Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. (ctrlaltintel.com) UPMI ULTIMATE: Inside an AI-Developed Adversary-in-the-Middle Phishing-as-a-Service Platform

(ctrlaltintel.com) UPMI ULTIMATE: Inside an AI-Developed Adversary-in-the-Middle Phishing-as-a-Service Platform

Scheduled Pinned Locked Moved Uncategorized
cybersecuritythreatintel
1 Posts 1 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • orlysec@swecyb.comO This user is from outside of this forum
    orlysec@swecyb.comO This user is from outside of this forum
    orlysec@swecyb.com
    wrote last edited by
    #1

    (ctrlaltintel.com) UPMI ULTIMATE: Inside an AI-Developed Adversary-in-the-Middle Phishing-as-a-Service Platform

    New PhaaS platform UPMI ULTIMATE, developed by Team Unlimited, leverages AI-assisted code to deliver full AiTM phishing chains with MFA bypass via Evilginx. Platform uses collective intelligence to refine evasion across all operator instances.

    In brief - A commercially licensed Phishing-as-a-Service (PhaaS) platform, UPMI ULTIMATE, combines AI-developed code with Evilginx reverse-proxy to execute end-to-end adversary-in-the-middle (AiTM) phishing attacks. The platform aggregates telemetry from all licensed operators to improve evasion, lowering the barrier for sophisticated phishing campaigns. Six live deployments identified, with hardcoded credentials and IOCs recovered.

    Technically - UPMI ULTIMATE is a Node.js-based PhaaS (16.3K LOC) supporting direct MX (Port 25), Office 365 SMTP relay, and Microsoft Graph API delivery. Features include AES-256-GCM encrypted modules, passive DNS risk scoring (osint-recon.js), forged Exchange headers (X-MS-Exchange-Organization-SCL: -1), and scanner IP evasion (Microsoft EOP, Google, Proofpoint). Evilginx phishlets target Microsoft 365, cPanel, and Roundcube. License server at 104.131.106[.]42:9999 enforces hardware-bound licensing with Telegram kill switch. IOCs include 11 IPs, 14 domains, and 2 Telegram bot usernames.

    Source: http://ctrlaltintel.com/research/AiTM-Phishing/

    #Cybersecurity #ThreatIntel

    1 Reply Last reply
    1
    0
    • R relay@relay.infosec.exchange shared this topic
    Reply
    • Reply as topic
    Log in to reply
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes


    • Login

    • Login or register to search.
    • First post
      Last post
    0
    • Categories
    • Recent
    • Tags
    • Popular
    • World
    • Users
    • Groups