Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Fake Dropbox Phishing Campaign via PDF and Cloud Storage

0
Medium
Published: Mon Feb 02 2026 (02/02/2026, 18:31:08 UTC)
Source: AlienVault OTX General

Description

A sophisticated phishing campaign has been detected that utilizes a multi-stage approach to evade detection. The attack begins with a procurement-themed email containing a PDF attachment. This PDF redirects victims to another PDF hosted on trusted cloud storage, which then leads to a fake Dropbox login page. The attackers exploit trusted platforms and harmless file formats to bypass security measures. The campaign uses social engineering tactics to harvest credentials, which are then exfiltrated to attacker-controlled infrastructure via Telegram. This method proves effective by leveraging legitimate business processes, trusted file types, and reputable cloud services to appear authentic and bypass automated security checks.

AI-Powered Analysis

AILast updated: 02/02/2026, 20:29:28 UTC

Technical Analysis

This phishing campaign employs a sophisticated, multi-stage attack chain beginning with a procurement-themed email containing a PDF attachment. Upon opening, the initial PDF redirects the victim to a second PDF hosted on a reputable cloud storage domain (notably a vercel-storage.com subdomain), which then directs the user to a counterfeit Dropbox login page. This multi-step redirection leverages trusted cloud services and common file formats (PDF) to bypass traditional security controls such as email filters and endpoint protections. The attackers use social engineering to convince recipients to enter their Dropbox credentials into the fake login page. Once credentials are harvested, they are exfiltrated to attacker-controlled infrastructure via Telegram bot APIs, a less common but effective exfiltration channel that may evade network monitoring. The campaign tags indicate use of various MITRE ATT&CK techniques including phishing (T1566), credential access (T1078), command and scripting interpreter (T1059.007), and data exfiltration over alternative protocols (T1102.003). The absence of a CVE or known exploits suggests this is a social engineering-based threat rather than a software vulnerability. The campaign’s reliance on legitimate cloud platforms and business-related themes increases its likelihood of success and complicates detection.

Potential Impact

For European organizations, the primary impact is credential theft leading to unauthorized access to Dropbox accounts and potentially other linked corporate resources. Compromised credentials can enable attackers to access sensitive corporate data stored in Dropbox, disrupt business operations, or facilitate further lateral movement within the organization’s network. The use of trusted cloud storage and PDF files lowers suspicion, increasing the risk of successful phishing. Exfiltration via Telegram complicates detection and response efforts. Organizations with procurement or supply chain functions are particularly vulnerable due to the theme of the phishing email. Loss of credentials can lead to data breaches, regulatory non-compliance (e.g., GDPR violations), reputational damage, and financial loss. The campaign’s medium severity reflects the moderate but tangible risk posed by credential compromise and subsequent misuse.

Mitigation Recommendations

1. Implement advanced email filtering solutions that analyze multi-stage redirections and inspect PDF attachments for embedded URLs or suspicious content. 2. Conduct targeted phishing awareness training emphasizing the risks of opening unsolicited procurement-related attachments and verifying URLs before entering credentials. 3. Enforce multi-factor authentication (MFA) on Dropbox and other cloud services to reduce the impact of stolen credentials. 4. Monitor network traffic for unusual outbound connections to Telegram API endpoints or other uncommon exfiltration channels. 5. Use domain and URL reputation services to block access to known malicious domains such as the identified vercel-storage.com subdomain and suspicious URLs. 6. Employ endpoint detection and response (EDR) tools to detect suspicious PDF behaviors and script execution. 7. Regularly audit and review access logs for Dropbox and cloud services to identify anomalous login attempts or geographic irregularities. 8. Encourage users to report suspicious emails and provide clear procedures for verification of procurement requests. 9. Collaborate with cloud service providers to report and take down malicious hosted content promptly. 10. Maintain updated threat intelligence feeds to stay informed about emerging phishing campaigns and indicators of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.forcepoint.com/blog/x-labs/dropbox-pdf-phishing-cloud-storage"]
Adversary
null
Pulse Id
6980ed6ccc717599f536d820
Threat Score
null

Indicators of Compromise

Url

ValueDescriptionCopy
urlhttp://nte2srryro7jecki.public.blob.vercel-storage.com/ProductLists.pdf
urlhttp://tovz.life/bid-doc2026.php/?ai=xdC2https[://]api.telegram.org/bot6141034733:AAH-FLm9XyFjiV6F7jq6UHBXcVZTq7rZbP0/sendMessage

Domain

ValueDescriptionCopy
domainnte2srryro7jecki.public.blob.vercel-storage.com

Threat ID: 698105ccf9fa50a62f55d511

Added to database: 2/2/2026, 8:15:08 PM

Last enriched: 2/2/2026, 8:29:28 PM

Last updated: 2/3/2026, 12:55:17 PM

Views: 84

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats