Bubble’s role in phishing scams | Kaspersky official blog
Cybercriminals are leveraging Bubble, an AI-powered no-code web app builder, to create sophisticated phishing redirect web applications. These apps are hosted on legitimate Bubble. io domains, making them appear trustworthy and bypassing many traditional security filters. The generated code is complex and obfuscated, hindering automated detection tools. Attackers embed these Bubble-hosted URLs in phishing emails to redirect victims to malicious credential-harvesting sites mimicking legitimate services like Microsoft sign-in pages. This technique is likely integrated into phishing-as-a-service platforms, increasing its scale and reach. The threat targets corporate credentials and can bypass common email security measures. Organizations should enhance employee awareness, deploy advanced anti-phishing gateway solutions, and use endpoint security to block access to such malicious sites. Countries with significant use of Microsoft services and Bubble platform adoption are at higher risk. The threat is assessed as medium severity due to its potential impact and evasion capabilities but requires user interaction and credential submission to succeed.
AI Analysis
Technical Summary
The Tycoon phishing kit has innovated by utilizing Bubble, a no-code AI-powered web application builder, to create redirect web apps that serve as intermediaries in phishing campaigns. Bubble allows users to visually design applications without coding, generating complex JavaScript and Shadow DOM structures that are difficult for automated security tools to analyze and classify as malicious. These phishing redirect apps are hosted on legitimate Bubble.io subdomains, lending them credibility and reducing the likelihood of being blocked by email filters or web security solutions. Attackers embed these URLs in phishing emails, which redirect victims to credential-harvesting sites that convincingly mimic Microsoft sign-in pages, complete with Cloudflare verification checks to appear legitimate. This approach circumvents traditional phishing detection methods that flag direct malicious links or automated redirects. The use of phishing-as-a-service platforms suggests this tactic is scalable and may soon be widespread. The ultimate goal is to steal corporate credentials, potentially enabling further compromise such as session hijacking or bypassing two-factor authentication via adversary-in-the-middle attacks. The threat exploits the trust in no-code platforms and the difficulty in analyzing their generated code, complicating detection and mitigation efforts.
Potential Impact
This threat poses a significant risk to organizations worldwide, particularly those relying on Microsoft services for corporate authentication. Successful credential theft can lead to unauthorized access to sensitive corporate resources, data breaches, and lateral movement within networks. The use of legitimate hosting platforms like Bubble.io and Cloudflare complicates detection, increasing the likelihood of phishing emails reaching end users and users interacting with malicious sites. This can result in compromised employee accounts, potential financial losses, reputational damage, and regulatory consequences. The integration of this technique into phishing-as-a-service platforms means attacks can be rapidly deployed at scale, targeting multiple organizations simultaneously. While the threat requires user interaction (credential submission), the sophisticated evasion tactics increase the chance of successful exploitation, especially against less security-aware employees or organizations lacking advanced email and web filtering solutions.
Mitigation Recommendations
Organizations should implement multi-layered defenses tailored to this threat. First, enhance security awareness training focusing on the risks of entering credentials on unfamiliar or suspicious sites, emphasizing verification of URLs even when hosted on seemingly legitimate domains like Bubble.io. Deploy advanced email gateway solutions with heuristic and behavioral anti-phishing capabilities that can detect indirect redirects and obfuscated code patterns typical of no-code generated apps. Utilize endpoint protection platforms capable of blocking access to known malicious domains and suspicious redirect chains. Implement strict URL filtering policies that scrutinize third-party no-code platform domains used in unexpected contexts. Employ multi-factor authentication (MFA) methods resistant to adversary-in-the-middle attacks, such as hardware tokens or FIDO2 standards. Monitor for unusual login patterns and implement anomaly detection to identify compromised credentials quickly. Collaborate with threat intelligence providers to stay updated on emerging phishing kits and infrastructure. Finally, consider restricting or monitoring the use of no-code platforms within corporate environments to prevent misuse.
Affected Countries
United States, United Kingdom, Germany, France, Canada, Australia, India, Japan, Brazil, Netherlands, Italy, Spain, South Africa, Mexico, Turkey
Bubble’s role in phishing scams | Kaspersky official blog
Description
Cybercriminals are leveraging Bubble, an AI-powered no-code web app builder, to create sophisticated phishing redirect web applications. These apps are hosted on legitimate Bubble. io domains, making them appear trustworthy and bypassing many traditional security filters. The generated code is complex and obfuscated, hindering automated detection tools. Attackers embed these Bubble-hosted URLs in phishing emails to redirect victims to malicious credential-harvesting sites mimicking legitimate services like Microsoft sign-in pages. This technique is likely integrated into phishing-as-a-service platforms, increasing its scale and reach. The threat targets corporate credentials and can bypass common email security measures. Organizations should enhance employee awareness, deploy advanced anti-phishing gateway solutions, and use endpoint security to block access to such malicious sites. Countries with significant use of Microsoft services and Bubble platform adoption are at higher risk. The threat is assessed as medium severity due to its potential impact and evasion capabilities but requires user interaction and credential submission to succeed.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The Tycoon phishing kit has innovated by utilizing Bubble, a no-code AI-powered web application builder, to create redirect web apps that serve as intermediaries in phishing campaigns. Bubble allows users to visually design applications without coding, generating complex JavaScript and Shadow DOM structures that are difficult for automated security tools to analyze and classify as malicious. These phishing redirect apps are hosted on legitimate Bubble.io subdomains, lending them credibility and reducing the likelihood of being blocked by email filters or web security solutions. Attackers embed these URLs in phishing emails, which redirect victims to credential-harvesting sites that convincingly mimic Microsoft sign-in pages, complete with Cloudflare verification checks to appear legitimate. This approach circumvents traditional phishing detection methods that flag direct malicious links or automated redirects. The use of phishing-as-a-service platforms suggests this tactic is scalable and may soon be widespread. The ultimate goal is to steal corporate credentials, potentially enabling further compromise such as session hijacking or bypassing two-factor authentication via adversary-in-the-middle attacks. The threat exploits the trust in no-code platforms and the difficulty in analyzing their generated code, complicating detection and mitigation efforts.
Potential Impact
This threat poses a significant risk to organizations worldwide, particularly those relying on Microsoft services for corporate authentication. Successful credential theft can lead to unauthorized access to sensitive corporate resources, data breaches, and lateral movement within networks. The use of legitimate hosting platforms like Bubble.io and Cloudflare complicates detection, increasing the likelihood of phishing emails reaching end users and users interacting with malicious sites. This can result in compromised employee accounts, potential financial losses, reputational damage, and regulatory consequences. The integration of this technique into phishing-as-a-service platforms means attacks can be rapidly deployed at scale, targeting multiple organizations simultaneously. While the threat requires user interaction (credential submission), the sophisticated evasion tactics increase the chance of successful exploitation, especially against less security-aware employees or organizations lacking advanced email and web filtering solutions.
Mitigation Recommendations
Organizations should implement multi-layered defenses tailored to this threat. First, enhance security awareness training focusing on the risks of entering credentials on unfamiliar or suspicious sites, emphasizing verification of URLs even when hosted on seemingly legitimate domains like Bubble.io. Deploy advanced email gateway solutions with heuristic and behavioral anti-phishing capabilities that can detect indirect redirects and obfuscated code patterns typical of no-code generated apps. Utilize endpoint protection platforms capable of blocking access to known malicious domains and suspicious redirect chains. Implement strict URL filtering policies that scrutinize third-party no-code platform domains used in unexpected contexts. Employ multi-factor authentication (MFA) methods resistant to adversary-in-the-middle attacks, such as hardware tokens or FIDO2 standards. Monitor for unusual login patterns and implement anomaly detection to identify compromised credentials quickly. Collaborate with threat intelligence providers to stay updated on emerging phishing kits and infrastructure. Finally, consider restricting or monitoring the use of no-code platforms within corporate environments to prevent misuse.
Technical Details
- Article Source
- {"url":"https://www.kaspersky.com/blog/bubble-no-code-phishing/55488/","fetched":true,"fetchedAt":"2026-03-24T12:16:21.683Z","wordCount":1240}
Threat ID: 69c28095f4197a8e3b2f5da0
Added to database: 3/24/2026, 12:16:21 PM
Last enriched: 3/24/2026, 12:16:34 PM
Last updated: 3/24/2026, 12:16:45 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.