Japanese-Language Phishing Emails, (Sat, Feb 21st)
Introduction
AI Analysis
Technical Summary
This phishing campaign involves sending Japanese-language emails impersonating reputable companies such as All Nippon Airways (ANA), DHL, and myTOKYOGAS. The emails originate from multiple domains with the .cn top-level domain, suggesting the threat actor is operating from or leveraging infrastructure in China. The emails share common characteristics, including the use of the Foxmail 6 email client as indicated in the X-mailer header, and similar URL patterns for phishing pages designed to harvest credentials. The phishing URLs mimic legitimate login portals but redirect victims to fraudulent sites hosted on .cn domains. The campaign has been ongoing for over a year and targets Japanese-speaking recipients, although the sender’s email addresses have also been found on non-Japanese blogs, indicating a broad distribution strategy. The phishing emails are crafted to bypass spam filters but are generally caught by robust filtering systems. The threat actor uses social engineering tactics to trick users into divulging sensitive information, with no exploitation of software vulnerabilities reported. The campaign’s persistence and targeting of major Japanese companies highlight a focused attempt to compromise user credentials and potentially gain unauthorized access to corporate or personal accounts.
Potential Impact
If successful, this phishing campaign could lead to credential theft, unauthorized access to user accounts, and potential financial or data loss for individuals and organizations. Compromised credentials could be used for further attacks such as identity theft, fraud, or lateral movement within corporate networks. The impersonation of major companies increases the likelihood of user trust and engagement, especially among less security-aware recipients. Organizations relying on these companies or operating in Japan may face increased risk of targeted phishing attacks. Additionally, the use of .cn domains may complicate takedown efforts and attribution. While no widespread exploitation has been reported, the campaign’s longevity and targeting suggest a persistent threat that could escalate if not mitigated. The impact is primarily on confidentiality and integrity of user data, with availability less affected. The threat also poses reputational risks for the impersonated companies if phishing campaigns are successful and publicized.
Mitigation Recommendations
Organizations should implement advanced email filtering solutions that specifically target phishing indicators such as suspicious .cn domains and unusual X-mailer headers like Foxmail 6. User awareness training tailored to Japanese-speaking employees and customers should emphasize recognizing phishing attempts impersonating trusted companies. Deploy domain-based message authentication, reporting, and conformance (DMARC), SPF, and DKIM to reduce email spoofing risks. Monitor for newly registered domains mimicking legitimate company names, especially those using .cn TLDs, and coordinate with domain registrars and law enforcement for takedown requests. Encourage users to verify URLs carefully before entering credentials and to report suspicious emails promptly. Multi-factor authentication (MFA) should be enforced on all critical accounts to reduce the impact of credential compromise. Incident response plans should include procedures for phishing incident handling and user notification. Regularly update and test spam filters to adapt to evolving phishing tactics. Collaboration with threat intelligence sharing communities can provide early warnings of similar campaigns.
Affected Countries
Japan, China, United States, Australia, Canada, United Kingdom
Japanese-Language Phishing Emails, (Sat, Feb 21st)
Description
Introduction
AI-Powered Analysis
Technical Analysis
This phishing campaign involves sending Japanese-language emails impersonating reputable companies such as All Nippon Airways (ANA), DHL, and myTOKYOGAS. The emails originate from multiple domains with the .cn top-level domain, suggesting the threat actor is operating from or leveraging infrastructure in China. The emails share common characteristics, including the use of the Foxmail 6 email client as indicated in the X-mailer header, and similar URL patterns for phishing pages designed to harvest credentials. The phishing URLs mimic legitimate login portals but redirect victims to fraudulent sites hosted on .cn domains. The campaign has been ongoing for over a year and targets Japanese-speaking recipients, although the sender’s email addresses have also been found on non-Japanese blogs, indicating a broad distribution strategy. The phishing emails are crafted to bypass spam filters but are generally caught by robust filtering systems. The threat actor uses social engineering tactics to trick users into divulging sensitive information, with no exploitation of software vulnerabilities reported. The campaign’s persistence and targeting of major Japanese companies highlight a focused attempt to compromise user credentials and potentially gain unauthorized access to corporate or personal accounts.
Potential Impact
If successful, this phishing campaign could lead to credential theft, unauthorized access to user accounts, and potential financial or data loss for individuals and organizations. Compromised credentials could be used for further attacks such as identity theft, fraud, or lateral movement within corporate networks. The impersonation of major companies increases the likelihood of user trust and engagement, especially among less security-aware recipients. Organizations relying on these companies or operating in Japan may face increased risk of targeted phishing attacks. Additionally, the use of .cn domains may complicate takedown efforts and attribution. While no widespread exploitation has been reported, the campaign’s longevity and targeting suggest a persistent threat that could escalate if not mitigated. The impact is primarily on confidentiality and integrity of user data, with availability less affected. The threat also poses reputational risks for the impersonated companies if phishing campaigns are successful and publicized.
Mitigation Recommendations
Organizations should implement advanced email filtering solutions that specifically target phishing indicators such as suspicious .cn domains and unusual X-mailer headers like Foxmail 6. User awareness training tailored to Japanese-speaking employees and customers should emphasize recognizing phishing attempts impersonating trusted companies. Deploy domain-based message authentication, reporting, and conformance (DMARC), SPF, and DKIM to reduce email spoofing risks. Monitor for newly registered domains mimicking legitimate company names, especially those using .cn TLDs, and coordinate with domain registrars and law enforcement for takedown requests. Encourage users to verify URLs carefully before entering credentials and to report suspicious emails promptly. Multi-factor authentication (MFA) should be enforced on all critical accounts to reduce the impact of credential compromise. Incident response plans should include procedures for phishing incident handling and user notification. Regularly update and test spam filters to adapt to evolving phishing tactics. Collaboration with threat intelligence sharing communities can provide early warnings of similar campaigns.
Affected Countries
Technical Details
- Article Source
- {"url":"https://isc.sans.edu/diary/rss/32734","fetched":true,"fetchedAt":"2026-02-21T06:16:21.022Z","wordCount":623}
Threat ID: 69994db5be58cf853b530115
Added to database: 2/21/2026, 6:16:21 AM
Last enriched: 2/21/2026, 6:16:32 AM
Last updated: 2/22/2026, 6:21:33 AM
Views: 14
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Phishing via Google Tasks | Kaspersky official blog
MediumFake Incident Report Used in Phishing Campaign, (Tue, Feb 17th)
MediumQuick digest of Kaspersky’s report “Spam and Phishing in 2025” | Kaspersky official blog
MediumI bought, I saw, I attended: a quick guide to staying scam-free at the Olympics | Kaspersky official blog
MediumHow to protect yourself from deepfake scammers and save your money | Kaspersky official blog
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.