire l'immagine della falsa e-mail che si spaccia per il server di posta elettronica e che induce l'utente a cliccare sul link per rubare le credenziali di accesso...in realtà è una TRUFFA!
The message informs the recipient that his/her email account password has expired and a new password will be automatically generated after 24 hours. It therefore informs him/her that he/she can continue to use his/her current password clicking on the following link:

Keep your current password

When we analyse the email, we see that the message comes from an email address <no-reply(at)*******> that seems to belong to the recipient's email domain. This is definitely unusual and should make us suspicious.

Anyone who unluckily clicks on the link will be redirected to a fake web page, which is designed to simulate the login page for the Email account.

Clicca per ingrandire l'immagine del falso sito del server di posta elettronica dove viene richiesto di effettuare l'accesso al proprio account...in realtà si tratta di una TRUFFA!
On this page, users are asked to log in to their account by entering, most notably, their e-mail password to confirm or change their current password, which is about to expire.

Actually, the page where users are redirected to enter their email account credentials is hosted on an anomalous address/domain, which we report below:

 https[:]//[FakeDomainName*]

We always urge you to pay attention to every detail, even trivial ones, and not to enter your personal details and/or passwords on forms hosted on counterfeit web pages, as they will be sent to a remote server and used by cyber fraudsters, with all the associated risks that are easy to imagine.


24 November 2025 ==> Phishing Nexi

SUBJECT: <Important: verification of user information>
 
Clicca per ingrandire l'immagine della falsa e-mail di Nexi che cerca di rubare i dati dell'account del destinatario...
This new phishing attempt pretends to be a communication from Nexi, the well-known company that offers digital payment services.

The message informs the recipient that for security reasons, it is necessary to confirm his/her user profile information, specifically contact details and telephone number, to ensure that the account is correctly updated. It then asks the user to confirm his/her details as soon as possible via the following link:


CONFIRM DATA

Clearly, the well-known company is not involved in the mass sending of these emails, which are genuine scams whose aim, as always, is to steal sensitive data from unsuspecting recipients.

Although the cyber fraudster had the foresight to include the Nexi logo, we see that the message has an email address <fanta[at]ctamontaggi[dot]it> that cannot be traced back to the Nexi official domain. This is definitely unusual and should make us suspicious..

Anyone who unfortunately clicks on the link will be redirected to a fraudulent web page, which aims to steal access to credit card accounts but has already been reported as a DECEPTIVE PAGE/WEBSITE. In fact, it is run by cybercriminals whose goal is to get hold of your most valuable data so that they can use it for criminal purposes.

Given these considerations, we advise you to NEVER enter your credentials on websites whose origin you do not know, as they will be sent to a remote server and used by cyber fraudsters, with all the associated risks that are easy to imagine.



22 November 2025 ==> Phishing GLS

SUBJECT: <You have a problem with your delivery address.>

Below, we analyse a new attempt at data theft that arrives via a misleading message posing as the well-known GLS courier service.

Clicca per ingrandire l'immagine del falso messaggio che informa il ricevente che c'è un pacco in attesa di consegna ma che si tratta di una TRUFFA!
The message, shown on the side, refers specifically to a parcel awaiting delivery. The recipient is notified that it was not possible to deliver the parcel because no one was present to sign for it, so it was returned to the warehouse.
The recipient is therefore informed that in order to request a new delivery, a fee will be charged via the following link:

Click here


We can see that the message is very short and lacks information that would allow us to identify what delivery it refers to.
When we examine the email, we also see that it comes from an email address <hrvatska-hr(at)e-mail(dot)info(dot)com>  clearly not linked to the GLS courier service. This is highly unusual and should make us very suspicious. GLS is clearly not involved in sending these malicious mass emails, which are genuine scams whose aim, as always, is to steal sensitive data from unsuspecting recipients.
To avoid any misunderstanding, this is in fact a phishing attempt aimed at stealing your personal data.
So keep your eyes open... to avoid unpleasant inconveniences, all you need is a little caution and a quick glance.

Anyone who unfortunately clicks on the Click here link, will be redirected to a web page that is designed to look like the official GLS website, but which has already been reported as a DECEPTIVE WEBSIT. In fact, it is run by cybercriminals whose goal is to get hold of your most valuable data so that they can use it for criminal purposes.

We always urge you to pay attention to even the smallest details and not to enter your personal details and/or passwords on forms hosted on counterfeit web pages, as they will be sent to a remote server and used by cyber fraudsters.


16 November 2025 ==> Phishing Email Account

SUBJECT: <The password for ***** expires today!>

Below, we analyse a phishing attempt that aims to steal the email account credentials of the victim.

Clicca per ingrandire l'immagine della falsa e-mail che si spaccia per il server di posta elettronica e che induce l'utente a cliccare sul link per rubare le credenziali di accesso...in realtà è una TRUFFA!
The message informs the recipient that his/her email account password expires today and invites him/her to update his/her password before the expiry date, in order to avoid service interruptions, via the following link:

CONFIRM NOW

When we analyse the message we see that it comes from an email address <welcome(at)cantinhomercado(dot)com>, which clearly cannot be traced back to the email server. This is definitely unusual and should make us suspicious.

Anyone who unluckily clicks on the link will be redirected to a fraudulent web page that simulates the email account login page, but which has already been reported as a DECEPTIVE PAGE/WEBSITE. In fact it is run by cyber-criminals whose goal is to get hold of your most valuable data in order to use it for malicious purposes.


14 November 2025 ==> Phishing Aruba - Renew your domain

SUBJECT: <Notice: your domain ***** has expired – renew now­­>

Phishing attempts, claiming to be communications from the Aruba brand, continue this month.

Clicca per ingrandire l'immagine della falsa e-mail di Aruba che induce l'utente ad effettuare l'accesso per rinnovare il dominio scaduto, ma in realtà è una TRUFFA!
The message informs the recipient that his/her domain hosted on Aruba has expired. It then invites him/her to renew the domain at a cost of €5.99 via the following link in order to avoid service interruptions, incoming email blocking or loss of the domain:

Proceed to Renewal

Let's always be careful when asked to enter personal credentials via suspicious links sent by e-mail.
Clearly, the well-known web hosting, e-mail and domain registration company, Aruba, is not involved in the mass sending of these emails, which are genuine scams whose aim, as always, is to steal sensitive data from unsuspecting recipients.

We immediately see that the email address of the message <emaa[at]laurapoggio[dot]eu> does not belong to the official Aruba domain. This is highly unusual and should make us suspicious.
The cybercriminal, to induce the victim to act quickly, allows little time to respond. This technique is clearly intended to intimidate the user, who, fearing that he/she will be unable to access his/her account and use the services linked to it, is prompted to act without paying due attention. 

Anyone who unluckily clicks on the  link, will be redirected to an anomalous WEB page,  which has already been reported as DECEPTIVE WEBSITE/PAGE. In fact it is run by cyber-criminals whose goal is to get hold of your most valuable data in order to use it for illegal purposes.



9-11 November 2025 ==> Phishing customer survey: ESSELUNGA / DECATHLON

This month, we are once again seeing phishing campaigns themed around customer surveys that exploit the brands of well-known companies. 
In the first example, the cybercriminal used the well-known ESSELUNGA, brand to launch a promotional message that seems to offer the chance to win an exclusive prize: <Set Tupperware Modular Mates>. To claim the prize, all the user has to do is to answer a few short questions.
Clicca per ingrandire sondaggio che sembra provenire da ESSELUNGA e che permetterebbe di vincere un premio...ma che in realtà è una TRUFFA!
In the second example, the cybercriminal used the well-known  Decathlon brand to launch a promotional message that seems to offer the chance to win an exclusive prize: <Quechua hiking equipment package>. To claim the prize, all the user has to do is to answer a few short questions.
Clicca per ingrandire sondaggio che sembra provenire da Decathlon e che permetterebbe di vincere un premio...ma che in realtà è una TRUFFA!
The brands exploited in these campaigns are clearly unrelated to the mass sending of these malicious emails, which are genuine scams whose aim remains, as always, to steal sensitive data from unsuspecting recipients. 
In the two examples shown, we can see that the emails come from addresses <Decathlon[at]eshopings[dot]click> and <Esselunga[at]promofryou[dot]space> clearly unrelated to the official Decathlon and ESSELUNGA  domains. This is definitely unusual and should  make us suspicious.

When we click on the links in the e-mail, we are directed to a landing page that may look graphically deceptive (with misleading images and the brand's authentic logo), but is hosted on an abnormal address/domain that is not  trustworthy or traceable to the exploited brand.

The cybercriminals behind the scam, in order to achieve their goal, use various tricks, such as reporting false testimonials from customers who have won the prize. They try to persuade the user to complete the survey quickly, by making him/her believe that only a few can win, and that the offer expires today.
Surely if so many users were lucky why not take a chance?!

When the survey is completed, the user is usually sent to a page for the entry of the shipping address and subsequent payment of shipping costs.
The cybercriminals' purpose, is to induce the victim to enter his/her personal information to ship the prize and then, likely, also the credit card information to pay the shipping costs.

To conclude, we always urge you to be wary of advertising/promotional messages that boast of "giving away" valuables, and avoid clicking on suspicious links whose links may lead to a counterfeit site. In fact, if you trust these messages, your most valuable data is stolen by cyber crooks who can use it at will.


09 November 2025 ==> Phishing NETFLIX

SUBJECT: <Payment failed notification – Update your Netfli account details>

We examine another phishing attempt originating from a fake communication from NETFLIX, the well-known streaming platform for films, television series, and other paid content, which aims to steal the credit card details of the victim.

Clicca per ingrandire l'immagine della falsa e-mail di NETFLIX, che cerca di rubare i dati della carta di credito...
The message informs the user that a problem has been encountered in processing the payment of €6.99 for his/her subscription. In order to continue using the service without interruption, he/she is asked to log into his/her account and update his/her payment details via the following link:

Update data

When we examine the email, we notice that the message comes from an email address <evaan(at)laurapoggio(dot)com> that cannot be traced back to the official NETFLIX domain. This is definitely unusual and should make us suspicious.

Anyone who unluckily clicks on the Update data link, will be redirected to a web page unrelated to NETFLIX, which aims to obtain your most valuable data for criminal purposes.


06 November 2025 ==> Phishing Aruba - Payment confirmation

SUBJECT: <Order Payment Confirmation No. MO19830945>

This month, we once again encounter phishing attempts pretending to be communications from the Aruba brand.

Clicca per ingrandire l'immagine della falsa e-mail di Aruba che induce l'utente ad effettuare l'accesso per rinnovare il dominio, ma in realtà è una TRUFFA!
The message informs the recipient that the payment for the order <<No.: MO19830945 / Hosting + Dominio>> is under verification.
It therefore invites him/her to complete the procedure and confirm the activation of the Aruba service via the following link:

Customer Area

The well-known web hosting, e-mail and domain registration company Aruba is clearly not involved in the mass sending of these emails, which are genuine scams whose aim, as always, is to steal sensitive data from unsuspecting recipients.

When we examine the email, we immediately notice that the alert message comes from an address <esposto(at)avvocatinetwork(dot)it> that clearly does not belong to the official Aruba domain. Therefore,  we should always use great caution before clicking on suspicious links.

Anyone who unfortunately clicks on the Customer Area link, will be redirected to the web page displayed.
Clicca per ingrandire l'immagine del falso sito di Aruba dove viene richiesto di effettuare il pagamento del rinnovo del dominio...in realtà si tratta di una TRUFFA!
On this page, the user is invited to log in to his/her customer area by entering his/her username and password in order to pay the invoice and thus reactivate the suspended services.

Although the site may be misleading because it features the well-known Aruba logo, we see that the URL address in the browser bar is unusual and does not correspond to the official domain of the company:

https[:]//[FakeDomainName*]

If we enter our data on fake websites, it will be sent to the cybercriminals behind the scam, who will use it for criminal purposes. We therefore urge you not to rush and to pay attention to every detail, even the most trivial ones.





02 November 2025 ==> Phishing PayPal

SUBJECT: <Suspicious transaction detected – confirm activity>

Below, we analyse another phishing attempt that aims to steal login credentials for PayPal accounts, the well-known US digital payments company..

Clicca per ingrandire l'immagine della falsa e-mail che cerca di indurre il ricevente a inserire le credenziali di accesso all'account di PayPal.
The message informs the recipient that a suspicious transaction of € 893.20 has been detected on his/her account and that his/her account has been temporarily restricted for security reasons. We see that the well-known e-commerce site Amazon is mentioned, as well as an ID relating to the transaction. To authorise or block the transaction, the following link is provided:

Verify transaction

When we examine the message we see that comes from an email address <noreply[at]raws-84373[dot]firebaseapp[dot]com> clearly not linked to the PayPal official domain. This is highly unusual and should make us suspicious.
Clicca per ingrandire l'immagine della falso sito di PayPal che cerca di indurre il ricevente a inserire le credenziali di accesso all'account di PayPal.
Anyone who unfortunately clicks on the link, will be taken to the screen shown in the image at the side.
As we can see, users are redirected to a site that graphically simulates the PayPal login page but is hosted on an abnormal address/domain.

Given these considerations, we advise you to NEVER enter your credentials on websites whose origin you do not know, as they will be sent to a remote server and used by cyber fraudsters, with all the associated risks easily imaginable.



01 November 2025 ==> Phishing PayPal

SUBJECT: <Reminder: complete your online identification>

Below, we analyse another phishing attempt that aims to steal login credentials for Paypal accounts, the well-known US digital payments company.

Clicca per ingrandire l'immagine della falsa e-mail che cerca di indurre il ricevente a inserire le credenziali di accesso all'account di PayPal.
The message informs the recipient that, as confirmation of his/her identity has not yet been received, he/she must identify himself/herself online by accessing his/her Paypal account to avoid the blocking of online banking services by 2 November. A code is provided to be entered for identification purposes, which is valid for 24 hours, after which the account will be blocked. To verify their identity, users are asked to click on the following link:

https://www[dot]paypal[dot]com/id[=]9173100143962

When we examine the message, we see that it has an email address <postmaster[at]49b4168fc7[dot]nxcli[dot]io>  clearly not linked to the official Paypal domain. This is highly unusual and should make us very suspicious.
Clicca per ingrandire l'immagine della falso sito di PayPal che cerca di indurre il ricevente a inserire le credenziali di accesso all'account di PayPal.
Anyone who unfortunately clicks on the link, will be taken to the screen shown in the image at the side.
As we can see, users are redirected to a site that graphically simulates the Paypal login page but is hosted on an abnormal address/domain.

Given these considerations, we advise you to NEVER enter your credentials on websites whose origin you do not know, as they will be sent to a remote server and used by cyber fraudsters, with all the associated risks easily imaginable.




A little attention and a quick glance can save you a lot of hassle and headaches...

We urge you NOT to be fooled by these types of e-mails, which, even though they use familiar and not particularly sophisticated approach techniques, if there is a resurgence, with reasonable likelihood more than a few unfortunates will be fooled.
 
We invite you to check the following information on phishing techniques for more details:


01/10/2025 16:40 - Phishing: the most common credential and/or data theft attempts in October 2025...
04/09/2025 09:45Phishing: the most common credential and/or data theft attempts in September 2025...
05/08/2025 08:58Phishing: the most common credential and/or data theft attempts in August 2025...
01/07/2025 16:04 - Phishing: the most common credential and/or data theft attempts in July 2025.
05/06/2025 09:22 - Phishing: the most common credential and/or data theft attempts in  June 2025...
05/05/2025 15:03 - Phishing: the most common credential and/or data theft attempts in  May 2025...
07/04/2025 14:22 - Phishing: the most common credential and/or data theft attempts in April 2025...
07/03/2025 15:10 - Phishing: the most common credential and/or data theft attempts in  March 2025..
03/02/202514:54Phishing: the most common credential and/or data theft attempts in  February 2025...
03/01/2025 14:40Phishing: the most common credential and/or data theft attempts in January 2025...
03/12/2024 14:47 - Phishing: the most common credential and/or data theft attempts in  December 2024...
06/11/2024 14:33
Phishing: the most common credential and/or data theft attempts in November 2024...

Try Vir.IT eXplorer Lite

If you are not yet using Vir.IT eXplorer PRO, it is advisable to install Vir.IT eXplorer Lite -FREE Edition- to supplement the antivirus in use to increase the security of your computers, PCs and SERVERS.

Vir.IT eXplorer Lite  has the following special features:
  • freely usable in both private and corporate environments with Engine+Signature updates without time limitation;
  • fully interoperable with other AntiVirus software and/or Internet Security products (both free and commercial) already installed on your computer. It doesn't need any uninstallation and it doesn't cause slowdowns, as some features have been appropriately reduced to ensure interoperability with the AntiVirus software already on your PC/Server. This, however, allows cross-checking through the scan;
  • it identifies and, in many cases, even removes most of the viruses/malware actually circulating or, alternatively, allows them to be sent to the C.R.A.M. Anti-Malware Research Center for further analysis to update Vir.It eXplorer PRO;
  • through Intrusion Detection technology, also made available in the Lite version of Vir.IT eXplorer, the software is able to report any new-generation viruses/malware that have set in automatically and send the reported files to TG Soft's C.R.A.M
  • Download Vir.IT eXplorer Lite from the official distribution page of TG Soft's website.
 

VirIT Mobile Security AntiMalware ITALIAN for ALL AndroidTM Devices

VirIT Mobile Security Italian Anti-Malware software that protects Android™ smartphones and tablets, from Malware intrusions and other unwanted threats, and empowers the user to safeguard his/her privacy with an advanced heuristic approach (Permission Analyzer).
 

VirIT Mobile Security l'Antimalware di TG Soft per Android(TM)

TG Soft makes VirIT Mobile Security available for free by accessing the Google Play Store market (https://play.google.com/store/apps/details?id=it.tgsoft.virit) from which you can download the Lite version, which can be freely used in both private and corporate settings.

You can upgrade to the PRO version by purchasing it directly from our website=> click here to order
 


Acknowledgements

TG Soft's Anti-Malware Research Center would like to thank all users, customers, reseller technicians, and all people who have transmitted/reported material attributable to Phishing activities to our Research Center, that allowed us to make this information as complete as possible.


How to submit suspicious emails for analysis as possible phishing but also virus/malware or Crypto-Malware

You can submit materials to TG Soft's Anti-Malware Research Center safely and free of charge in two ways:
  1. any suspect email can be sent directly by the recipient's e-mail, to the following mail lite@virit.com,choosing as sending mode "Forward as Attachment" and inserting in the subject section "Possible phishing page to verify" rather than "Possible Malware to verify";
  2. save the e-mail to be sent to TG Soft's C.R.A.M. for analysis as an external file to the e-mail program used. The resulting file must be sent by uploading it from the page Send Suspicious Files (http://www.tgsoft.it/italy/file_sospetti.asp). Obviously if you want a feedback on the analysis of the data submitted, you have to indicate an e-mail address and a brief description of the reason for the submission (for example: possiible / probable phishing; possible / probable malware or other).
For more details on how to safely forward suspicious e-mails, we invite you to consult the following public page: How to send suspicious emails for analysis
We provide all this information to help you prevent credential theft, viruses/malware or, even worse, next-generation Ransomware / Crypto-Malware.


TG Soft Anti-Malware Research Centre (C.R.A.M.)





Any information published on our site may be used and published on other websites, blogs, forums, facebook and/or in any other form both in paper and electronic form as long as the source is always and in any case cited explicitly “Source: CRAM by TG Soft www.tgsoft.it” with a clickable link to the original information and / or web page from which textual content, ideas and / or images have been extrapolated.
It will be appreciated in case of use of the information of C.R.A.M. by TG Soft www.tgsoft.it in the report of summary articles the following acknowledgment/thanks “Thanks to Anti-Malware Research Center C.R.A.M. by TG Soft of which we point out the direct link to the original information: [direct clickable link]”

Vir.IT eXplorer PRO is certified by the biggest international organisation: