Executive Summary
CloudSEK’s Threat Research Team, with the help of the FDF module in XVigil, continuously monitors emerging threats that impersonate various brands and employ sophisticated techniques to evade detection by conventional URL scanning engines. Given the evolving tactics of cybercriminals, understanding their methods is crucial. Our Threat Research Team dedicates significant time to analyzing the patterns and strategies used by these threat actors.
In this blog, we will explore how phishers bypass conventional URL scanning techniques and remain active for extended periods before being detected and taken down.
Core Phishing Evasion Techniques
Geo-Fenced and IP Based Filerting
Geo-fenced and IP-based filtering exist due to certain cyber laws and digital content censorship or sometimes for security reasons. In this approach, censored websites serve content only to users accessing them from a whitelisted regional IP address space. On the other hand, the same geo-fencing and IP-based filtering techniques are also used by cybercriminals and phishers. Once any client-side interacts with geofenced phishing sites, the site first gathers information about the client’s IP location. If the IP does not match a country-specific IP address space, it might redirect to another legitimate-looking website (in most cases, google.com or bing.com) or to the legitimate website/service page that the phishing site is impersonating.

For example, the phishing kit in the above, targeting the Chase Wallet page, a banking institution based in the USA. The configuration file checks various parameters of the client-side of the victim/visitor. In the array section, it contains country names, indicating that the phishing page can only be accessed via IP addresses belonging to those countries; otherwise, it will redirect to bing.com. Now, imagine if URL scanners are not configured with a proxy or the proper IP address spaces. If they try to scan URLs hosting this phishing kit, they won’t be able to access them due to the geofencing restrictions.

User-Agent Based Filtering
A User-Agent is an HTTP request header that provides information about the client(browser, OS, and device) making the requests. Using these information developers can optimize web content for specific browser devices, provide better user experiences and identify bots, crawlers or automated tools.
In recent days, phishers have focused on distributing most phishing links via SMS or social media messengers through direct messages (DMs), impersonating either individuals or popular organizations. To block unwanted traffic, they have filtered all incoming traffic to their hosted phishing pages, restricting access to mobile devices based on User-Agent detection.

Referer Header Based Filtering
Referer header is an HTTP request header that provides information about the URL from which a user navigated to the current request. It is mainly used for analytics & tracking, CSRF protection, content personalization and ad distribution etc. In recent years, we have observed that phishers have started using the Referer header after running Facebook and Instagram ads with phishing URLs. These phishing websites check the Referer header to determine whether a user is accessing the site from one of these social media platforms or directly. If the user accesses the phishing URL directly, the page will not display any content. The same applies to security scan engines—if the Referer header is missing, the phishing page remains undiscovered.

Parameter Based Filtering
Parameter-Based Filtering is a technique where some logic from a program file validates incoming URL parameters (query strings, tokens, or identifiers) before serving the actual phishing content. Phishers use this method to hide malicious pages from security scanners and ensure only targeted victims can access them. This technique helps prevent security scanners from directly inspecting the phishing content and ensure only victims receive the phishing page. This method helps phishing links stay active for a longer period of time unless they are reported by a victim.
Example of Parameterized URLs
https://phishingsite.com/login?session=abc123
https://phishingsite.com/?session=abc123
Recently, we have observed that, in addition to abusing parameterized phishing links, scammers are exploiting a classic URI feature that allows users to access password-protected websites by embedding credentials in the URL before the “@” symbol. This follows the format:

However, even if a website does not require authentication, entering any random credentials in this format still redirects and loads the site without any issue. Scammers are leveraging this behavior by crafting phishing URLs such as:

At first glance, victims may assume they are visiting realsite.com, but due to how browsers interpret the URL, they are actually redirected to fakesite.com—the phishing page. This technique exploits user trust and is proven to be highly deceptive, making it effective phishing campaigns and distributed via WhatsApp.
For example, the phishing domain mangokl[.]com is impersonating Mango, a Spanish fast-fashion retailer. An attacker could craft a deceptive phishing link like:https://shop.mango.com@mangokl[.]com
An unsuspecting user, seeing the familiar “shop.mango.com” at the beginning of the URL, might mistakenly trust the link and proceed to log in without hesitation—unaware that they are actually being redirected to the phishing site.

Detecting such Phishing Sites at Scale
Traditional detection mechanisms often struggle with phishing attempts that employ evasion techniques like geo-fencing, user-agent filtering, referer header filtering, and parameter-based filtering. To overcome these challenges, CloudSEK's XVigil platform utilizes the Fake Domain Finder (FDF) module. This module is designed to bypass geo-fencing by using diverse IP addresses and proxies from various regions, ensuring access to restricted sites. It also emulates different user-agents to detect phishing attempts targeting specific devices. Additionally, the FDF module simulates various referer headers to uncover sites that rely on this filtering method. Furthermore, it analyzes parameterized URLs, including those with embedded credentials, to identify hidden phishing pages. The CloudSEK Threat Research Team continuously enhances the FDF module's capabilities, updating proxy lists, user-agent strings, referer headers, and URL parsing logic to stay ahead of evolving phishing tactics. This comprehensive approach allows CloudSEK to effectively detect sophisticated phishing campaigns that traditional scanners miss.
References
- https://www.cloudsek.com/blog/unmasking-cyber-deception-the-rise-of-generic-phishing-pages-targeting-multiple-brands