04/02/2026
10:33

The most widespread Phishing attempts in FEBRUARY 2026


Find out the most common phishing attempts you might encounter and avoid

PHISHING INDEX

Below are the most common email phishing attempts detected by the TG Soft Anti-Malware Research Center in February 2026:

25/02/2026 => ING Bank
24/02/2026 => PayPal
23/02/2026 => Aruba - Pending messages
22/02/2026 => SumUp
20/02/2026 => WeTransfer
19/02/2026 => Aruba - Support request
19/02/2026 => OneDrive
18/02/2026 => Bank
18/02/2026 => Tiscali
12/02/2026 => SumUp
03/02/2026 => Webmail

These emails aim to deceive unsuspecting victims into providing sensitive information, such as bank account details, credit card codes, or personal login credentials, with all the easily imaginable consequences.

25 February 2026 ==> Phishing ING Bank

SUBJECT: <ING service: a one-time confirmation of your data is required>

We have identified another phishing attempt pretending to be an official communication from ING

Clicca per ingrandire l'immagine della falsa e-mail della Banca ING Direct, che cerca di rubare i dati dell'HomeBanking...
The message warns the unsuspecting recipient: ‘In accordance with the new EU directives on payment service security (PSD2) and in order to improve the protection of your data in online banking, a one-time confirmation of your account details is required.’ The recipient must confirm his/her details by 28 February to avoid a temporary restriction of the account. He/she is then invited to complete the procedure via the following link:

Register now securely



ING is clearly not involved in the mass sending of these emails, which are scams whose aim, as always, is to steal the home banking login credentials of unsuspecting recipients.

Looking at the message, we can see straight away that it's pretty generic and that the sender's email address <noreply(at)baaaaaaaadr(dot)firebaseapp(dot)com> isn't linked to the ING official domain. Another unusual aspect is the request to update personal data by entering online banking credentials through a link sent via email. 
 
The link in the message redirects us to a web page that is supposed to simulate the official ING website but it actually redirects to a page already reported as a DECEPTIVE PAGE/WEBSITE. In fact it is actually managed by cybercriminals whose goal is to obtain your most valuable data so that they can use it for their own purposes.

To conclude, we urge you to always be wary of any email that asks you to enter confidential information, and avoid clicking on suspicious links, which could lead to a fake website difficult to distinguish from the original one.



24 February 2026 ==> Phishing PayPal

SUBJECT: <­­Y­­o­­u­­r­­ A­­c­­c­­o­­u­­n­­t ­­S­­e­­c­­u­­r­­i­­t­­y­­: ­­U­­n­­r­­e­­c­­o­­g­­n­­i­­z­­e­­d­­ L­­o­­g­­i­­n­­ f­­r­­o­­m­­ [­­S­­a­­n­­to­­r­­i­­n­­i­­, ­­G­­r­­e­­c­­i­­a­­]>

Below, we analyse a new phishing attempt that aims to steal login credentials for PayPal accounts, the well-known US digital payments company.

Clicca per ingrandire l'immagine della falsa e-mail che cerca di indurre il ricevente a inserire le credenziali di accesso all'account di PayPal.
The message informs the recipient that access to his/her PayPal account has been detected from a unrecgnised device, and also provides details of the device that accessed the account, its location, date and time. It then warns him/her that if he/she did not perform the operation, it is necessary to follow the security procedure indicated below to protect the account and the account holder's personal data. The user can verify the reported suspicious activity by using the link:

Secure your account

When we look at the message, we see that it has an email address <lina[at]elettro3s[dot]it> that clearly isn't linked to the official PayPal domain. This is definitely weird and should make us suspicious

Anyone who unluckily clicks on the Secure your account link, will be redirected to a web page unrelated to PayPall, but designed to obtain your most valuable data for criminal purposes.

23 February 2026 ==> Phishing Aruba - Pending messages

SUBJECT: <Action required: retrieve pending messages from your Aruba Cloud account>

Below is another phishing attempt pretending to be a communication from the Aruba brand.Clicca per ingrandire l'immagine della falsa e-mail di Aruba che induce l'utente ad effettuare l'accesso al suo account...in realtà è una TRUFFA! This time, the message informs the recipient that there are pending documents in his/her account.
The files available for recovery are then listed, but they are very generic:

"Delivery note
Invoice
Payment receipt
"

It then warns him/her that in order to recover the files, he/she must follow the instructions provided via the following link:

RECOVER ALL MESSAGESALL

The well-known web hosting, e-mail and domain registration company Aruba is clearly not involved in the mass sending of these emails, which are genuine scams whose aim, as always, is to steal sensitive data from unsuspecting recipients.

When we carefully examine the message, there are some clues that should raise suspicion. We immediately see that the email address of the message <noreply[at]****l>, does not belong to the official Aruba domain. This is definitely unusual and should make us suspicious

Anyone who unluckily clicks on the link will be redirected to a fraudulent web page, which has already been reported as a DECEPTIVE SITE because it is managed by cybercriminals whose goal is to obtain your most valuable data in order to use it for their own purposes.

We always urge you to pay attention to every detail, even trivial ones, not to rush and not to enter your personal details and/or passwords on forms hosted on counterfeit web pages.

22 February 2026 ==> Phishing SumUp

SUBJECT: <Alerta de Seguridad: Actualización Obligatoria 2026>

Below, we analyse another phishing attempt that pretends to be an official communication from  SumUp, a well-known London-based digital payments company.

Clicca per ingrandire l'immagine della falsa e-mail che cerca di indurre il ricevente a inserire le credenziali di accesso all'account di SumUp
The message, this time in Spanish, notifies the recipient of a report concerning the security of the user's account and warns: ‘Our system has detected an irregularity in the security parameters that makes it essential to immediately apply Protection Patch 2026. This update is essential to neutralise potential intrusion risks and preserve the confidentiality of your information.’
It also warns him/her that, if he/she does not update his details via the link provided, his/her account will be temporarily blocked for security reasons:

INICIAR VERIFICACION AHORA

The well-known London-based company is clearly not involved in the mass sending of these emails, which are genuine scams whose aim, as always, is to steal sensitive data from unsuspecting recipients.

A careful analysis of the message reveals some clues that should raise suspicion. We immediately notice that the email address of the message < noreply-pci2p7[at]teamdizza-a9056[dot]firebaseapp[dot]com> does not belong to the official SumUp domain. This is highly unusual and should make us very suspicious. Another strange fact is that the email does not provide any customer identification details and asks you to enter your account credentials via a link sent by email.

Anyone who unfortunately clicks on the INICIAR VERIFICACION AHORA link, will be redirected to a malicious web page, which has already been reported as a DECEPTIVE PAGE/WEBSITE, as it is managed by cybercriminals whose aim is to obtain your most valuable data so that they can use it for their own purposes.


20 February 2025 ==> Phishing WeTransfer

SUBJECT: < postacert@comune.gov.it has sent you 3 files via WeTransfer>

Clicca per ingrandire l'immagine della falsa e-mail di WeTransfer, che cerca di indurre il ricevente a cliccare sui link per rubare le credenziali di accesso all'account.
Below, we analyse a phishing attempt that aims to steal WeTransfer account credentials
 
The message informs the recipient that he/she has received 3 files and invites him/her to log in to download the files via the following link:

Download files

When we examine the email, we immediately notice an inconsistency in the information. In fact, while the subject line indicates that the sender of the files is <postacert(at)comune(dot)gov(dot)it>, the message has an email address that cannot be traced back to the sender indicated in the body of the message, nor to WeTransfer <info(at)ilbivio-hotel(dot)it>. This is definitely unusual and should make us suspicious.

Anyone who unfortunately clicks on the Download files link, will be redirected to a malicious web page, which has already been reported as a DECEPTIVE SITE. In fact, it is managed by cybercriminals whose goal is to get hold of your most valuable data so that they can use it for their own purposes. 



19 February 2026 ==> Phishing Aruba - Support request

SUBJECT: <Aruba.it – Support request no. [17014283M]>

This month, we once again encounter phishing attempts pretending to be communications from the Aruba brandClicca per ingrandire l'immagine della falsa e-mail di Aruba che induce l'utente ad effettuare l'accesso al suo account...in realtà è una TRUFFA!. This time, the message informs the recipient that the identity document indicated in his/her personal data expired on 19/02/2026.
It therefore warns him/her that his/her identity has been suspended and he/she cannot use the services at this time. To reactivate the account, he/she must update his/her personal details by logging into the Customer Area and clicking on “User Information” and “Document”.
It then invites the user to proceed via the following link:

https[:]//aruba[.]it/sso-sysajx/webmail?sys=NJ98h7iBI7gbi7Bo-inoBIub[oNPno]=uBIyvIBLnoIHNoibIBk?A8JgT8dW

The well-known web hosting, e-mail and domain registration company Aruba is clearly not involved in the mass sending of these emails, which are genuine scams whose aim, as always, is to steal sensitive data from unsuspecting recipients.

When we examine the message carefully, there are some clues that should raise suspicion. We immediately notice that its the email address  <l(dot)danna[at]mooresrowland[dot]srl> does not belong to the official Aruba domain, an anomaly that should make us suspicious.

Clicca per ingrandire l'immagine del falso sito di Aruba dove viene richiesto di effettuare l'accesso per aggiornare i propri dati anagrafici...in realtà si tratta di una TRUFFA!
Anyone who unfortunately clicks on the link will be redirected to a web page that, although it graphically simulates the Aruba account login page – due to the presence of the well-known company's logo – has an unusual address/domain:

 https[:]//FakeDomainName*]

On this page, users are invited to access his/her customer area by entering his/her email login and password to update his/her personal details and reactivate services.

We always urge you to pay attention to every detail, even trivial ones, not to rush and not to enter your personal details and/or passwords on forms hosted on fake web pages, as these will be sent to the cybercriminals behind the scam, who will use them for illegal purposes.

19 February 2026 ==> Phishing OneDrive

SUBJECT: < New work order approved by “Company Name PLC”>

Clicca per ingrandire l'immagine della falsa e-mail di OneDrive, che cerca di indurre il ricevente a cliccare sui link per rubare le credenziali di accesso all'account.
Below, we analyse a phishing attempt that aims to steal OneDrive account credentials.
 
The message informs the recipient that he/she has received a file named Dichiarazione.pdf (Statement.pdf) on OneDrive from a PLC company. It then invites him/her to view the attached document by clicking on the following link:

NomeSocietà S.p.A. - Dichiarazione.PDF (Companyname PLC-Statement.PDF)

When we examine the message, we see an email address seemingly originating from the domain of the mentioned company.
However, when we open the attachment, we notice some suspicious elements.

Clicca per ingrandire l'immagine del falso sito da cui si dovrebbe scaricare il documento...in realtà si tratta di una TRUFFA!
When we click on the link, we are redirected to a web page that asks the user to log in again to view the two PDF files received online.

Actually, the page where we're redirected to enter our OneDrive credentials is hosted on a suspicious address/domain, which we've listed below:

 https[:]//[FakeDomainName*]

We urge you to always pay attention to every detail, even trivial ones, and not to enter your personal details and/or passwords on forms hosted on counterfeit web pages, as they will be sent to a remote server and used by cyber fraudsters, with all the associated risks that this entails.



18 February 2026 ==> Phishing Bank

SUBJECT: <Confidential Notice: Confirmation of Information Associated with Your Profile>

We find again this month the phishing campaign that spreads through an e-mail exploiting stolen graphics or similar to the graphics of a well known bank. Hence it tries to pass itself off as an official communication, in order to induce the unsuspecting recipient to do what requested, and fall into a social engineering trap.

Clicca per ingrandire l'immagine della falsa e-mail che cerca di indurre il ricevente a inserire le credenziali della Home Banking.
The message informs the unsuspecting recipient that, for security reasons, his/her profile information, particularly his/her contact details, must be confirmed in order to ensure that his/her account is fully operational.

To confirm, we just need to click on the link:

CONFIRM DATA

We can immediately see that the message comes from a highly suspicious email address <millo(at)ceripe(dot)it> and contains very generic text, despite the fact that the cybercriminal has included the bank's logo in order to mislead the user. The intention is to trick the victim into logging into his or her banking app so that the data can be stolen.

The purpose is to get the recipient to click on the CONFIRM DATA link, which, we must point out, redirects to a page that has already been reported as a DECEPTIVE WEBSITE. In fact, it is managed by cybercriminals whose goal is to obtain your most valuable data in order to use it for criminal purposes.


18 February 2026 ==> Phishing Tiscali

SUBJECT: <(Urgent deactivation notice)>

Below we analyse a phishing attempt that aims to steal TISCALI account login credentials.

Clicca per ingrandire l'immagine della falsa e-mail di Tiscali che cerca di indurre il ricevente a inserire le credenziali di accesso all'account.
The message informs the recipient that his/her email has expired and has been deactivated, meaning that it is no longer possible to send or receive messages until it is reactivated. The email warns the user that, one day after the expiry date, all messages will be deleted.

The user is then asked to reactivate his/her account as soon as possible via the following link:

REACTIVATE NOW

Looking closely at the message, there are some clues that should raise suspicion. We immediately notice that its email address <milantns[at]sbb[dot].rs> does not belong to the official TISCALI domain, a definite red flag. Another warning sign is that, in order to confirm, the user is asked to enter his/her account credentials via a link provided in the email 

Clicca per ingrandire l'immagine del falso sito di TISCALI, dove viene richiesto di inserire le credenziali dell'account personale.
Anyone who unfortunately clicks on the REACTIVATE NOW link, will be redirected to a web page which, although it graphically simulates the TISCALI account login page by including the company logo, is not at all trustworthy. In this case too, the address is abnormal:

https[:]//FakeDomainName*]

On this page, users are invited to log in to his/her customer area, where he/she can then reactivate his/her account to avoid losing data.

We always urge you to pay attention to every detail, even trivial ones, not to rush and not to enter your personal details and/or passwords on forms hosted on fake web pages, as these will be sent to the cybercriminals behind the scam, who will use them for illegal purposes.



12 February 2026 ==> Phishing SumUp

SUBJECT: <Final notice: account verification required - Code: 761427>

Below, we analyse a new phishing attempt that pretends to be an official communication from SumUp, a well-known London-based digital payments company.

Clicca per ingrandire l'immagine della falsa e-mail che cerca di indurre il ricevente a inserire le credenziali di accesso all'account di SumUp
The message, which concerns the security of the user's account, warns: ‘We have detected unusual activity on your account. For your security, access has been temporarily restricted. Please verify your information to restore full access.’
To verify, simply click on the following link:

Verify Account

The well-known London-based company is clearly not involved in the mass sending of these emails, which are genuine scams whose aim, as always, is to steal sensitive data from unsuspecting recipients.

A careful analysis of the message reveals some clues that should raise suspicion. We immediately notice that the email address of the message < mail[at]dcaef0dc22[dot]nxcli[dot]io> does not belong to the official SumUp domain. This is highly unusual and should definitely raise suspicion. Another strange fact is that the email does not provide any customer identification details and asks him/her to enter his/her account credentials via a link provided in the email.


Clicca per ingrandire l'immagine del falso sito di SumUp dove viene richiesto di effettuare l'accesso per l'aggiornamento dell'account...in realtà si tratta di una TRUFFA!
Anyone who unluckily clicks on the Verify Account link, will be redirected to a web page which, although it graphically simulates the SumUp account login page due to the presence of the well-known company's logo, has an unusual address/domain:

 https[:]//[FakeDomainName*]

On this page, users are invited to access their customer area by entering their email login and password and then proceed with the requested update.

We therefore urge you to always pay close attention to even the smallest details and not to enter your personal details and/or passwords on forms hosted on counterfeit web pages, as they will be used by cyber fraudsters for illegal purposes.


03 February 2026 ==> Phishing Webmail

SUBJECT: <Undelivered messages report>

Below, we analyse the phishing attempt that aims to steal the email account credentials of the victim.

Clicca per ingrandire l'immagine della falsa e-mail che si spaccia per il server di posta elettronica e che induce l'utente a cliccare sul link per rubare le credenziali di accesso...in realtà è una TRUFFA!
The message, in English, informs the recipient that his/her email account password will expire today and that he/she must update it as soon as possible in order to continue using the services linked to it. To keep the password, he/she use the following link:

Use Same Sign In Credentials

When we examine the message, we see that it has an email address <cs(at)eita(dot)co(dot)id> that seems to belong to the recipient's email domain. This is highly unusual and should make us very suspicious.

Anyone who unfortunately clicks on the Use Same Sign In Credentials link, will be redirected to a fraudulent web page, which is designed to imitate the email account login page.

Clicca per ingrandire l'immagine del falso sito del server di posta elettronica dove viene richiesto di effettuare l'accesso al proprio account...in realtà si tratta di una TRUFFA!
On this page, the user is invited to log in to his/her account by entering, in particular, the password for his/her e-mail account to confirm or change his/her current password, which is supposed to expire.

Actually, the page where the user is redirected to enter his or her email account credentials is hosted on an anomalous address/domain, which we report below:

 https[:]//[FakeDomainName*]

We urge you to always pay attention to every detail, even trivial ones, and not to enter your personal details and/or passwords on forms hosted on counterfeit web pages, as they will be sent to a remote server and used by cyber fraudsters, with all the associated risks that this entails.



A little attention and a quick glance can save you a lot of hassle and headaches...

We urge you NOT to be fooled by these types of e-mails, which, even though they use familiar and not particularly sophisticated approach techniques, if there is a resurgence, with reasonable likelihood more than a few unfortunates will be fooled.
 
We invite you to check the following information on phishing techniques for more details:


04/12/2025 15:56 - Phishing: the most common credential and/or data theft attempts in December 2025...
04/11/2025 14:45 Phishing: the most common credential and/or data theft attempts in Novembre 2025...
01/10/2025 16:40 - Phishing: the most common credential and/or data theft attempts in October 2025...
04/09/2025 09:45Phishing: the most common credential and/or data theft attempts in September 2025...
05/08/2025 08:58Phishing: the most common credential and/or data theft attempts in August 2025...
01/07/2025 16:04 - Phishing: the most common credential and/or data theft attempts in July 2025.
05/06/2025 09:22 - Phishing: the most common credential and/or data theft attempts in  June 2025...
05/05/2025 15:03 - Phishing: the most common credential and/or data theft attempts in  May 2025...
07/04/2025 14:22 - Phishing: the most common credential and/or data theft attempts in April 2025...
07/03/2025 15:10 - Phishing: the most common credential and/or data theft attempts in  March 2025..
03/02/202514:54Phishing: the most common credential and/or data theft attempts in  February 2025...
03/01/2025 14:40Phishing: the most common credential and/or data theft attempts in January 2025...

Try Vir.IT eXplorer Lite

If you are not yet using Vir.IT eXplorer PRO, it is advisable to install Vir.IT eXplorer Lite -FREE Edition- to supplement the antivirus in use to increase the security of your computers, PCs and SERVERS.

Vir.IT eXplorer Lite  has the following special features:
  • freely usable in both private and corporate environments with Engine+Signature updates without time limitation;
  • fully interoperable with other AntiVirus software and/or Internet Security products (both free and commercial) already installed on your computer. It doesn't need any uninstallation and it doesn't cause slowdowns, as some features have been appropriately reduced to ensure interoperability with the AntiVirus software already on your PC/Server. This, however, allows cross-checking through the scan;
  • it identifies and, in many cases, even removes most of the viruses/malware actually circulating or, alternatively, allows them to be sent to the C.R.A.M. Anti-Malware Research Center for further analysis to update Vir.It eXplorer PRO;
  • through Intrusion Detection technology, also made available in the Lite version of Vir.IT eXplorer, the software is able to report any new-generation viruses/malware that have set in automatically and send the reported files to TG Soft's C.R.A.M
  • Download Vir.IT eXplorer Lite from the official distribution page of TG Soft's website.
 

VirIT Mobile Security AntiMalware ITALIAN for ALL AndroidTM Devices

VirIT Mobile Security Italian Anti-Malware software that protects Android™ smartphones and tablets, from Malware intrusions and other unwanted threats, and empowers the user to safeguard his/her privacy with an advanced heuristic approach (Permission Analyzer).
 

VirIT Mobile Security l'Antimalware di TG Soft per Android(TM)

TG Soft makes VirIT Mobile Security available for free by accessing the Google Play Store market (https://play.google.com/store/apps/details?id=it.tgsoft.virit) from which you can download the Lite version, which can be freely used in both private and corporate settings.

You can upgrade to the PRO version by purchasing it directly from our website=> click here to order
 


Acknowledgements

TG Soft's Anti-Malware Research Center would like to thank all users, customers, reseller technicians, and all people who have transmitted/reported material attributable to Phishing activities to our Research Center, that allowed us to make this information as complete as possible.


How to submit suspicious emails for analysis as possible phishing but also virus/malware or Crypto-Malware

You can submit materials to TG Soft's Anti-Malware Research Center safely and free of charge in two ways:
  1. any suspect email can be sent directly by the recipient's e-mail, to the following mail lite@virit.com,choosing as sending mode "Forward as Attachment" and inserting in the subject section "Possible phishing page to verify" rather than "Possible Malware to verify";
  2. save the e-mail to be sent to TG Soft's C.R.A.M. for analysis as an external file to the e-mail program used. The resulting file must be sent by uploading it from the page Send Suspicious Files (http://www.tgsoft.it/italy/file_sospetti.asp). Obviously if you want a feedback on the analysis of the data submitted, you have to indicate an e-mail address and a brief description of the reason for the submission (for example: possiible / probable phishing; possible / probable malware or other).
For more details on how to safely forward suspicious e-mails, we invite you to consult the following public page: How to send suspicious emails for analysis
We provide all this information to help you prevent credential theft, viruses/malware or, even worse, next-generation Ransomware / Crypto-Malware.



TG Soft
Anti-Malware Research Centre (C.R.A.M.)


Any information published on our site may be used and published on other websites, blogs, forums, facebook and/or in any other form both in paper and electronic form as long as the source is always and in any case cited explicitly “Source: CRAM by TG Soft www.tgsoft.it” with a clickable link to the original information and / or web page from which textual content, ideas and / or images have been extrapolated.
It will be appreciated in case of use of the information of C.R.A.M. by TG Soft www.tgsoft.it in the report of summary articles the following acknowledgment/thanks “Thanks to Anti-Malware Research Center C.R.A.M. by TG Soft of which we point out the direct link to the original information: [direct clickable link]”

Vir.IT eXplorer PRO is certified by the biggest international organisation: