Monday, April 28, 2025
Homecyber securityCybercriminals Hijack Government Sites to Lauch Phishing Attacks

Cybercriminals Hijack Government Sites to Lauch Phishing Attacks

Published on

SIEM as a Service

Follow Us on Google News

Cybersecurity researchers have identified a persistent trend in which threat actors exploit vulnerabilities in government websites to further phishing campaigns.

Based on data spanning November 2022 through November 2024, malicious actors have misused numerous .gov top-level domains (TLDs) across more than 20 countries.

Exploitation of Legitimate .Gov Domains

While .gov domains are generally trusted by users, this trust is being exploited to host phishing pages, redirect victims to malicious links, or even serve as command and control (C2) servers.

- Advertisement - Google News

Open redirects, a type of vulnerability where web applications redirect users to external, malicious destinations, play a central role in these cyber campaigns.

Exploited .gov domains are often embedded in phishing emails, allowing attackers to bypass secure email gateways (SEGs) that inherently trust government-linked domains.

Victims, unaware of the redirection, are lured into sharing sensitive credentials on phishing pages.

Role of Liferay Platforms

A significant portion of the abuse arises from open redirect exploits linked to CVE-2024-25608, a vulnerability in the widely used Liferay digital experience platform.

Nearly 60% of observed phishing campaigns involving .gov domains carried a “noSuchEntryRedirect” path indicative of this specific exploit.

Liferay’s adoption across multiple governmental organizations may have contributed to this extensive abuse.

The vulnerability allows attackers to redirect users to credential phishing pages or intermediary sites.

Although such vulnerabilities are not exclusive to government websites, their presence underscores the importance of vigilance among web developers.

According to the Cofense report, governments and organizations must prioritize patch management and security auditing to mitigate risks stemming from outdated or unpatched software.

While .gov domains affiliated with the United States accounted for only 9% of all exploited domains, they remain the third most-targeted globally.

All observed cases of U.S.-specific .gov domain abuse involved open redirects, primarily linked to CVE-2024-25608.

Microsoft-themed phishing campaigns were particularly prominent, often featuring emails impersonating legitimate entities and bypassing widely used SEGs such as Microsoft ATP, Cisco IronPort, and Proofpoint.

Statistical analysis reveals that the majority of abuse originates from a small subset of government domains.

For example, Brazilian .gov domains emerged as the most exploited, but the misuse was concentrated in a limited number of unique domains.

This pattern was consistent across other countries, suggesting targeted exploitation rather than widespread vulnerability.

In addition to redirect-based abuse, some compromised .gov domain email addresses have been repurposed as C2 infrastructure for malware, such as Agent Tesla Keylogger and StormKitty.

Despite these incidents, the frequency remains low, highlighting that governments may be taking steps to safeguard email systems.

The exploitation of .gov domains for phishing underscores the broader challenge of securing trusted digital infrastructure.

With government websites serving as high-value targets, sustained monitoring, timely patching, and security awareness at the organizational level are critical to mitigating risks.

As threat actors continue to innovate, collaborative efforts in cybersecurity will play a pivotal role in defending against evolving threats.

Are you from SOC/DFIR Teams? – Analyse Malware Files & Links with ANY.RUN Sandox -> Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

RansomHub Ransomware Deploys Malware to Breach Corporate Networks

The eSentire’s Threat Response Unit (TRU) in early March 2025, a sophisticated cyberattack leveraging...

19 APT Hackers Target Asia-based Company Servers Using Exploited Vulnerabilities and Spear Phishing Email

The NSFOCUS Fuying Laboratory’s global threat hunting system identified 19 sophisticated Advanced Persistent Threat...

FBI Reports ₹1.38 Lakh Crore Loss in 2024, a 33% Surge from 2023

The FBI’s Internet Crime Complaint Center (IC3) has reported a record-breaking loss of $16.6...

Fog Ransomware Reveals Active Directory Exploitation Tools and Scripts

Cybersecurity researchers from The DFIR Report’s Threat Intel Group uncovered an open directory hosted...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

RansomHub Ransomware Deploys Malware to Breach Corporate Networks

The eSentire’s Threat Response Unit (TRU) in early March 2025, a sophisticated cyberattack leveraging...

19 APT Hackers Target Asia-based Company Servers Using Exploited Vulnerabilities and Spear Phishing Email

The NSFOCUS Fuying Laboratory’s global threat hunting system identified 19 sophisticated Advanced Persistent Threat...

FBI Reports ₹1.38 Lakh Crore Loss in 2024, a 33% Surge from 2023

The FBI’s Internet Crime Complaint Center (IC3) has reported a record-breaking loss of $16.6...