Skip to content
  • Home
  • About
Search
Close

Malware Analysis, Phishing, and Email Scams

Cybersecurity Blog

Tag: Mailgun phishing abuse

How Scareware Emails Now Push Legitimate Subscriptions

January 8, 2026 Anurag GawandeLeave a comment

Introduction

“Cloud Storage Full” phishing emails have been circulating for years, exploiting a simple but effective fear, the risk of losing personal data. While the lure itself hasn’t changed much, the way these scams make money has evolved significantly.

Earlier versions of this scam typically pushed users toward fake login pages or outright fraudulent payment forms. What’s increasingly being observed now is a more subtle and harder to detect approach manipulating users into paying for legitimate products through deceptive redirection and affiliate abuse.

This blog walks through a recent phishing email that abuses trusted infrastructure end to end, starting from a scareware email, moving through Google Cloud hosted landing pages and fake Cloudflare verification, and ultimately landing on a legitimate McAfee checkout page. It also ties this activity to a previously observed TotalDrive “storage full” scam, showing this is not an isolated incident but part of a broader trend.

The Phishing Email

The email claims that the recipient’s cloud account has been blocked and warns that photos and videos will be removed unless immediate action is taken. The wording is deliberately alarming and designed to create panic rather than clarity.

There is no mention of a real cloud provider, no account identifiers, and no prior context. Instead, the message relies entirely on urgency payment failure, account suspension, and imminent data loss to push the recipient toward clicking the embedded link.

Email Header Observations

The email was delivered via Mailgun, a widely used email service provider that is often abused for large scale phishing and affiliate scams.

Redirect Chain Analysis

Google Cloud Storage as the First Landing Page
Clicking the link in the email redirects the user to a page hosted on Google Cloud Storage.

Using a trusted Google domain helps attackers bypass URL reputation checks and lowers user suspicion.

Fake Cloudflare CAPTCHA Gate

Before reaching the final destination, the user is presented with a Cloudflare CAPTCHA and security check. The page displays fake scan progress and reassuring messages indicating the URL is safe.

This step serves multiple purposes. It filters automated scanners, delays analysis, and reinforces the illusion of legitimacy. This behavior closely matches what is commonly seen in Traffic Distribution Systems (TDS) used by modern phishing operations.

Intermediate Landing Page: Fake “Cloud Billing” Portal (DigitalOcean Spaces)

After clicking the link in the email, the redirection chain leads to an intermediate page hosted on DigitalOcean Spaces:

hxxps://bbb6565u5gg.sfo3.digitaloceanspaces.com/cloud_billing_v6z.html

This page presents itself as a cloud billing or subscription status portal, using generic “Cloud” branding rather than naming any real provider.

The page includes fabricated subscription details such as a storage plan size and an expiration date, creating the illusion of a real account state. None of this information is personalized or verifiable it exists purely to reinforce the scareware narrative introduced in the email.

From a technical perspective, hosting this page on DigitalOcean Spaces provides the same advantages seen elsewhere in this campaign, trusted infrastructure, HTTPS by default, and low friction for rapid deployment and rotation.

Transition to Monetization: Redirect to McAfee via Affiliate Link

Clicking “Renew Now”does not collect credentials or payment details on this page. Instead, it immediately redirects the user to a legitimate McAfee checkout page offering McAfee+ Advanced – Individual.

At first glance, everything appears legitimate, HTTPS, real branding, and a genuine payment flow. However, a closer look at the URL reveals multiple affiliate tracking parameters, including values such as affid, cjevent, and PID.

These parameters confirm that the redirect is intentional and monetized. Each completed purchase likely generates affiliate commission for the attacker. No card skimming occurs the victim enters payment details directly on McAfee’s site but the purchase itself was induced through deception.

A Familiar Pattern: The TotalDrive “Storage Full” Scam

This technique isn’t new.

A similar “storage full” phishing flow was previously documented by me on X, where victims were redirected to secure[.]totaldrive[.]com after interacting with fake iCloud warnings.

Fake Cloud Storage Full email. Clicking the link triggers multiple redirects:
storage[.googleapis[.com to bestqualityleadss[.]shop
Victims are shown a fake Drive Full & Upgrade Now page leading to secure.totaldrive[.]com to push paid storage.
misleading ads. #Phishing #scam… pic.twitter.com/fHODjA96Nd

— Anurag (@Malwarehunterr) December 17, 2025

What These Campaigns Have in Common

Across both the McAfee and TotalDrive scams, the same elements appear repeatedly. Users are confronted with fake cloud warnings, routed through trusted platforms, reassured by fake security checks, and ultimately pushed toward legitimate checkout pages. At no point are credentials stolen instead, users are manipulated into making payments they never intended to make.

Attack Flow

This campaign abuses legitimate services at every stage, email delivery platforms, cloud hosting, security branding, and affiliate marketing systems. The abuse lies not in any single component, but in how they are chained together to mislead the user.

Email Infrastructure

Sending IP – 193.24.209.200

Email Service Provider – Mailgun (legitimate ESP abused for phishing)

Observed Header Indicators

  • X-Mailgun-Tag: post
  • X-Mailgun-Track-Clicks: false

Sender Domain Pattern – *.xenravo.biz.ua

Phishing And Staging URLs

Google Cloud Storage

hxxps://storage.googleapis.com/sndrr/nobotgogomailbali_v2.html

DigitalOcean Spaces – Fake Cloud Billing Page

hxxps://bbb6565u5gg.sfo3.digitaloceanspaces.com/cloud_billing_v6z.html

Redirect And Tracking Indicators

Affiliate / Tracking Parameters Observed

affid
cjevent
PID
SID
csrc=cj
clickid
lptoken

These parameters confirm affiliate-based monetization rather than credential harvesting.

Final Monetization Endpoint

McAfee Checkout

hxxps://www.mcafee/.com/en-us/ipz/feyncart/2web/payment.html?culture=en-us&moguid=c4b71670-79cc-49cd-bc1e-69f1a705e26c&tm_local_cart_ab_test_variant=tn_xs_small_screen_pop-up_q3_23&ccpubn=en-us:direct:aff:mai&SID=882390700&cjevent=113666eaebd511f0836900670a82b820&affid=1494&csrc=cj&csrcl2=The+Affiliati+Network%2C+LLC&ccoe=direct&ccoel2=am&ccstype=partnerlinks_113666eaebd511f0836900670a82b820&CID=242012&PID=101616859
Find me on LinkedIn
Follow me on X


Contact: anurag@malwr-analysis.com

Translate

  • Agent Tesla
  • Android
  • Arechclient2
  • Crimson RAT
  • Crypto Scam
  • Email Scam
  • Malware Analysis
  • NanoCore
  • njRAT
  • Phishing Emails
  • Phishing Sites
  • sectopRAT
  • Sextortion Email
  • Fake Windows Update and BSOD Alerts Used in a Tech Support Scam
  • How Scareware Emails Now Push Legitimate Subscriptions
  • Analysis of a Fake Cloudflare Turnstile Used as a Traffic Filtering Gate
  • Large-Scale Parasite SEO Campaign Using Amazon Style Pages on Cloudflare Pages
  • Fake WordPress Domain Renewal Phishing Email Stealing Credit Card And 3-D Secure OTP
  • January 2026
  • December 2025
  • August 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • August 2024
  • May 2024
  • March 2024
  • August 2021
  • September 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • August 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
Follow Malware Analysis, Phishing, and Email Scams on WordPress.com

Blog Stats

  • 79,215 hits
Website Powered by WordPress.com.
Back to top

 

Loading Comments...