CodeStorm – A Microsoft 365 AiTM Phishing Kit with Storm-1167 Overlap

Executive Summary

Hexastrike has identified an ongoing adversary-in-the-middle (AiTM) phishing campaign targeting Microsoft 365 users that leverages a previously undocumented phishing kit, tracked by Hexastrike as CodeStorm. Analysis of the recovered server-side kit source code and associated deployment infrastructure indicates with moderate confidence that CodeStorm overlaps with infrastructure patterns previously associated with activity Microsoft tracks as Storm-1167. Based on direct code-level comparison conducted by Hexastrike, CodeStorm appears to be a distinct kit family separate from previously documented phishing frameworks such as the W3LL phishing kit, Sneaky 2FA (Sekoia, 2024) and Whisper 2FA (Barracuda, 2025). Stable code-level design patterns observed across multiple kit iterations are consistent with a single operator or tightly controlled developer group maintaining the tooling over time.

The threat actor leverages compromised Microsoft 365 accounts and tenants to facilitate phishing operations and infrastructure staging. Hexastrike has identified at least 400 attacker-controlled apex domains supporting approximately 12,000 subdomains used to scale operations. Initial campaign waves use broadly themed generic subdomains to capture opportunistic victims, followed by rapid pivoting to brand-specific subdomains aligned with named victim organizations for targeted spear-phishing. Within Hexastrike’s incident response telemetry, more than 100 confirmed tenant compromises have been linked to CodeStorm activity, providing direct evidence of post-authentication operator tradecraft analyzed in this report.

Phishing lures include PDF attachments and tailored HTML email attachments, frequently delivered via legitimate third-party platforms used as middle-stage redirectors. Observed compromises concentrate in Western Europe and North America, with substantially lower representation across the Asia-Pacific region.

CodeStorm incorporates multiple anti-analysis and anti-detection mechanisms to hinder security inspection and automated analysis. These include suppression of browser developer tools through right-click and keyboard shortcut handlers, persistent debugger detection loops, gating of user access through Cloudflare Turnstile challenges, and conditional session termination upon detection of analyst tools. The second-stage credential-harvesting JavaScript is hosted on Tencent Cloud Object Storage, consistent with infrastructure patterns previously associated with Storm-1167 activity.

Hexastrike assesses that the campaign has been active since at least January 2025 and remains ongoing. Real-time modifications to phishing infrastructure observed during the investigation indicate active operator management and continued investment in evasion and scalability.

Key Findings

CodeStorm Microsoft 365 AiTM Attack Flow.
CodeStorm Microsoft 365 AiTM Attack Flow.
  • CodeStorm is a previously undocumented Microsoft 365 AiTM phishing kit used to capture credentials, intercept MFA, and obtain authenticated session material.
  • Hexastrike assesses with moderate confidence that CodeStorm overlaps with activity Microsoft tracks as Storm-1167, based on Tencent cloud usage, Indonesian-language code artifacts, and aligned post-compromise tradecraft.
  • The campaign has been active since at least January 2025 and remains ongoing, with evidence of real-time operator management and infrastructure changes.
  • Hexastrike identified at least 400 attacker-controlled apex domains supporting approximately 12,000 subdomains, including generic Microsoft-themed lures and brand-specific subdomains targeting named organizations.
  • More than 100 confirmed Microsoft 365 tenant compromises were linked to CodeStorm activity in Hexastrike incident response telemetry.
  • Approximately 600 organizations were identified as targets through brand-specific lure infrastructure, concentrated primarily in North America and Western Europe.
  • Delivery chains used compromised Microsoft 365 accounts, PDF and HTML lures, trusted SaaS redirectors, SharePoint-hosted content, QR codes, and link shorteners.
  • CodeStorm uses Cloudflare Turnstile gating, JavaScript obfuscation, Tencent COS-hosted second-stage payloads, browser anti-analysis checks, and developer-tool suppression.
  • Post-compromise activity included token reuse, mailbox rule creation, SharePoint reconnaissance, and onward phishing from compromised accounts.

Targeting and Victimology

Hexastrike’s view of CodeStorm targeting is built from two complementary data sources that we treat separately throughout this section.

The first is direct incident response telemetry. Across our IR engagements over the past 16 months (January 2025 through April 2026), we have forensically confirmed more than 100 tenant compromises linked to CodeStorm activity. For these cases, we have observed evidence of successful credential theft, attacker token reuse, or post-authentication operator activity within the affected tenant. This cohort forms the basis for the post-compromise tradecraft analysis presented later in this report.

The second data source is the operator-controlled lure subdomain pool. By mapping brand-specific subdomains back to the organizations they were tailored to impersonate, we attributed approximately 600 organizations as identified targets with high naming confidence. Where the candidate organization was uncertain or where the subdomain was generic and non-identifying, we excluded it from this set. We emphasize that targeting and compromise are distinct outcomes. The presence of a brand-specific subdomain demonstrates operator intent to phish a given organization, but does not by itself prove successful credential theft, token reuse, or tenant compromise.

The geographic distribution of identified targets shows a clear concentration in North America and Europe. The United States is the largest single jurisdiction, with France, the United Kingdom, Italy, Germany, and the Netherlands as the most-affected European jurisdictions. Identified targets in Asia, Africa, South America, and Australia confirm the campaign’s reach extends beyond its core targeting region, but these regions together account for a small fraction of the total.

Geographic distribution of identified CodeStorm targets.
Geographic distribution of identified CodeStorm targets.

The industry distribution of identified targets shows no clear concentration. Manufacturing, construction and real estate, and healthcare and pharma together account for roughly 30 percent of identified targets. The remaining share is spread thinly across more than ten additional sectors including financial services, technology and telecom, government and public, retail and distribution, energy, legal, education, and transport. The absence of a primary industry focus is consistent with opportunistic targeting where operators pursue whichever organization the next set of stolen credentials enables them to phish.

Industry sector distribution of identified CodeStorm targets.
Industry sector distribution of identified CodeStorm targets.

Infection Chain

Initial Access and Delivery

CodeStorm campaigns are consistently initiated via email-based delivery. Across the intrusions Hexastrike has investigated, operators used multiple campaign strains and lure formats, though observed activity clustered around a limited set of business themes. Invoicing and human resources lures were the most common, with subject lines and document content tailored to appear consistent with routine enterprise workflows.

Hexastrike observed three distinct delivery methods across CodeStorm campaigns.

The first method is direct linking to phishing infrastructure. Emails contained links pointing directly to attacker-controlled domains hosting CodeStorm credential-harvesting pages, with no intermediate stage between the email and the phishing destination.

The second method is redirection through legitimate third-party platforms. Emails directed victims to PDF lures hosted on legitimate platforms before redirecting to CodeStorm phishing infrastructure. Hexastrike observed this pattern across SharePoint, Microsoft Sway, allo.io, youengage.me, mixpanel.com, and gamma.app. The use of these platforms provided an additional layer in the delivery chain and increased the apparent legitimacy of the lure, since the first domain the victim encounters is well known and trusted. The abuse pattern across these platforms, whether via attacker-created accounts or compromised legitimate accounts, was not consistently determinable from Hexastrike’s telemetry.

Phishing email and the allo.io hosted lure document.
Phishing email and the allo.io hosted lure document.

The hosted PDF lures were frequently branded to match the targeted organization, including logos, color schemes, and plausible sender details. The documents contained embedded links that redirected victims to CodeStorm credential-harvesting pages.

Lure document hosted on Microsoft Sway.
Lure document hosted on Microsoft Sway.

The third method is HTML attachments delivered directly to inboxes. Operators sent credential-harvesting HTML attachments directly to victim inboxes. These attachments rendered phishing content when opened locally and were observed alongside the link-based delivery chains rather than replacing them. The coexistence of all three methods within the same operator infrastructure indicates CodeStorm operators rotate delivery tradecraft across campaigns rather than relying on a single initial access path.

Observed PDF lure themes included fake DocuSign signing requests, invoice notifications, OneDrive for Business sharing prompts, and human resources content. A subset of the PDFs used gated document patterns, displaying deliberately blurred content before prompting the victim to authenticate in order to view the full document.

Representative PDF lure themes.
Representative PDF lure themes.

Hexastrike also observed QR codes in a subset of lures, replacing embedded links and shifting the credential-harvesting flow onto a mobile device. This shift takes the subsequent authentication out of the visibility of corporate email gateways and endpoint detection controls, both of which are typically scoped to managed endpoints rather than personal mobile devices.

PDF lures using QR codes to shift credential capture onto mobile devices.
PDF lures using QR codes to shift credential capture onto mobile devices.

Link-shortening services were present in some CodeStorm delivery chains as additional middleware between the email and the final phishing destination. These services introduced further redirect steps and complicated reconstruction of the full delivery path during investigation.

PDF Metadata Analysis

Hexastrike reviewed metadata across PDF lures used in CodeStorm delivery chains. Multiple samples contained stripped or reduced author fields, limiting visibility into the user account or system that generated the document. Despite this metadata hygiene, several files retained recurring identifiers across otherwise distinct lures.

Recurring values included XMP MM Document ID c861fe4a-1dba-004e-883f-9a0be1a0af8b, XMP MM identifier 2565A930-FF27-4054-971A-C72E62DCEAF4, and PDF trailer ID values 2D728B14A9B308429EACADEA8D70EF32 and 7F013322168C589BBD87F4A2244D810E. The recurrence of these values across separate PDF lures may indicate shared tooling, a common generation workflow, or reuse of a document template.

XMP metadata showing recurring DocumentID across CodeStorm lure PDFs.
XMP metadata showing recurring DocumentID across CodeStorm lure PDFs.

The same corpus contained inconsistent creator and producer metadata. Observed values included WPS Writer, Microsoft Word, Microsoft Word for Microsoft 365, dompdf 2.0.0 with CPDF, wkhtmltopdf 0.12.6, Qt 5.15.13, Canva, and Skia PDF m141. Considered alongside the recurring document identifiers and stripped author fields, this variation is consistent with an automated pipeline that modifies visible creator and producer values while reusing underlying templates or generation components.

Hexastrike cannot determine with confidence whether this pipeline is part of a commercially available phishing kit, a private toolset, or tooling operated by a single actor. The recurring identifiers alone are not sufficient to attribute the activity to one operator. However, when combined with additional indicators described later in this report, these overlaps may support an assessment of shared operational control or common tooling across the observed CodeStorm campaigns.

Lure Infrastructure

CodeStorm operators used previously compromised Microsoft 365 mailboxes to send phishing emails. Messages originated from legitimate tenants and, in multiple Hexastrike investigations, from accounts with prior correspondence with the recipient organization. This allowed messages to arrive from known business partners or internal users while preserving normal email authentication results.

Email sent from a compromised business partner account.
Email sent from a compromised business partner account.

After gaining mailbox access, operators sent phishing messages to other recipients within the same tenant and to external contacts harvested from the compromised user’s Outlook address book. In some cases, the same access was used to host lure documents in the compromised user’s SharePoint environment. These SharePoint-hosted documents then linked to operator-controlled credential-harvesting pages.

Hexastrike mapped CodeStorm lure infrastructure across at least 400 apex domains. We assess with high confidence that operators organized this infrastructure into three primary subdomain classes.

Lure classURL patternPurpose
Harvester subdomains<random>.<apex>/google.phpCredential-harvesting endpoint
Brand and tenant impersonation<brand>.<apex>/<random>Target-aligned naming for organization-specific lures
Generic decoy domainsoffice.<apex>/<random>sharepoint.<apex>/<random>Generic Microsoft-themed entry points

The generic decoy class did not follow a single naming convention. Microsoft-themed examples included microsoftlogmicrosoftofficemicrosoftoffices, and microsoftonedrive. Other recurring themes included officelogindocshareadminsecureoutlookonedriveauthsec, and cloud.

Operators also used misspellings and character substitution, including verfiedportfollio0ff1ce, and 0nedrlve. Several subdomains combined multiple trust signals in a single label, including secureddocoffice365onedrivestatement, and share0nedrlve0nlined0cument.

Generic decoy subdomain naming pattern distribution.
Generic decoy subdomain naming pattern distribution.

Kit Architecture: PHP Backend, Obfuscation, and Anti-Analysis

Hexastrike recovered a PHP file from a public malware repository that we assess to be a CodeStorm server-side render component. The file, named index-crypto-2.php (SHA-256 6bea63d580071f34e8e9a3267fb0aefbc1c0d678b90c5c24e1d40f7f9abf62a2, 24,113 bytes), produces lure page responses consistent with those observed across the operator pool. It handles both the initial GET request from the victim and the POST callback from the Cloudflare Turnstile challenge, generates the encrypted client-side payload, and embeds the per-render configuration that ties each deployment to its operator. Hexastrike could not directly verify that this file is the exact source running in production. However, the behaviors observed across captured live lure pages match the rendering logic in the recovered file at every comparison point examined, supporting high confidence that this file represents a production render component or a near-identical revision.

The remainder of this section walks through the URL surface presented to the victim, the credential-harvesting flow gated by Cloudflare Turnstile, the obfuscation layers applied to the served JavaScript, and the anti-analysis defenses embedded in the runtime payload.

URL Surface and Apex Behavior

Observed CodeStorm deployments served lure UI content from <sub>.<apex>/<5-character-token> and accepted credential submissions at <sub>.<apex>/google.php. The five-character path token was drawn from [A-Za-z0-9]{5} and reused the same alphabet as the in-page DOM anchor IDs, consistent with a single operator-side token generator driving both URL routing and page rendering.

When the random path was omitted, apex hosts returned content unrelated to the kit. Most returned the default AlmaLinux Apache test page served through Cloudflare in front of a default httpd backend. A subset returned a Cloudflare error 1020 (“Access denied”) response. A small number returned the Turnstile widget as a cold gate that failed to mount because the required kit session context was absent. None of these responses exposed kit content, meaning apex-level probing did not surface the phishing infrastructure during Hexastrike’s analysis.

Lure URL with random path versus apex root returning the AlmaLinux test page.
Lure URL with random path versus apex root returning the AlmaLinux test page.

Turnstile Gating

Observed CodeStorm deployments gated lure pages behind a Cloudflare Turnstile challenge before any credential-harvesting logic was delivered to the victim. On first request, the victim sees a blank page with a centered Turnstile widget and a randomized status message rendered below it. Until the challenge is solved, no credential UI, no Microsoft branding, and no harvesting logic is present in the rendered HTML.

Cloudflare Turnstile gate displayed before any kit content is rendered.
Cloudflare Turnstile gate displayed before any kit content is rendered.

The Cloudflare Turnstile sitekey and secret are declared as variables at the top of index-crypto-2.php ($cf_sitekey and $cf_secret). Observed deployments used operator-specific Turnstile credentials, meaning the sitekey observed on a given lure subdomain can serve as a per-operator identifier rather than a kit-wide constant. Sitekey values recur across distinct subdomains belonging to the same operator and provide a reliable pivot for enumerating additional operator infrastructure.

Turnstile sitekey and secret declared as operator-supplied configuration in `index-crypto-2.php`.
Turnstile sitekey and secret declared as operator-supplied configuration in `index-crypto-2.php`.

The PHP source declares two string arrays that drive the gate’s surface presentation. The first, $checkings, contains 30 English browser security check status messages such as variations on “Verifying secure browsing” and “Browser running safety protocols”. The kit selects one at random per render and displays it beneath the Turnstile widget as decoy status text. The second, $titles, contains 97 generic technology-themed keywords ranging from node and firewall to kubernetes and metadata, used to randomize the page’s HTML <title> element on every render.

`$checkings` and `$titles` arrays declared in the PHP backend.
`$checkings` and `$titles` arrays declared in the PHP backend.

Page Rendering and Obfuscation

After a successful Turnstile challenge, CodeStorm renders a fake Outlook login interface. The page displays an Outlook loading animation during the transition while client-side harvesting logic initializes.

Outlook loading animation displayed before the fake authentication interface is rendered.
Outlook loading animation displayed before the fake authentication interface is rendered.

Captured lure pages did not expose credential-harvesting logic in cleartext HTML. Instead, the served page contains an encrypted JavaScript payload and a runtime decoder. Hexastrike observed two obfuscation variants across active deployments. The earlier variant uses a custom encoding scheme that combines a linear congruential generator (LCG) with Caesar shift and XOR operations before decoding the payload in the browser. The newer variant uses an AES-256-CBC envelope with CryptoJS, replacing the hand-rolled cipher chain with a standard symmetric primitive.

Obfuscated lure HTML containing the LCG variant payload and runtime decoder.
Obfuscated lure HTML containing the LCG variant payload and runtime decoder.

Both variants reconstruct key JavaScript primitives at runtime, reducing the number of high-value strings visible in the served HTML. This reduces the utility of simple static detections based on substrings such as eval or atob in page source, though deobfuscated payload content remains available to dynamic analysis. After decoding, the payload loads the second-stage JavaScript from Tencent Cloud Object Storage and enables the anti-analysis controls described below. The Tencent COS stage and credential-harvesting flow are covered in the next section.

Obfuscated lure HTML and PHP containing the encrypted JavaScript payload and runtime decoder.
Obfuscated lure HTML and PHP containing the encrypted JavaScript payload and runtime decoder.

Anti-Analysis Defenses

CodeStorm lure pages include browser and analyst checks designed to disrupt manual review and automated detonation.

The runtime payload checks for automation and inspection indicators including navigator.webdriverwindow.callPhantomwindow._phantom, and user-agent strings containing Burp. If any condition matches, the page redirects to about:blank before the phishing interface renders. Because Burp Suite does not modify the user-agent by default, the Burp user-agent check is a low-fidelity tripwire most likely to catch analysts who have explicitly configured a Burp-identifying UA.

Anti-analysis JavaScript intercepting developer tool shortcuts and the right-click context menu.
Anti-analysis JavaScript intercepting developer tool shortcuts and the right-click context menu.

The kit also blocks common browser inspection actions. A keyboard handler intercepts shortcuts used to open developer tools or view source, including F12Ctrl+UCtrl+Shift+ICtrl+Shift+JCtrl+Shift+CCtrl+Shift+KCtrl+H, and macOS equivalents including Cmd+Alt+ICmd+Alt+C, and Cmd+U. A context menu handler suppresses right-click access to browser inspection options.

CodeStorm also implements a debugger watchdog. A recurring timer invokes a debugger statement and measures execution delay with performance.now(). If the delay indicates that execution was paused, the kit redirects the session to a Microsoft-hosted Outlook URL. This removes the analyst from the kit context and may cause subsequent traffic to resemble normal Microsoft authentication activity.

AiTM Proxy and Credential-Harvesting Flow

Once the Turnstile gate is solved, the rendered lure transitions from the static obfuscated shell described in the previous section into a live adversary-in-the-middle proxy session. The transition is driven by client-side JavaScript loaded from Tencent COS, separating stage-two payload delivery from the lure host and allowing operators to rotate delivery infrastructure independently from harvester endpoints.

Stage-Two Delivery via Tencent Cloud Object Storage

After the Turnstile callback succeeds, the kit injects three external scripts into the rendered page: jQuery and Bootstrap from public CDNs, which serve as legitimate functional dependencies, and a third operator-controlled script that contains the harvesting logic.

In production, the third script resolves to a Tencent Cloud Object Storage (COS) URL in the ap-seoul region. Tencent COS is Tencent Cloud’s S3-compatible object storage service, and the myqcloud.com domain is the default hostname under which COS buckets are published when no custom domain is configured. The use of myqcloud.com for offensive payload hosting has previously been associated with Storm-1167 activity, and is one of the indicators supporting Hexastrike’s infrastructure overlap assessment. Across captured live lure sessions, Hexastrike observed stage-two delivery from the following bucket hostnames:

*-1388504898.cos.ap-seoul.myqcloud.com
*-1417693617.cos.ap-seoul.myqcloud.com
*-1317754460.cos.ap-seoul.myqcloud.com
*-1323985617.cos.ap-seoul.myqcloud.com

The numeric suffixes are Tencent Cloud account identifiers (APPIDs) and are tied to the underlying tenant rather than to a specific bucket name. The use of multiple APPIDs provides resilience against takedowns affecting a single Tencent Cloud account.

Stage-two script array and operator-controlled URL placeholder declared in `index-crypto-2.php`.
Stage-two script array and operator-controlled URL placeholder declared in `index-crypto-2.php`.

Stage-Two Payload and Per-Operator Harvester

The file delivered from Tencent COS is named bootstrap.min.js, a deliberate naming choice intended to blend with the legitimate Bootstrap library loaded earlier in the same script array. The file is unrelated to Bootstrap. It contains the kit’s full client-side credential-harvesting and MFA interception logic, applied through several layers of obfuscation including identifier mangling, control-flow flattening, and string array rotation.

Obfuscated `bootstrap.min.js` recovered from Tencent COS.
Obfuscated `bootstrap.min.js` recovered from Tencent COS.

In observed copies of bootstrap.min.js, the first executable statement was a single base64-encoded string variable that decoded to the operator’s PHP harvester URL. This single value was the per-operator differentiator across an otherwise identical payload. The same harvesting code was deployed across operators, with only the harvester URL varying between deployments. Decoded values observed by Hexastrike include for example https://fqgpm.stooping.com.de/google.php, confirming that the apex <sub>.<apex>/google.php endpoint serves as the back-channel for stage-two traffic rather than as a victim-facing URL. While /google.php was the dominant harvester path in the observed corpus, Hexastrike also observed a smaller number of deployments using alternate paths such as /next.php.

Real-Time Authentication Proxying

Once loaded, observed bootstrap.min.js samples replaced the document body with a fake Microsoft 365 login interface and proxied authentication state between the victim and Microsoft’s real authentication endpoints in real time. The proxy initiates a live session against login.microsoftonline.com using the victim’s submitted email, retrieves the tenant’s branding configuration from Microsoft’s own aadcdn.msftauth.net and logincdn.msftauth.net endpoints, and renders a tenant-specific branded login experience. By the time the victim sees the password field, the AiTM proxy has already opened a live session against the victim’s real tenant and primed itself to forward the password and any subsequent MFA artifacts in real time.

The kit also issues a pre-render handshake to the harvester before any UI is presented. The harvester response can instruct the kit to redirect the session away from the lure, giving operators a real-time kill switch over individual victim sessions before any credentials are captured.

Pre-render handshake and victim-organization branding retrieval in the stage-two payload.
Pre-render handshake and victim-organization branding retrieval in the stage-two payload.

MFA Interception

Observed CodeStorm stage-two payloads implemented multi-method MFA interception through three branch handlers, each corresponding to a distinct Microsoft Entra ID MFA challenge type. The dispatch logic inspects the MFA method advertised by Microsoft on the live session and routes the victim into the corresponding UI:

  • An authenticator one-time passcode entry screen (“Verify your identity”) consistent with Microsoft Authenticator OTP challenges.
  • An approval screen (“Approve sign in request”) consistent with Microsoft Authenticator push notification approval, including the two-digit number-matching challenge introduced by Microsoft in 2023.
  • A generic code entry screen (“Enter code”) used for SMS-delivered codes, voice-call codes, and email OTPs.
MFA branch handlers in the stage-two payload, supporting authenticator OTP, push approval, and SMS / email codes.
MFA branch handlers in the stage-two payload, supporting authenticator OTP, push approval, and SMS / email codes.

Internal challenge type tokens preserved in the payload include PhoneAppOTPPhoneAppNotification, and OneTimeCode. The presence of these handlers indicates the kit is designed to handle the MFA methods commonly encountered across Microsoft 365 tenants, including those configured through partner identity providers federated into Entra ID.

When the victim submits an MFA artifact, it is exfiltrated to the harvester together with the previously captured email and password and replayed in near real time against the live AiTM session. On successful replay, the operator obtains authenticated Microsoft 365 session material, including session cookies and tokens issued during the web authentication flow. The post-authentication tradecraft observed across confirmed CodeStorm compromises, including token reuse patterns, mailbox rule creation, and persistence establishment, is analyzed in the next section.

Session Hijacking and Post-Compromise Activity

Hexastrike’s engagements most often surfaced CodeStorm compromises through identity-side detections: impossible travel, sign-ins from non-compliant devices or unusual countries, Entra ID risky-user signals, and new inbox rule alerts.

Within seconds of credential and MFA capture, operators consistently created an Outlook inbox rule named LinkedIn that moved messages from the phishing sender into RSS Feeds and marked them read, suppressing replies and security alerts from the user’s view.

Threat actor created Outlook inbox rule name and definition.
Threat actor created Outlook inbox rule name and definition

Most sessions then remained dormant. In a subset of cases, operators conducted keyword-driven reconnaissance against SharePoint (payment, credentials) and propagated phishing further by sharing OneNote notebooks containing CodeStorm lure links with internal and external contacts. Observed UAL operations across these stages included New-InboxRuleSet-InboxRuleMailItemsAccessedFileAccessedAttachmentAccessed and Send.

Attribution

Hexastrike assesses with moderate confidence that CodeStorm represents activity within the cluster Microsoft tracks as Storm-1167. Microsoft’s 2023 reporting on Storm-1167 named two distinctive infrastructure indicators: phishing-page hosting on Tencent cloud infrastructure and AiTM phishing infrastructure located on Indonesian IP addresses. CodeStorm uses Tencent Cloud Object Storage in the ap-seoul region for second-stage payload delivery, and the recovered server-side render component contains Indonesian-language code artifacts that are independent of the Tencent indicator.

Behavioral tradecraft observed across confirmed CodeStorm compromises, including abuse of trusted vendor or partner accounts, AiTM credential and MFA capture, session-cookie theft and replay, mailbox-rule persistence, and onward phishing from compromised accounts, aligns with the operational model Microsoft documented for the 2023 Storm-1167 campaign.

Hexastrike does not assess CodeStorm to be a copy or fork of any other publicly documented Microsoft 365 AiTM kit, and does not name an individual operator. The remainder of this section presents the supporting evidence and addresses the principal alternative hypothesis.

Phishing Kit Family Lineage

Hexastrike compared CodeStorm against four publicly documented Microsoft 365 AiTM kits with overlapping market positioning: W3LL Panel, Sneaky 2FA, FlowerStorm, and Whisper 2FA. The comparison covered server-side render logic, lure-page obfuscation, second-stage delivery model, harvester URL structure, MFA branch handling, and operator deployment pattern. No comparison surfaced code-level overlap sufficient to merge CodeStorm into an existing family.

W3LL Panel, documented by Group-IB in 2023, is one of the most established Microsoft 365 AiTM kits associated with BEC-focused phishing operations. Group-IB reported that W3LL operated the W3LL Store marketplace, supported a customer base of more than 500 cybercriminals, and sold W3LL Panel, also known as OV6, to compromise Microsoft 365 accounts and bypass MFA. Group-IB further reported that the actor behind W3LL participated in Indonesian-speaking hacking communities. In 2026, the FBI reported a joint disruption with Indonesian authorities against the W3LL phishing network, including the seizure of supporting infrastructure and the apprehension of an alleged developer.

Sekoia subsequently reported that Sneaky 2FA reused source code from W3LL Panel OV6 and retained a hardcoded reference to the w3ll[.]store domain in code responsible for Microsoft 365 authentication. Sekoia also reported that Sneaky 2FA was distributed through the Sneaky Log PhaaS model, with customers receiving licensed obfuscated source code and deploying phishing pages independently on compromised infrastructure, WordPress sites, and attacker-controlled domains. CodeStorm’s index-crypto-2.php does not contain the W3LL strings or structural artifacts that anchor Sekoia’s Sneaky-2FA-to-W3LL assessment, and Hexastrike’s comparison did not surface the OV6 source patterns Sekoia documented.

FlowerStorm and Whisper 2FA are separable from CodeStorm on technical grounds. Sophos reported FlowerStorm in late 2024 as a successor to Rockstar2FA with shared ancestry to the Tycoon/Rockstar lineage, including standardized use of next.php as the harvester filename. CodeStorm includes next.php as a minor harvester-path variant, but the dominant CodeStorm path is /google.php, and CodeStorm’s tokenized lure scheme drawn from [A-Za-z0-9]{5} and Tencent COS second-stage delivery model are not present in the FlowerStorm or Rockstar2FA corpora documented by Sophos. Barracuda reported Whisper 2FA in October 2025 as a Microsoft 365 credential-theft and MFA-token phishing kit with continuous AJAX-based exfiltration loops to a single C2 endpoint and multilayered Base64 and XOR encoding. CodeStorm overlaps with Whisper 2FA at the tradecraft level, including Microsoft 365 targeting and real-time MFA capture, but CodeStorm’s two-stage delivery model, Tencent COS hosting, per-operator harvester variable, and lure-page cipher variants are structurally distinct.

The CodeStorm-specific differentiators that support separate cluster tracking are the Tencent COS second-stage delivery model with multiple recurring APPIDs, the [A-Za-z0-9]{5} tokenized lure-path scheme, the dominant /google.php harvester path, the Turnstile sitekey-as-operator-identifier configuration model, and the $checkings and $titles arrays embedded in the recovered render component. The recurring PDF metadata identifiers documented earlier in this report are consistent with the same operator-pool model and provide an independent indicator of shared tooling across observed CodeStorm campaigns.

Indonesian Authorship Evidence

The recovered render component contains three Indonesian-language artifacts. The helper function random_str($panjang) uses panjang (“length”) as a parameter name. The lazy-loading logic includes the error string Gagal memuat (“failed to load”). The stage-two URL placeholder includes the directory token ASLI (“original,” “authentic”). These are code-level artifacts in the render component itself, not strings displayed to the victim.

Hexastrike treats these markers as evidence of an Indonesian-language development pipeline rather than proof of operator nationality. Language artifacts can be inherited through copied code, retained from a purchased kit, or introduced by a third-party developer. The markers are nevertheless independent of Microsoft’s 2023 Indonesia-related infrastructure observation, since one concerns source-code language artifacts and the other concerns the location of phishing infrastructure and follow-on sign-ins.

The Indonesian-language indicators are directionally consistent with the broader Microsoft 365 AiTM ecosystem. Group-IB documented W3LL’s Indonesian-speaking community ties in 2023, and the 2026 FBI disruption of the W3LL phishing network involved Indonesian authorities. Hexastrike did not identify equivalent public evidence establishing Indonesian authorship for Sneaky 2FA, FlowerStorm, or Whisper 2FA. The CodeStorm markers therefore add a CodeStorm-specific data point to a regional development ecosystem previously documented in the same direction, without establishing a code-lineage relationship to W3LL.

Mapping to Storm-1167

Microsoft publicly described Storm-1167 as the developer, maintainer, and operator of an AiTM phishing kit used in a multi-stage phishing and BEC campaign. The 2023 campaign began with phishing email from a trusted vendor, used Canva-hosted lure content, redirected victims to a Tencent-hosted phishing page, captured credentials and MFA responses, replayed session cookies, modified MFA methods, created inbox rules, and supported follow-on phishing from compromised accounts.

CodeStorm exhibits the same operational model across multiple independent dimensions. CodeStorm operators used compromised Microsoft 365 accounts to send phishing email, including from vendor and partner tenants with prior correspondence with the recipient organization. Lure content was staged through SharePoint and other trusted SaaS platforms. Microsoft 365 session material was captured through AiTM proxying with multi-method MFA interception. Post-authentication access supported onward phishing and mailbox-rule persistence. These overlaps are behavioral and infrastructure-based rather than code-level. They support mapping CodeStorm to the Storm-1167 operational model, but do not prove exclusive actor control.

Microsoft’s January 2026 reporting on a multi-stage AiTM and BEC campaign targeting energy-sector organizations documented closely aligned tradecraft, including SharePoint-staged lures, trusted-identity abuse, inbox-rule persistence, and the requirement to revoke active session cookies in addition to resetting passwords. The 2026 post did not publicly name Storm-1167. Hexastrike therefore uses this reporting as corroborating tradecraft context for the continuing relevance of the Storm-1167 operational model, not as a named Storm-1167 update.

The infrastructure indicators supporting the CodeStorm-to-Storm-1167 assessment are Tencent cloud usage and Indonesian-linked development and infrastructure artifacts. Microsoft’s 2023 report stated that Storm-1167 redirected victims to phishing pages hosted on Tencent cloud infrastructure and that the AiTM phishing pages were hosted on IP addresses located in Indonesia, with follow-on sign-ins observed from the same IP addresses. CodeStorm uses Tencent COS in the ap-seoul region for second-stage delivery and contains Indonesian-language source artifacts in the recovered render component. Neither indicator is unique in isolation. Their joint occurrence in a kit that also exhibits the behavioral overlap above narrows the population of activity clusters meaningfully consistent with these indicators.

Detection Opportunities

CodeStorm detection should focus on post-authentication activity, compromised-account propagation, and infrastructure patterns rather than sender reputation alone. Across investigated cases, operators used legitimate Microsoft tenants, trusted SaaS platforms, and AiTM proxying to reduce the value of conventional phishing indicators.

Identity and Session Activity

  • Token replay or session reuse after successful MFA.
  • Anomalous session activity after an otherwise successful sign-in.
  • Impossible travel or sign-ins inconsistent with the user’s normal geography.
  • New device fingerprints or unfamiliar browser characteristics.
  • Sign-ins from unfamiliar ASNs or hosting providers.
  • Suspicious sign-in properties after successful MFA.
  • Initial attacker logons from Tencent ASNs in investigated cases, consistent with infrastructure used elsewhere in the CodeStorm delivery chain.

Mailbox and SharePoint Activity

  • Bursts of outbound mail from a user shortly after anomalous sign-in.
  • New SharePoint links created or sent following anomalous sign-in.
  • Mailbox rule creation shortly after anomalous sign-in, particularly rules named LinkedIn or similar that route incoming mail into folders such as Read or RSS Feeds.

Lure and Infrastructure Patterns

  • Requests to CodeStorm-specific paths such as /google.php.
  • Browser requests to tokenized lure paths matching /[A-Za-z0-9]{5}.
  • Microsoft-themed or document-themed subdomain naming, including terms such as officesharepointloginsecuredoconedrive, and related variants.
  • Redirect chains involving trusted SaaS platforms. These domains should not be treated as automatically benign when they redirect to external credential infrastructure.

Hardening and Mitigation Guidance

The recommendations below are scoped to the specific tradecraft observed across CodeStorm intrusions. They prioritize controls that disrupt AiTM-based session theft, reduce the post-authentication blast radius, and improve detection coverage for the delivery patterns documented in this report. Baseline phishing controls, including email filtering, user reporting workflows, and security awareness training, remain useful, but they should not be treated as sufficient against CodeStorm because the kit relies on legitimate tenants, trusted SaaS platforms, and real-time session interception.

Session Theft and AiTM Resistance

  • Prioritize phishing-resistant authentication for privileged users, finance users, executives, and other high-risk groups.
  • Prefer FIDO2 security keys, Windows Hello for Business, passkeys, or certificate-based authentication over OTP and push-based MFA for high-risk access.
  • Avoid fallback paths that allow users to downgrade from phishing-resistant authentication to SMS, email OTP, or push approval.

Microsoft’s Conditional Access authentication strengths can be used to require phishing-resistant methods such as FIDO2 security keys, Windows Hello for Business, passkeys, and certificate-based authentication.

Conditional Access and Session Controls

  • Require compliant or managed devices for sensitive Microsoft 365 applications.
  • Use Conditional Access policies that combine user risk, sign-in risk, device compliance, location, and application sensitivity.
  • Treat trusted locations as a supporting signal, not a primary defense.
  • Enable Continuous Access Evaluation where supported to improve enforcement after password resets, account disablement, location changes, and session revocation.
  • Review Token Protection for supported native application scenarios, but do not treat it as complete coverage for browser-based AiTM phishing because Microsoft currently states browser-based applications are not supported.

Microsoft Continuous Access Evaluation can improve near-real-time enforcement for supported services, while Token Protection should be treated as a targeted control for supported native application scenarios rather than complete coverage for browser-based AiTM phishing.

Conclusion

CodeStorm is an actively maintained Microsoft 365 AiTM phishing kit that Hexastrike assesses with moderate confidence to fall within the Storm-1167 cluster. Its operational strength lies less in technical novelty than in the disciplined integration of trusted infrastructure abuse, real-time MFA interception, and lightweight but consistent post-authentication tradecraft. Conventional perimeter and reputation-based controls offer limited protection because the kit relies on legitimate tenants, trusted SaaS platforms, and live session theft. Effective defense requires phishing-resistant authentication, Conditional Access policies anchored on device and session signals, and detection logic that correlates identity, mailbox, and SharePoint activity.

Acknowledgements

  • Steven Lim, for additional threat intelligence and corroborating data points.
  • Sekoia Threat Detection & Research, for prior public reporting on Sneaky 2FA.
  • Barracuda Threat Analyst Team, for prior public reporting on Whisper 2FA.
  • Microsoft Threat Intelligence, for prior public reporting on the Storm-1167 cluster.

Disclosure Timeline

DateRecipient
May 13, 2026Affected customers and identified victim organizations
May 14, 2026Cloudflare Abuse
May 14, 2026Tencent Cloud Abuse
May 19, 2026Microsoft Security Response Center
May 20, 2026Public release

MITRE ATT&CK Mapping

TacticIDTechniqueCodeStorm
Resource DevelopmentT1583.001Acquire Infrastructure: DomainsOperators used attacker-controlled apex domains and subdomains for lure and harvester infrastructure.
Resource DevelopmentT1583.006Acquire Infrastructure: Web ServicesTencent COS was used to host CodeStorm stage-two JavaScript payloads.
Resource DevelopmentT1586.002Compromise Accounts: Email AccountsCompromised Microsoft 365 mailboxes were used to send phishing emails from trusted senders.
Initial AccessT1566.002Phishing: Spearphishing LinkPhishing emails contained links to CodeStorm lure infrastructure.
Initial AccessT1566.001Phishing: Spearphishing AttachmentHTML attachments were delivered directly to victim inboxes.
Initial AccessT1566.003Phishing: Spearphishing via ServiceLures were delivered through trusted SaaS platforms including SharePoint, Microsoft Sway, allo.io, youengage.me, mixpanel.com, and gamma.app.
Initial Access / Persistence / Defense Evasion / Lateral MovementT1078.004Valid Accounts: Cloud AccountsOperators used compromised Microsoft 365 accounts and stolen authenticated session material to access victim tenants.
ExecutionT1204.001User Execution: Malicious LinkVictims were required to open lure links or QR-code destinations to reach CodeStorm phishing pages.
ExecutionT1059.007Command and Scripting Interpreter: JavaScriptCodeStorm executed client-side JavaScript in the victim browser to render the phishing UI and drive credential-harvesting logic.
PersistenceT1098Account ManipulationOperators modified compromised mailboxes by creating or changing inbox rules after successful account access.
Persistence / Defense EvasionT1564.008Hide Artifacts: Email Hiding RulesThe same post-compromise rule activity was used for concealment, including an Outlook inbox rule named LinkedIn that moved phishing-related messages into RSS Feeds and marked them read.
Defense Evasion / Lateral MovementT1550.004Use Alternate Authentication Material: Web Session CookieOperators reused stolen Microsoft 365 session cookies or tokens after successful MFA.
Defense EvasionT1027Obfuscated Files or InformationCodeStorm used encrypted and obfuscated JavaScript payloads, runtime decoding, string reconstruction, and obfuscated stage-two JavaScript.
Defense EvasionT1140Deobfuscate/Decode Files or InformationCodeStorm decoded runtime payloads using LCG/Caesar/XOR logic in one variant and AES-256-CBC with CryptoJS in another.
Defense EvasionT1497.001Virtualization/Sandbox Evasion: System ChecksCodeStorm checked for navigator.webdriver, PhantomJS indicators, Burp-related user-agent strings, and debugger-induced execution delays.
Defense EvasionT1620Reflective Code LoadingCodeStorm reconstructed and executed decoded JavaScript payloads at runtime and dynamically loaded stage-two scripts.
Credential AccessT1557Adversary-in-the-MiddleCodeStorm proxied Microsoft 365 authentication in real time to intercept credentials, MFA artifacts, and session material.
Credential AccessT1539Steal Web Session CookieCodeStorm obtained authenticated Microsoft 365 session material during the web authentication flow.
Credential Access / CollectionT1056.003Input Capture: Web Portal CaptureThe fake Microsoft 365 login interface captured email addresses, passwords, and MFA artifacts.
Command and ControlT1102Web ServiceTencent COS / myqcloud.com was used as a web service for hosting stage-two payloads.
Command and Control / ExfiltrationT1071.001Application Layer Protocol: Web ProtocolsCodeStorm used HTTPS web traffic for Tencent COS stage-two payload retrieval and communication with harvester endpoints such as /google.php and /next.php.
CollectionT1114.002Email Collection: Remote Email CollectionOperators accessed Microsoft 365 mailbox content after compromise.
CollectionT1530Data from Cloud StorageOperators accessed SharePoint-hosted cloud content after compromise.
CollectionT1213.002Data from Information Repositories: SharePointOperators conducted keyword-driven SharePoint reconnaissance, including searches for payment- and credential-related content.
DiscoveryT1087.003Account Discovery: Email AccountOperators harvested contacts from compromised users’ Outlook address books.
DiscoveryT1087.004Account Discovery: Cloud AccountOperators used compromised Microsoft 365 context to identify tenant users, contacts, and cloud-account relationships.
Lateral MovementT1534Internal SpearphishingOperators sent phishing messages to additional recipients within the same compromised tenant.

Indicators of Compromise

Note: First Seen and Last Seen values reflect Hexastrike’s observation window for each indicator and do not necessarily represent creation date, registration date, first malicious use, or the full period of operator control.

CategoryTypeValueCommentFirst SeenLast Seen
Network activitydomainadvantagedigitalstrength.deCodeStorm phishing apex domain2026-04-142026-04-30
Network activitydomainafemalesewedblessings.com.deCodeStorm phishing apex domain2025-04-042026-05-03
Network activitydomainancientexplorer.deCodeStorm phishing apex domain2026-04-072026-04-07
Network activitydomainapptoimprovesecurity.deCodeStorm phishing apex domain2026-05-132026-05-13
Network activitydomainastronautosogni.deCodeStorm phishing apex domain2026-03-282026-04-05
Network activitydomainastronomy.com.deCodeStorm phishing apex domain2025-04-042026-04-22
Network activitydomainawomanknitaspirations.com.deCodeStorm phishing apex domain2025-04-042026-05-03
Network activitydomainbell.com.deCodeStorm phishing apex domain2025-04-042026-04-15
Network activitydomainbending.com.deCodeStorm phishing apex domain2025-04-042026-01-16
Network activitydomainblooming.com.deCodeStorm phishing apex domain2025-04-042026-04-11
Network activitydomainblossom.com.deCodeStorm phishing apex domain2025-04-042025-11-27
Network activitydomainbreathlessness.com.deCodeStorm phishing apex domain2025-04-042026-01-15
Network activitydomainbuiltinlayers.deCodeStorm phishing apex domain2026-04-122026-04-30
Network activitydomaincaringprecision.deCodeStorm phishing apex domain2026-04-122026-04-13
Network activitydomaincephalexinv.deCodeStorm phishing apex domain2026-04-302026-04-30
Network activitydomaincertifiedconnect.deCodeStorm phishing apex domain2026-04-272026-05-11
Network activitydomainchildrenreadclouds.deCodeStorm phishing apex domain2026-05-102026-05-10
Network activitydomainchiminghour.deCodeStorm phishing apex domain2026-04-032026-04-04
Network activitydomainclarityfirstdigital.deCodeStorm phishing apex domain2026-03-312026-04-12
Network activitydomainclarityinbranding.deCodeStorm phishing apex domain2026-04-092026-04-27
Network activitydomainclarityindesign.deCodeStorm phishing apex domain2026-04-212026-05-14
Network activitydomainclearbrandmessage.deCodeStorm phishing apex domain2026-05-022026-05-02
Network activitydomainclearcommunicationhub.deCodeStorm phishing apex domain2026-04-012026-04-27
Network activitydomainclearconceptsdesign.deCodeStorm phishing apex domain2026-03-312026-04-27
Network activitydomainclearinterfacedesign.deCodeStorm phishing apex domain2026-05-012026-05-09
Network activitydomainclearlayout.deCodeStorm phishing apex domain2026-03-242026-04-16
Network activitydomainclearmodern.deCodeStorm phishing apex domain2026-04-192026-04-24
Network activitydomainclickconfidence.deCodeStorm phishing apex domain2026-05-032026-05-03
Network activitydomaincodeforsecurity.deCodeStorm phishing apex domain2026-03-192026-03-19
Network activitydomaincolorfullandscapetrain.deCodeStorm phishing apex domain2026-03-242026-04-12
Network activitydomainconfidencehub.deCodeStorm phishing apex domain2026-05-102026-05-11
Network activitydomainconfidenceinbuild.deCodeStorm phishing apex domain2026-04-172026-04-20
Network activitydomainconfidenceindetail.deCodeStorm phishing apex domain2026-04-132026-04-23
Network activitydomainconfidencesphere.deCodeStorm phishing apex domain2026-05-082026-05-08
Network activitydomainconfidentlyexecuted.deCodeStorm phishing apex domain2026-04-132026-04-27
Network activitydomainconsistentcollaborators.deCodeStorm phishing apex domain2026-04-172026-04-24
Network activitydomainconsistenthostingsolutions.deCodeStorm phishing apex domain2026-04-242026-05-09
Network activitydomainconsistentlystructured.deCodeStorm phishing apex domain2026-03-302026-04-27
Network activitydomaincontemplative.com.deCodeStorm phishing apex domain2025-04-042026-02-20
Network activitydomaincorrespondence.com.deCodeStorm phishing apex domain2025-04-042025-12-16
Network activitydomaincounteddown.com.deCodeStorm phishing apex domain2025-04-042026-03-12
Network activitydomaincreatesdependability.deCodeStorm phishing apex domain2026-04-132026-05-11
Network activitydomaincreations.com.deCodeStorm phishing apex domain2025-04-042025-11-25
Network activitydomaincredbilityandidentity.deCodeStorm phishing apex domain2026-04-172026-04-20
Network activitydomaincredibilityhub.deCodeStorm phishing apex domain2026-04-022026-04-20
Network activitydomaincredibilityprotected.deCodeStorm phishing apex domain2026-04-162026-04-20
Network activitydomaincrediblemarketsignals.deCodeStorm phishing apex domain2026-04-272026-05-03
Network activitydomaincrediblesecure.deCodeStorm phishing apex domain2026-04-132026-04-29
Network activitydomaincrystalharbor.com.deCodeStorm phishing apex domain2025-04-042026-04-05
Network activitydomaincurated.com.deCodeStorm phishing apex domain2025-04-042026-02-12
Network activitydomaincurrent.com.deCodeStorm phishing apex domain2025-04-042025-11-24
Network activitydomaincurved.com.deCodeStorm phishing apex domain2025-04-042026-05-10
Network activitydomaincustomersafenet.deCodeStorm phishing apex domain2026-04-012026-04-23
Network activitydomaincyberprofessionalism.deCodeStorm phishing apex domain2026-05-052026-05-05
Network activitydomaindaybreak.com.deCodeStorm phishing apex domain2025-04-042025-12-04
Network activitydomaindefinedarchitecture.deCodeStorm phishing apex domain2026-04-142026-05-03
Network activitydomaindelivered.com.deCodeStorm phishing apex domain2025-04-042025-12-10
Network activitydomaindependablecreativity.deCodeStorm phishing apex domain2026-04-242026-05-03
Network activitydomaindependableinnovations.deCodeStorm phishing apex domain2026-04-162026-05-01
Network activitydomaindesignreducesuncertainty.deCodeStorm phishing apex domain2026-05-012026-05-12
Network activitydomaindesignyourpeace.deCodeStorm phishing apex domain2026-05-052026-05-05
Network activitydomaindetail-oriented.deCodeStorm phishing apex domain2026-03-232026-04-21
Network activitydomaindigitalbrandclarity.deCodeStorm phishing apex domain2026-04-142026-04-27
Network activitydomaindigitalconduct.deCodeStorm phishing apex domain2026-05-012026-05-14
Network activitydomaindigitalcredibilityhub.deCodeStorm phishing apex domain2026-05-102026-05-13
Network activitydomaindigitaleffectiveness.deCodeStorm phishing apex domain2026-05-032026-05-03
Network activitydomaindigitalforceadvantage.deCodeStorm phishing apex domain2026-04-142026-05-13
Network activitydomaindigitalframeworksforsuccess.deCodeStorm phishing apex domain2026-04-142026-05-09
Network activitydomaindigitallyempowered.deCodeStorm phishing apex domain2026-04-142026-05-11
Network activitydomaindigitallygerman.deCodeStorm phishing apex domain2026-04-092026-05-03
Network activitydomaindigitalmarkettransparency.deCodeStorm phishing apex domain2026-05-122026-05-12
Network activitydomaindigitalpresenceexpert.deCodeStorm phishing apex domain2026-05-112026-05-11
Network activitydomaindigitalproficiency.deCodeStorm phishing apex domain2026-04-172026-05-03
Network activitydomaindigitalreputationclarity.deCodeStorm phishing apex domain2026-04-152026-04-27
Network activitydomaindigitalstrengthhub.deCodeStorm phishing apex domain2026-04-142026-05-01
Network activitydomaindigitalsuccessframeworks.deCodeStorm phishing apex domain2026-04-182026-05-09
Network activitydomaindigitaltrustbase.deCodeStorm phishing apex domain2026-05-022026-05-14
Network activitydomaindigitaltrustlayer.deCodeStorm phishing apex domain2026-05-132026-05-13
Network activitydomaindiligentdomain.deCodeStorm phishing apex domain2026-04-112026-04-26
Network activitydomaindisappeared.com.deCodeStorm phishing apex domain2025-04-042026-04-13
Network activitydomaindomainfoundation.deCodeStorm phishing apex domain2026-04-222026-05-10
Network activitydomaindomaintrustlayer.deCodeStorm phishing apex domain2026-04-102026-05-07
Network activitydomaindreamscapes.com.deCodeStorm phishing apex domain2025-04-042026-05-11
Network activitydomaindreamsintheframe.deCodeStorm phishing apex domain2026-05-072026-05-14
Network activitydomaindreamycloudletters.deCodeStorm phishing apex domain2026-03-272026-03-27
Network activitydomaindynamicgrowthsystems.deCodeStorm phishing apex domain2026-04-132026-05-08
Network activitydomainechoednostalgia.deCodeStorm phishing apex domain2026-04-092026-04-19
Network activitydomainechoesoftheevening.deCodeStorm phishing apex domain2026-04-072026-05-05
Network activitydomainecofriendlycommunication.deCodeStorm phishing apex domain2026-04-142026-05-10
Network activitydomainefficiencyworks.deCodeStorm phishing apex domain2026-05-032026-05-03
Network activitydomainefficientlycompetitive.deCodeStorm phishing apex domain2026-04-242026-05-03
Network activitydomaineffortlessdesignclarity.deCodeStorm phishing apex domain2026-05-122026-05-12
Network activitydomainelevatebrandimage.deCodeStorm phishing apex domain2026-04-142026-05-08
Network activitydomainembodied.com.deCodeStorm phishing apex domain2025-04-042026-04-01
Network activitydomainencapsulated.com.deCodeStorm phishing apex domain2025-04-042026-03-19
Network activitydomainencouraged.com.deCodeStorm phishing apex domain2025-04-042026-01-18
Network activitydomainenlightenment.com.deCodeStorm phishing apex domain2025-04-042026-04-22
Network activitydomainenvelope.com.deCodeStorm phishing apex domain2025-04-042026-03-25
Network activitydomainetched.com.deCodeStorm phishing apex domain2025-04-042026-02-05
Network activitydomaineurotrustsignals.deCodeStorm phishing apex domain2026-05-092026-05-09
Network activitydomainevoked.com.deCodeStorm phishing apex domain2025-04-042026-02-09
Network activitydomainexactbusiness.deCodeStorm phishing apex domain2026-04-232026-05-12
Network activitydomainexactwebpresence.deCodeStorm phishing apex domain2026-03-302026-04-16
Network activitydomainexecutionwithconfidence.deCodeStorm phishing apex domain2026-05-142026-05-14
Network activitydomainexemplaryexecution.deCodeStorm phishing apex domain2026-04-132026-05-01
Network activitydomainexploring.com.deCodeStorm phishing apex domain2025-04-042026-01-12
Network activitydomainextensioneurope.deCodeStorm phishing apex domain2026-04-272026-04-27
Network activitydomainfaintly.com.deCodeStorm phishing apex domain2025-04-042025-11-06
Network activitydomainfantasies.com.deCodeStorm phishing apex domain2025-04-042026-02-19
Network activitydomainfierce.com.deCodeStorm phishing apex domain2025-04-042026-03-15
Network activitydomainfindingtheearth.deCodeStorm phishing apex domain2026-02-222026-03-21
Network activitydomainfirelight.com.deCodeStorm phishing apex domain2025-04-042026-05-01
Network activitydomainflawlessoperations.deCodeStorm phishing apex domain2026-05-122026-05-12
Network activitydomainfondness.com.deCodeStorm phishing apex domain2025-04-042026-04-27
Network activitydomainfostered.com.deCodeStorm phishing apex domain2025-04-042026-04-27
Network activitydomainfosteringtrust.deCodeStorm phishing apex domain2026-03-312026-04-27
Network activitydomainfoundationforprofessionals.deCodeStorm phishing apex domain2026-03-312026-04-25
Network activitydomainfoundationofprofessionals.deCodeStorm phishing apex domain2026-03-312026-04-21
Network activitydomainfracturedmoon.deCodeStorm phishing apex domain2026-02-202026-03-20
Network activitydomainframeworksforsuccess.deCodeStorm phishing apex domain2026-04-232026-05-12
Network activitydomainfriendlystray.deCodeStorm phishing apex domain2026-05-062026-05-06
Network activitydomainfuturereadyinfrastructure.deCodeStorm phishing apex domain2026-04-212026-04-25
Network activitydomainfutures.com.deCodeStorm phishing apex domain2020-03-072026-02-04
Network activitydomaingermanidentityhub.deCodeStorm phishing apex domain2026-05-082026-05-08
Network activitydomaingirlwithanotebook.deCodeStorm phishing apex domain2026-04-112026-04-17
Network activitydomainglimmeringreflections.deCodeStorm phishing apex domain2026-03-282026-03-29
Network activitydomainglinting.com.deCodeStorm phishing apex domain2025-04-042026-04-24
Network activitydomainglisten.com.deCodeStorm phishing apex domain2025-04-042026-04-27
Network activitydomainglobalpreparedness.deCodeStorm phishing apex domain2026-05-032026-05-03
Network activitydomaingoalorientedhub.deCodeStorm phishing apex domain2026-04-082026-05-02
Network activitydomaingradualquality.deCodeStorm phishing apex domain2026-04-032026-04-19
Network activitydomaingurgled.com.deCodeStorm phishing apex domain2025-04-042025-11-24
Network activitydomainhalo.com.deCodeStorm phishing apex domain2025-04-042026-05-01
Network activitydomainhappycloudmessages.deCodeStorm phishing apex domain2026-04-292026-05-14
Network activitydomainhealing.com.deCodeStorm phishing apex domain2025-04-042026-04-27
Network activitydomainheavensentrain.deCodeStorm phishing apex domain2026-03-192026-03-21
Network activitydomainheavyraindaily.deCodeStorm phishing apex domain2026-04-012026-04-28
Network activitydomainheeding.com.deCodeStorm phishing apex domain2025-04-042026-02-04
Network activitydomainhints.com.deCodeStorm phishing apex domain2025-04-042026-02-14
Network activitydomainhopped.com.deCodeStorm phishing apex domain2025-04-042025-12-07
Network activitydomainidentityestablished.deCodeStorm phishing apex domain2026-04-172026-04-21
Network activitydomainidentityprofessional.deCodeStorm phishing apex domain2026-04-182026-04-18
Network activitydomainincandescence.com.deCodeStorm phishing apex domain2025-04-042026-05-07
Network activitydomaininfrastructureplus.deCodeStorm phishing apex domain2026-04-142026-05-03
Network activitydomaininnovatestructure.deCodeStorm phishing apex domain2026-05-122026-05-13
Network activitydomaininnovativewege.deCodeStorm phishing apex domain2026-04-252026-05-12
Network activitydomaininquisitive.com.deCodeStorm phishing apex domain2025-04-042026-01-29
Network activitydomaininstinctivecredibility.deCodeStorm phishing apex domain2026-05-082026-05-08
Network activitydomainintegratedbranding.deCodeStorm phishing apex domain2026-04-042026-05-02
Network activitydomainintent.com.deCodeStorm phishing apex domain2025-04-042026-05-09
Network activitydomainintentfocusgroup.deCodeStorm phishing apex domain2026-04-132026-05-10
Network activitydomainintentionalmarketgroup.deCodeStorm phishing apex domain2026-05-092026-05-10
Network activitydomaininterlaced.com.deCodeStorm phishing apex domain2025-04-042026-03-19
Network activitydomainintermittent.com.deCodeStorm phishing apex domain2025-04-042026-04-15
Network activitydomaininternationalreadiness.deCodeStorm phishing apex domain2026-04-272026-05-03
Network activitydomainintuitiveplatform.deCodeStorm phishing apex domain2026-05-092026-05-09
Network activitydomaininvigorated.com.deCodeStorm phishing apex domain2025-04-042026-01-19
Network activitydomainjoviality.com.deCodeStorm phishing apex domain2025-04-042026-04-23
Network activitydomainjustkeepgoing.deCodeStorm phishing apex domain2026-04-062026-04-06
Network activitydomainkept.com.deCodeStorm phishing apex domain2025-04-042026-03-03
Network activitydomainlamented.com.deCodeStorm phishing apex domain2025-04-042026-03-24
Network activitydomainlasted.com.deCodeStorm phishing apex domain2025-04-042026-05-14
Network activitydomainlastingtrustsecure.deCodeStorm phishing apex domain2026-03-312026-04-28
Network activitydomainlavender.com.deCodeStorm phishing apex domain2025-04-042026-04-15
Network activitydomainleading.com.deCodeStorm phishing apex domain2025-04-042026-05-02
Network activitydomainlifesaverapp.deCodeStorm phishing apex domain2026-05-012026-05-01
Network activitydomainliveliness.com.deCodeStorm phishing apex domain2025-04-042026-02-28
Network activitydomainlocaltrustworldwide.deCodeStorm phishing apex domain2026-05-102026-05-10
Network activitydomainlonghaulconsistency.deCodeStorm phishing apex domain2026-04-242026-04-24
Network activitydomainlongings.com.deCodeStorm phishing apex domain2025-04-042026-04-15
Network activitydomainlongtermvaluesafe.deCodeStorm phishing apex domain2026-05-012026-05-01
Network activitydomainluciddesigns.deCodeStorm phishing apex domain2026-03-312026-04-27
Network activitydomainlustrous.com.deCodeStorm phishing apex domain2025-04-042025-12-01
Network activitydomainmarketidentityconsistency.deCodeStorm phishing apex domain2026-04-142026-05-12
Network activitydomainmasteringprecision.deCodeStorm phishing apex domain2026-04-132026-05-08
Network activitydomainmaximizevisibility.deCodeStorm phishing apex domain2026-05-102026-05-10
Network activitydomainmelodized.com.deCodeStorm phishing apex domain2025-04-042025-11-25
Network activitydomainmelted.com.deCodeStorm phishing apex domain2025-04-042025-09-06
Network activitydomainmementos.com.deCodeStorm phishing apex domain2025-04-042026-05-03
Network activitydomainmemoriesofwishes.deCodeStorm phishing apex domain2026-03-042026-03-29
Network activitydomainmended.com.deCodeStorm phishing apex domain2025-04-042026-01-27
Network activitydomainmerged.com.deCodeStorm phishing apex domain2025-04-042026-04-14
Network activitydomainmerriment.com.deCodeStorm phishing apex domain2025-04-042025-11-09
Network activitydomainmodernbrandclarity.deCodeStorm phishing apex domain2026-04-092026-04-24
Network activitydomainmorningmelody.deCodeStorm phishing apex domain2026-03-272026-03-31
Network activitydomainmountainrainreport.deCodeStorm phishing apex domain2026-04-282026-05-05
Network activitydomainmurmuringriver.deCodeStorm phishing apex domain2026-05-132026-05-13
Network activitydomainmusicalememorie.deCodeStorm phishing apex domain2026-04-262026-04-26
Network activitydomainmycredibledomain.deCodeStorm phishing apex domain2026-04-192026-04-19
Network activitydomainmysticalnight.deCodeStorm phishing apex domain2026-03-282026-03-29
Network activitydomainmythsoftheglade.deCodeStorm phishing apex domain2026-04-232026-04-23
Network activitydomainnaturesbreath.com.deCodeStorm phishing apex domain2025-04-042026-01-09
Network activitydomainnight.com.deCodeStorm phishing apex domain2020-07-212026-04-27
Network activitydomainnighttime.com.deCodeStorm phishing apex domain2025-04-042026-02-24
Network activitydomainnightwishdomain.deCodeStorm phishing apex domain2026-03-212026-03-29
Network activitydomainnorthernrainwatch.deCodeStorm phishing apex domain2026-04-292026-05-14
Network activitydomainnotebookofsecrets.deCodeStorm phishing apex domain2026-04-032026-04-12
Network activitydomainofficedatasolutions.deCodeStorm phishing apex domain2026-04-292026-04-29
Network activitydomainonlinepresencematters.deCodeStorm phishing apex domain2026-04-032026-04-24
Network activitydomainonlinesecurityapps.deCodeStorm phishing apex domain2026-04-202026-04-20
Network activitydomainoptimumoperations.deCodeStorm phishing apex domain2026-03-312026-04-29
Network activitydomainorderlydesigns.deCodeStorm phishing apex domain2026-04-072026-05-03
Network activitydomainorderlysystems.deCodeStorm phishing apex domain2026-04-152026-05-14
Network activitydomainorganizedenterprise.deCodeStorm phishing apex domain2026-05-102026-05-12
Network activitydomainovercame.com.deCodeStorm phishing apex domain2025-04-042026-05-04
Network activitydomainpartnersincommunication.deCodeStorm phishing apex domain2026-05-052026-05-05
Network activitydomainpartnersinconsistency.deCodeStorm phishing apex domain2026-04-242026-04-24
Network activitydomainpatienceintherain.deCodeStorm phishing apex domain2026-04-292026-04-29
Network activitydomainpattered.com.deCodeStorm phishing apex domain2025-04-042026-04-05
Network activitydomainpause.com.deCodeStorm phishing apex domain2025-04-042026-04-01
Network activitydomainpearlfilledshoes.deCodeStorm phishing apex domain2026-03-272026-03-27
Network activitydomainpearlsandshoes.deCodeStorm phishing apex domain2026-03-272026-04-04
Network activitydomainperceive.com.deCodeStorm phishing apex domain2025-04-042026-04-20
Network activitydomainperched.com.deCodeStorm phishing apex domain2025-04-042026-01-16
Network activitydomainperformancedelivery.deCodeStorm phishing apex domain2026-04-132026-05-04
Network activitydomainperformancepredictor.deCodeStorm phishing apex domain2026-04-152026-04-19
Network activitydomainperformancetactics.deCodeStorm phishing apex domain2026-04-272026-04-27
Network activitydomainphantasmagoric.com.deCodeStorm phishing apex domain2025-04-042026-05-02
Network activitydomainphosphorescence.com.deCodeStorm phishing apex domain2025-04-042026-05-01
Network activitydomainplatformclarity.deCodeStorm phishing apex domain2026-05-032026-05-07
Network activitydomainplatformconsistency.deCodeStorm phishing apex domain2026-03-302026-04-22
Network activitydomainplatformease.deCodeStorm phishing apex domain2026-03-312026-04-15
Network activitydomainplatformperformancehub.deCodeStorm phishing apex domain2026-03-302026-04-27
Network activitydomainplayfulcloudwords.deCodeStorm phishing apex domain2026-04-232026-05-14
Network activitydomainportrayed.com.deCodeStorm phishing apex domain2025-04-042026-03-04
Network activitydomainpossibilities.com.deCodeStorm phishing apex domain2025-04-042026-02-20
Network activitydomainpowerfulpresence.deCodeStorm phishing apex domain2026-03-232026-04-13
Network activitydomainpowerfultrustbrands.deCodeStorm phishing apex domain2026-04-012026-04-17
Network activitydomainprayerfulprecipitation.deCodeStorm phishing apex domain2026-04-192026-04-19
Network activitydomainprecisionandreliability.deCodeStorm phishing apex domain2026-03-302026-04-21
Network activitydomainprecisionandtrust.deCodeStorm phishing apex domain2026-04-292026-04-29
Network activitydomainprimedomainauthority.deCodeStorm phishing apex domain2026-04-122026-04-13
Network activitydomainproclienthub.deCodeStorm phishing apex domain2026-04-142026-04-21
Network activitydomainprodesigncertainty.deCodeStorm phishing apex domain2026-05-012026-05-12
Network activitydomainprofessionalassurance.deCodeStorm phishing apex domain2026-05-042026-05-04
Network activitydomainprofessionalprecision.deCodeStorm phishing apex domain2026-04-152026-04-28
Network activitydomainprofessionalpresencenow.deCodeStorm phishing apex domain2026-04-132026-05-13
Network activitydomainprofessionalresultsnow.deCodeStorm phishing apex domain2026-03-312026-04-27
Network activitydomainprogressiveplatforms.deCodeStorm phishing apex domain2026-05-092026-05-09
Network activitydomainprotectyourcred.deCodeStorm phishing apex domain2026-04-132026-05-12
Network activitydomainpurelysophisticated.deCodeStorm phishing apex domain2026-04-172026-04-17
Network activitydomainpurposefului.deCodeStorm phishing apex domain2026-04-122026-04-13
Network activitydomainqualityclientconnect.deCodeStorm phishing apex domain2026-04-142026-05-03
Network activitydomainqualitygermanbrand.deCodeStorm phishing apex domain2026-04-292026-05-08
Network activitydomainquantifiableexecution.deCodeStorm phishing apex domain2026-03-312026-04-27
Network activitydomainquivered.com.deCodeStorm phishing apex domain2025-04-042026-04-25
Network activitydomainrainydayreflections.deCodeStorm phishing apex domain2026-03-182026-04-13
Network activitydomainreact.com.deCodeStorm phishing apex domain2025-04-042025-10-08
Network activitydomainrealities.com.deCodeStorm phishing apex domain2025-04-042026-01-27
Network activitydomainrecognizeable.deCodeStorm phishing apex domain2026-05-012026-05-02
Network activitydomainrecollect.com.deCodeStorm phishing apex domain2025-04-042026-05-14
Network activitydomainreflective.com.deCodeStorm phishing apex domain2025-04-042026-04-09
Network activitydomainreflectiveriver.deCodeStorm phishing apex domain2026-04-102026-04-11
Network activitydomainreinforcesintegrity.deCodeStorm phishing apex domain2026-04-132026-05-11
Network activitydomainrelayed.com.deCodeStorm phishing apex domain2025-04-042026-05-13
Network activitydomainreliabilityhub.deCodeStorm phishing apex domain2026-04-032026-04-26
Network activitydomainreliabledigitalfootprint.deCodeStorm phishing apex domain2026-03-302026-04-27
Network activitydomainreliablehostinggrowth.deCodeStorm phishing apex domain2026-04-242026-05-08
Network activitydomainreliableplatforms.deCodeStorm phishing apex domain2026-03-302026-04-27
Network activitydomainreliablevisibility.deCodeStorm phishing apex domain2026-03-302026-04-27
Network activitydomainremembered.com.deCodeStorm phishing apex domain2025-04-042026-04-23
Network activitydomainrendered.com.deCodeStorm phishing apex domain2025-04-042026-05-12
Network activitydomainreputationenhancer.deCodeStorm phishing apex domain2026-05-082026-05-09
Network activitydomainrespectusertime.deCodeStorm phishing apex domain2026-04-132026-05-09
Network activitydomainrested.com.deCodeStorm phishing apex domain2025-04-042025-12-11
Network activitydomainretained.com.deCodeStorm phishing apex domain2025-04-042026-02-04
Network activitydomainreverberations.com.deCodeStorm phishing apex domain2025-04-042026-01-17
Network activitydomainrevisin.deCodeStorm phishing apex domain2026-04-032026-04-25
Network activitydomainrhythmed.com.deCodeStorm phishing apex domain2025-04-042026-05-02
Network activitydomainrooftopreflections.deCodeStorm phishing apex domain2026-04-062026-04-06
Network activitydomainrumble.com.deCodeStorm phishing apex domain2025-04-042026-04-21
Network activitydomainruminatingbrook.deCodeStorm phishing apex domain2026-03-202026-04-16
Network activitydomainsacredraindrops.deCodeStorm phishing apex domain2026-03-242026-04-16
Network activitydomainsacredshowers.deCodeStorm phishing apex domain2026-03-192026-03-21
Network activitydomainsafety.com.deCodeStorm phishing apex domain2025-04-042026-05-08
Network activitydomainsafetyfirstsystems.deCodeStorm phishing apex domain2026-04-212026-04-27
Network activitydomainsaluted.com.deCodeStorm phishing apex domain2025-04-042026-02-04
Network activitydomainsanfte-schatten-art.deCodeStorm phishing apex domain2026-04-182026-04-22
Network activitydomainsanfteslicht.deCodeStorm phishing apex domain2026-04-182026-04-22
Network activitydomainscalableinnovations.deCodeStorm phishing apex domain2026-05-132026-05-13
Network activitydomainscalableplatforms.deCodeStorm phishing apex domain2026-05-112026-05-11
Network activitydomainscattered.com.deCodeStorm phishing apex domain2025-04-042026-02-16
Network activitydomainsecondsofchime.deCodeStorm phishing apex domain2026-04-102026-04-11
Network activitydomainsecretsinthewind.deCodeStorm phishing apex domain2026-02-252026-03-21
Network activitydomainsecuredigitalsuccess.deCodeStorm phishing apex domain2026-05-102026-05-10
Network activitydomainsecuredomainreliability.deCodeStorm phishing apex domain2026-04-252026-05-07
Network activitydomainsecureenvirotrust.deCodeStorm phishing apex domain2026-03-312026-04-18
Network activitydomainsecureidentityonline.deCodeStorm phishing apex domain2026-04-152026-04-27
Network activitydomainsecureplatforms.deCodeStorm phishing apex domain2026-04-112026-04-11
Network activitydomainsecureuserguard.deCodeStorm phishing apex domain2026-04-132026-05-12
Network activitydomainsecureusertrust.deCodeStorm phishing apex domain2026-04-162026-04-29
Network activitydomainsecurewebsolution.deCodeStorm phishing apex domain2026-05-132026-05-13
Network activitydomainsecureyouronlinepresence.deCodeStorm phishing apex domain2026-04-232026-04-23
Network activitydomainserenades.com.deCodeStorm phishing apex domain2025-04-042026-04-26
Network activitydomainshowcased.com.deCodeStorm phishing apex domain2025-04-042026-01-18
Network activitydomainsighed.com.deCodeStorm phishing apex domain2025-04-042026-05-05
Network activitydomainsilhouetted.com.deCodeStorm phishing apex domain2025-04-042026-03-24
Network activitydomainsimplicitymastered.deCodeStorm phishing apex domain2026-04-172026-04-21
Network activitydomainsimplisticallysophisticated.deCodeStorm phishing apex domain2026-04-172026-04-20
Network activitydomainsimplysophisticatedonline.deCodeStorm phishing apex domain2026-04-162026-05-08
Network activitydomainskylandobservatory.deCodeStorm phishing apex domain2026-05-112026-05-12
Network activitydomainskyopenedeyes.deCodeStorm phishing apex domain2026-04-072026-04-30
Network activitydomainslipped.com.deCodeStorm phishing apex domain2025-04-042026-04-27
Network activitydomainsnoop.com.deCodeStorm phishing apex domain2025-04-042026-01-11
Network activitydomainsoft.com.deCodeStorm phishing apex domain2025-04-042026-05-07
Network activitydomainsoftmorningtown.deCodeStorm phishing apex domain2026-05-142026-05-14
Network activitydomainsoftness.com.deCodeStorm phishing apex domain2025-04-042026-04-11
Network activitydomainsoftwhispersofnature.deCodeStorm phishing apex domain2026-04-082026-05-07
Network activitydomainsolidreputation.deCodeStorm phishing apex domain2026-05-112026-05-12
Network activitydomainsophisticatedsimplicity.deCodeStorm phishing apex domain2026-03-222026-04-18
Network activitydomainspecters.com.deCodeStorm phishing apex domain2025-04-042026-01-13
Network activitydomainsplash.com.deCodeStorm phishing apex domain2025-04-042026-04-04
Network activitydomainstabledigitalframeworks.deCodeStorm phishing apex domain2026-04-172026-04-28
Network activitydomainstablegrowthfoundation.deCodeStorm phishing apex domain2026-04-212026-04-21
Network activitydomainstablegrowthhost.deCodeStorm phishing apex domain2026-04-242026-05-09
Network activitydomainstargazing.com.deCodeStorm phishing apex domain2025-04-042026-01-16
Network activitydomainstayedlit.com.deCodeStorm phishing apex domain2025-04-042026-05-14
Network activitydomainsteadfastpartnerships.deCodeStorm phishing apex domain2026-04-242026-05-11
Network activitydomainsteadystatebranding.deCodeStorm phishing apex domain2026-04-272026-04-29
Network activitydomainstellarremembrances.deCodeStorm phishing apex domain2026-05-072026-05-07
Network activitydomainstooping.com.deCodeStorm phishing apex domain2025-04-042026-01-13
Network activitydomainstrategicdigitalclarity.deCodeStorm phishing apex domain2026-05-012026-05-12
Network activitydomainstraykindnessproject.deCodeStorm phishing apex domain2026-04-062026-04-07
Network activitydomainstreamlineduserexp.deCodeStorm phishing apex domain2026-04-132026-05-13
Network activitydomainstrengthendigitalposition.deCodeStorm phishing apex domain2026-04-062026-04-16
Network activitydomainstrengthensrelationships.deCodeStorm phishing apex domain2026-04-132026-05-01
Network activitydomainstrengthenyourbrand.deCodeStorm phishing apex domain2026-04-102026-04-27
Network activitydomainstrengthindigital.deCodeStorm phishing apex domain2026-04-142026-04-29
Network activitydomainstrongframeworks.deCodeStorm phishing apex domain2026-03-312026-04-17
Network activitydomainstrongscales.deCodeStorm phishing apex domain2026-03-312026-04-29
Network activitydomainstrongsystems.deCodeStorm phishing apex domain2026-04-222026-05-08
Network activitydomainstructuredperformance.deCodeStorm phishing apex domain2026-05-042026-05-04
Network activitydomainstructuredsuccess.deCodeStorm phishing apex domain2026-05-102026-05-13
Network activitydomainstructureforusability.deCodeStorm phishing apex domain2026-03-312026-04-06
Network activitydomainsupported.com.deCodeStorm phishing apex domain2025-04-042026-01-18
Network activitydomainsurvived.com.deCodeStorm phishing apex domain2025-04-042026-01-26
Network activitydomainsuspense.com.deCodeStorm phishing apex domain2025-04-042025-11-22
Network activitydomainsuspension.com.deCodeStorm phishing apex domain2025-04-042026-05-13
Network activitydomainsustainabledialogue.deCodeStorm phishing apex domain2026-04-202026-05-05
Network activitydomainsustainablegrowthforce.deCodeStorm phishing apex domain2026-04-022026-04-17
Network activitydomainsustainscalable.deCodeStorm phishing apex domain2026-04-282026-05-13
Network activitydomainswaying.com.deCodeStorm phishing apex domain2025-04-042026-04-21
Network activitydomainsystematicperformance.deCodeStorm phishing apex domain2026-04-152026-04-19
Network activitydomaintalesofthemoon.deCodeStorm phishing apex domain2026-04-292026-04-29
Network activitydomainthewindnames.deCodeStorm phishing apex domain2026-03-152026-04-02
Network activitydomainthoroughness.deCodeStorm phishing apex domain2026-04-242026-04-27
Network activitydomainthoughtfulprecision.deCodeStorm phishing apex domain2026-05-112026-05-11
Network activitydomaintimeinleaves.deCodeStorm phishing apex domain2026-03-202026-03-22
Network activitydomaintownclockannounces.deCodeStorm phishing apex domain2026-05-122026-05-12
Network activitydomaintraditionmeetsinnovation.deCodeStorm phishing apex domain2026-04-022026-04-12
Network activitydomaintraditions.com.deCodeStorm phishing apex domain2025-04-042026-02-04
Network activitydomaintraditionsofinnovation.deCodeStorm phishing apex domain2026-05-072026-05-08
Network activitydomaintransform.com.deCodeStorm phishing apex domain2025-04-042026-03-12
Network activitydomaintransformation.com.deCodeStorm phishing apex domain2025-04-042025-07-30
Network activitydomaintransparentconversations.deCodeStorm phishing apex domain2026-04-012026-04-02
Network activitydomaintreeofribbons.deCodeStorm phishing apex domain2026-05-032026-05-03
Network activitydomaintriumphed.com.deCodeStorm phishing apex domain2025-04-042026-01-19
Network activitydomaintrustabledomains.deCodeStorm phishing apex domain2026-04-102026-05-07
Network activitydomaintrustedbrandinsight.deCodeStorm phishing apex domain2026-04-012026-04-27
Network activitydomaintrusteddesignpro.deCodeStorm phishing apex domain2026-05-122026-05-12
Network activitydomaintrusteddomainhub.deCodeStorm phishing apex domain2026-04-202026-04-30
Network activitydomaintrustedengagement.deCodeStorm phishing apex domain2026-04-272026-04-27
Network activitydomaintrustedmarket.deCodeStorm phishing apex domain2026-05-102026-05-10
Network activitydomaintrustenvironmentsecurity.deCodeStorm phishing apex domain2026-03-312026-04-27
Network activitydomaintrustfostering.deCodeStorm phishing apex domain2026-04-292026-05-12
Network activitydomaintrustshieldplatforms.deCodeStorm phishing apex domain2026-04-162026-05-13
Network activitydomaintrustthroughconsistency.deCodeStorm phishing apex domain2026-04-192026-04-24
Network activitydomaintrustworthybranding.deCodeStorm phishing apex domain2026-04-012026-04-09
Network activitydomaintrustworthygrowthhost.deCodeStorm phishing apex domain2026-05-082026-05-08
Network activitydomaintrustydomain.deCodeStorm phishing apex domain2026-05-092026-05-09
Network activitydomainunder.com.deCodeStorm phishing apex domain2025-04-042026-04-24
Network activitydomainunderstanding.com.deCodeStorm phishing apex domain2025-04-042026-02-03
Network activitydomainuninterruptedops.deCodeStorm phishing apex domain2026-05-032026-05-03
Network activitydomainunsurelantern.deCodeStorm phishing apex domain2026-04-062026-04-06
Network activitydomainunwaveringplatform.deCodeStorm phishing apex domain2026-04-172026-04-20
Network activitydomainuplifting.com.deCodeStorm phishing apex domain2025-04-042026-05-03
Network activitydomainveil.com.deCodeStorm phishing apex domain2025-04-042026-04-18
Network activitydomainverifieddomainspace.deCodeStorm phishing apex domain2026-04-232026-05-10
Network activitydomainverifiedidentityaddress.deCodeStorm phishing apex domain2026-04-172026-04-17
Network activitydomainverstndnisvoll.deCodeStorm phishing apex domain2026-04-252026-05-02
Network activitydomainvisibilitydriven.deCodeStorm phishing apex domain2026-05-102026-05-11
Network activitydomainvisiblityboost.deCodeStorm phishing apex domain2026-04-272026-05-05
Network activitydomainvision.com.deCodeStorm phishing apex domain2025-04-042026-04-26
Network activitydomainvitality.com.deCodeStorm phishing apex domain2025-04-042026-01-05
Network activitydomainwander.com.deCodeStorm phishing apex domain2025-04-042026-05-13
Network activitydomainwatched.com.deCodeStorm phishing apex domain2025-04-042025-11-06
Network activitydomainwebprofessionalism.deCodeStorm phishing apex domain2026-03-312026-04-24
Network activitydomainwelloptimized.deCodeStorm phishing apex domain2026-05-102026-05-10
Network activitydomainwhimsicalclouds.deCodeStorm phishing apex domain2026-03-282026-03-28
Network activitydomainwhiskers.com.deCodeStorm phishing apex domain2025-04-042026-05-13
Network activitydomainwhisperingwater.deCodeStorm phishing apex domain2026-04-262026-04-26
Network activitydomainwhispersofthewind.deCodeStorm phishing apex domain2026-03-042026-03-29
Network activitydomainwishful.com.deCodeStorm phishing apex domain2025-04-042026-05-03
Network activitydomainworldwidepreparedness.deCodeStorm phishing apex domain2026-04-152026-04-15
Network activitydomainxdreamgifthouse.deCodeStorm phishing apex domain2026-05-032026-05-10
Network activitydomainyielded.com.deCodeStorm phishing apex domain2025-04-042026-04-13
Payload deliverysha2566bea63d580071f34e8e9a3267fb0aefbc1c0d678b90c5c24e1d40f7f9abf62a2CodeStorm server-side render component (24113 bytes) (filename: index-crypto-2.php)
Payload deliveryfilenameindex-crypto-2.phpCodeStorm server-side render component filename
Payload deliveryfilenamebootstrap.min.jsCodeStorm stage-two credential harvesting payload (masquerades as Bootstrap library, hosted on Tencent COS)
Payload deliveryotherXMP-MM-DocumentID: c861fe4a-1dba-004e-883f-9a0be1a0af8bRecurring XMP MM Document ID across CodeStorm PDF lures
Payload deliveryotherXMP-MM-InstanceID: 2565A930-FF27-4054-971A-C72E62DCEAF4Recurring XMP MM Instance ID across CodeStorm PDF lures
Payload deliveryotherPDF-Trailer-ID: 2D728B14A9B308429EACADEA8D70EF32Recurring PDF trailer /ID value across CodeStorm PDF lures
Payload deliveryotherPDF-Trailer-ID: 7F013322168C589BBD87F4A2244D810ERecurring PDF trailer /ID value across CodeStorm PDF lures
Network activitypattern-in-traffic/google.phpCodeStorm primary credential harvester endpoint path
Network activitypattern-in-traffic/next.phpCodeStorm alternate credential harvester endpoint path
Network activitypattern-in-trafficpattern:/[A-Za-z0-9]{5}CodeStorm tokenized lure URL path pattern (5 random alphanumeric chars)
Artifacts droppedtextOutlook inbox rule named LinkedIn moving messages to RSS FeedsCodeStorm post-compromise persistence – inbox rule created within seconds of credential capture
Network activitydomaincos.ap-seoul.myqcloud.comTencent COS ap-seoul region – CodeStorm stage-two payload hosting domain
Network activitydomain*-1388504898.cos.ap-seoul.myqcloud.comTencent COS bucket hostname pattern used for CodeStorm stage-two payload hosting
Network activitydomain*-1417693617.cos.ap-seoul.myqcloud.comTencent COS bucket hostname pattern used for CodeStorm stage-two payload hosting
Network activitydomain*-1317754460.cos.ap-seoul.myqcloud.comTencent COS bucket hostname pattern used for CodeStorm stage-two payload hosting
Network activitydomain*-1323985617.cos.ap-seoul.myqcloud.comTencent COS bucket hostname pattern used for CodeStorm stage-two payload hosting
Network activitytextAPPID 1388504898 – Tencent COS bucket (ap-seoul)Tencent Cloud account hosting CodeStorm stage-two payloads
Network activitytextAPPID 1417693617 – Tencent COS bucket (ap-seoul)Tencent Cloud account hosting CodeStorm stage-two payloads
Network activitytextAPPID 1317754460 – Tencent COS bucket (ap-seoul)Tencent Cloud account hosting CodeStorm stage-two payloads
Network activitytextAPPID 1323985617 – Tencent COS bucket (ap-seoul)Tencent Cloud account hosting CodeStorm stage-two payloads

Table of Contents

About the author
Maurice Fielenbach

Maurice has spent over 10 years in cybersecurity, leading digital forensics and incident response, threat intelligence, and threat hunting. He has managed major security incidents across industries and works more than 100 cases per year. He trains security teams in digital forensics, malware analysis, and threat hunting, and is a regular speaker at industry events. His research has been featured in The Hacker News, Cybersecurity News, and Cryptika.

Training built from real incidents. Sharpening the defenders who matter.