Phishing Attack Flow

1
📧Compromised Email
Sent from a compromised Hotmail account to appear trustworthy
2
📎Malicious Attachment
"Open sex 8062.shtml" with obfuscated JavaScript
3
Automatic Redirect
Using video onerror event to trigger redirect
4
🌐Tracking Domain
Redirect to o15zd[.]bemobtrcks[.]com to evade detection
5
🔍Fingerprinting
Zepto.js + FingerprintJS2 collect browser data
6
📡Data Exfiltration
Collected fingerprint sent via POST to server
7
🤖Server-Side Decision
Server analyzes fingerprint to determine payload
8
🎯Final Payload Delivery
Redirect to tailored final payload(scam, phishing, or exploit)
Attacker Action
Defense Bypass