We recently received a tip from a customer that their institution was under recurring attacks that targeted their student single sign-on (SSO) portal. The threat actor leveraged Evilginx (likely version 3.0), an open source, advanced phishing adversary-in-the-middle (AITM, aka MITM) framework designed to steal login credentials and session cookies. Evilginx is widely used by cybercriminals to undermine multi-factor authentication (MFA) security, and this actor has used it to target at least 18 universities and educational institutions across the United States since April 2025. The campaigns were delivered through email and the phishing domains used subdomains that mimicked the legitimate SSO sites. Figure 1 shows a timeline of attack volumes, based on DNS, against the schools.

Figure 1

Figure 1. A timeline of SSO phishing attacks against higher educational institutions by the actor between April 12-Nov 16, 2025. Each color represents a different university.

Evilginx employs multiple evasion techniques, making it difficult to detect and analyze using common methods. For example, the software resists security scanners. Additionally, the actor running the university campaigns configured their toolkit to use short-lived phishing URLs and hide its servers behind Cloudflare proxies. Combined with Evilginx’s reverse-proxy characteristics, these tactics challenge traditional detection methods such as URL analysis and front-end code inspection (HTML, CSS, JavaScript). Nevertheless, the campaigns had consistent DNS patterns that allowed us to craft a signature for effective, continuous tracking using initial web server fingerprinting and extensive DNS-based analysis.

We uncovered nearly 70 domains related to these attacks and created tracking mechanisms to identify future activity. This work demonstrates that DNS can uncover malicious infrastructure that is otherwise very hard to detect, and the results can be used to pre-emptively protect organizations from compromise, including data breaches. It also highlights the benefit of collaboration: by sharing their story, our customer has helped protect many others.

Campaigns

In the campaigns we analyzed, students were targeted via personalized emails that contained TinyURL links. These short links redirected to phishing URLs dynamically generated from Evilginx phishlets—configuration files that define how the proxy interacts between the victim’s device and the legitimate site. Each phishing URL used a subdomain that impersonated the target brand and a URI with eight random alphabetic characters (case-insensitive).

The URLs expired within 24 hours, a tactic to limit exposure and evade detection. When victims accessed the phishing URL, Evilginx proxied the legitimate login flows in real time, making traffic appear normal and bypassing MFA. Figure 2 shows a simplified view of the actor’s campaign that targeted students enrolled at the University of San Diego, one of many universities that received these emails.

Figure 2

Figure 2. The threat actor used Evilginx to target University of San Diego students.

DNS Unveils Targets

Although the Evilginx proxy phishing URLs expired quickly, traces of their activities remain in passive DNS. When cybercriminals configure subdomains for phishlets, they typically use names that closely mimic legitimate login pages to appear authentic. This particular actor uses subdomain labels that match the legitimate service domain. For example, in one attack the phishing subdomain shibbolethmainrit[.]fiuy[.]weddingsarahetemmanuel[.]com impersonated a Rochester Institute of Technology SSO login page, which is hosted at shibboleth.main.ad.rit.edu. Both domains share the prefix “shibboleth,” which refers to an open-source identity management and authentication service.

By analyzing these labels, we determined that the actor has targeted at least 18 different U.S. universities. Figure 3 highlights the most targeted institutions based on the volume of DNS queries to their phishing sites. The top five targeted institutions are the University of California Santa Cruz, University of California Santa Barbara, University of San Diego, Virginia Commonwealth University, and the University of Michigan.

Figure 3

Figure 3. Universities targeted by the Evilginx actor

While the actor is currently using Cloudflare to hide their hosting location, they previously used dedicated servers in GoDaddy and NameCheap. In their infrastructure conversion, they reused some domains, allowing us to unravel a much larger set of campaigns and analyze the attack timeline. In total, we found 67 domains owned by the actor. The first domain observed was catering-amato[.]com.

The first known phishing attack using this infrastructure occurred on April 12, 2025, against the University of San Diego. Attack volumes remained relatively low until mid-2025, when activity increased significantly. Additional targets were added over time; the University of Maryland, Baltimore County on November 16, 2025. See Figure 1.

DNS as a Detection Weapon

The low detection rates across the cybersecurity community highlight how effective Evilginx’s evasion techniques have become. Recent versions, such as Evilginx Pro, add features that make detection even harder. These include default use of wildcard TLS certificates, bot filtering through advanced fingerprinting like JA4, decoy web pages, improved integration with DNS providers (e.g., Cloudflare, DigitalOcean), multi-domain support for phishlets, and JavaScript obfuscation. As Evilginx continues to mature, identifying its phishing URLs will only become more challenging. Traditional detection methods and manual hunting can’t keep pace at scale. Fortunately, threat actors who leverage tools like Evilginx usually still utilize domain names for their operations and often leave fingerprints, allowing us a means to be a little devilish and foil their plans.

IoAs

The table below provides IoAs (indicators of activity) used by this Evilginx threat actor. We strongly recommend that organizations block the domains in this list for better protection over DNS. For more indicators, visit the Infoblox Threat Intel Github repo: https://github.com/infobloxopen/threat-intelligence/tree/main.

Indicator Type Note
132[.]148[.]73[.]92 IPv4 Dedicated IP address hosting Evilginx phishing proxy domains
132[.]148[.]74[.]178 IPv4 Dedicated IP address hosting Evilginx phishing proxy domains
160[.]153[.]176[.]197 IPv4 Dedicated IP address hosting Evilginx phishing proxy domains
160[.]153[.]178[.]199 IPv4 Dedicated IP address hosting Evilginx phishing proxy domains
162[.]0[.]214[.]254 IPv4 Dedicated IP address hosting Evilginx phishing proxy domains
162[.]0[.]228[.]151 IPv4 Dedicated IP address hosting Evilginx phishing proxy domains
192[.]169[.]177[.]165 IPv4 Dedicated IP address hosting Evilginx phishing proxy domains
199[.]192[.]23[.]40 IPv4 Dedicated IP address hosting Evilginx phishing proxy domains
203[.]161[.]60[.]59 IPv4 Dedicated IP address hosting Evilginx phishing proxy domains
208[.]109[.]244[.]86 IPv4 Dedicated IP address hosting Evilginx phishing proxy domains
208[.]109[.]39[.]196 IPv4 Dedicated IP address hosting Evilginx phishing proxy domains
64[.]202[.]186[.]223 IPv4 Dedicated IP address hosting Evilginx phishing proxy domains
66[.]29[.]133[.]135 IPv4 Dedicated IP address hosting Evilginx phishing proxy domains
72[.]167[.]224[.]193 IPv4 Dedicated IP address hosting Evilginx phishing proxy domains
72[.]167[.]52[.]130 IPv4 Dedicated IP address hosting Evilginx phishing proxy domains
acmsquared[.]com domain Domain used by Evilginx phishing proxy URL
ads2ads[.]com domain Domain used by Evilginx phishing proxy URL
aghomesandproperties[.]com domain Domain used by Evilginx phishing proxy URL
allwebdirectories[.]com domain Domain used by Evilginx phishing proxy URL
amj-international[.]com domain Domain used by Evilginx phishing proxy URL
apartamentosmalaga[.]com domain Domain used by Evilginx phishing proxy URL
armingaud[.]com domain Domain used by Evilginx phishing proxy URL
bazmepaigham[.]com domain Domain used by Evilginx phishing proxy URL
bedrijvenregister[.]com domain Domain used by Evilginx phishing proxy URL
bestshayari[.]com domain Domain used by Evilginx phishing proxy URL
brillianceboundielts[.]com domain Domain used by Evilginx phishing proxy URL
brownak[.]com domain Domain used by Evilginx phishing proxy URL
buildonhope[.]com domain Domain used by Evilginx phishing proxy URL
cappadociavisittours[.]com domain Domain used by Evilginx phishing proxy URL
catering-amato[.]com domain Domain used by Evilginx phishing proxy URL
cccsok[.]com domain Domain used by Evilginx phishing proxy URL
citywideprayer[.]com domain Domain used by Evilginx phishing proxy URL
controlunlimited[.]com domain Domain used by Evilginx phishing proxy URL
coralridgehour[.]com domain Domain used by Evilginx phishing proxy URL
dartsinireland[.]com domain Domain used by Evilginx phishing proxy URL
data-logistics[.]com domain Domain used by Evilginx phishing proxy URL
dhoughton[.]com domain Domain used by Evilginx phishing proxy URL
dogcuty[.]com domain Domain used by Evilginx phishing proxy URL
e-briefe[.]com domain Domain used by Evilginx phishing proxy URL
eggcoo[.]com domain Domain used by Evilginx phishing proxy URL
eheringe-trauringe[.]com domain Domain used by Evilginx phishing proxy URL
ehsantrust[.]com domain Domain used by Evilginx phishing proxy URL
esdetodo[.]com domain Domain used by Evilginx phishing proxy URL
fluffybascha[.]com domain Domain used by Evilginx phishing proxy URL
forty-something[.]com domain Domain used by Evilginx phishing proxy URL
freaksandfriends[.]com domain Domain used by Evilginx phishing proxy URL
geegletee[.]com domain Domain used by Evilginx phishing proxy URL
georgiayr[.]com domain Domain used by Evilginx phishing proxy URL
goraba[.]com domain Domain used by Evilginx phishing proxy URL
hafikoman[.]com domain Domain used by Evilginx phishing proxy URL
heisseliebe[.]com domain Domain used by Evilginx phishing proxy URL
hurenkontakte[.]com domain Domain used by Evilginx phishing proxy URL
ideallivingsolutions[.]com domain Domain used by Evilginx phishing proxy URL
igreensoft[.]com domain Domain used by Evilginx phishing proxy URL
ilchirone[.]com domain Domain used by Evilginx phishing proxy URL
impexinc[.]com domain Domain used by Evilginx phishing proxy URL
inkdchronicles[.]com domain Domain used by Evilginx phishing proxy URL
intellipex[.]com domain Domain used by Evilginx phishing proxy URL
intercuba[.]com domain Domain used by Evilginx phishing proxy URL
ispamembers[.]com domain Domain used by Evilginx phishing proxy URL
jimmylange[.]com domain Domain used by Evilginx phishing proxy URL
joshuasdodds[.]com domain Domain used by Evilginx phishing proxy URL
kbdav[.]com domain Domain used by Evilginx phishing proxy URL
l2storm[.]com domain Domain used by Evilginx phishing proxy URL
littlenuggetsco[.]com domain Domain used by Evilginx phishing proxy URL
lost-signal[.]com domain Domain used by Evilginx phishing proxy URL
lpdeco[.]com domain Domain used by Evilginx phishing proxy URL
monnalissaboutique[.]com domain Domain used by Evilginx phishing proxy URL
mpoterbaru2024[.]com domain Domain used by Evilginx phishing proxy URL
mykidsfashion[.]com domain Domain used by Evilginx phishing proxy URL
northstarcouncil[.]com domain Domain used by Evilginx phishing proxy URL
qrcodespoweredbygs1[.]com domain Domain used by Evilginx phishing proxy URL
schnaitsee[.]com domain Domain used by Evilginx phishing proxy URL
sercanaydin[.]com domain Domain used by Evilginx phishing proxy URL
srpskazemlja[.]com domain Domain used by Evilginx phishing proxy URL
thelovecity[.]com domain Domain used by Evilginx phishing proxy URL
thermalresistivity[.]com domain Domain used by Evilginx phishing proxy URL
transusasia[.]com domain Domain used by Evilginx phishing proxy URL
tubeunderwater[.]com domain Domain used by Evilginx phishing proxy URL
weddingsarahetemmanuel[.]com domain Domain used by Evilginx phishing proxy URL
winbet299mas[.]com domain Domain used by Evilginx phishing proxy URL
yoopuipui[.]com domain Domain used by Evilginx phishing proxy URL

Infoblox Original

About Author

WordPress Appliance - Powered by TurnKey Linux