CyberSecurity news

FlagThis

@gbhackers.com //
The Haozi Phishing-as-a-Service (PhaaS) platform has resurfaced, marking a concerning development in the cybercrime landscape. This Chinese-language operation distinguishes itself with its ease of use, comprehensive customer support, and a cartoon mouse mascot, lowering the barrier to entry for aspiring cybercriminals. Haozi provides a "plug-and-play" system, transforming complex phishing campaigns into point-and-click operations accessible to those with minimal technical expertise. The platform boasts a fully automated, web-based control panel, enabling users to manage multiple phishing campaigns, filter traffic, view stolen credentials, and fine-tune attack behavior.

Haozi's business model resembles legitimate software companies, offering a subscription plan and a-la-carte sales. Transactions are conducted using Tether (USDT), with the associated wallet having processed over $280,000 to date. The platform also monetizes the broader attack ecosystem by selling advertising space that connects buyers to third-party services such as SMS gateways. This allows Haozi to act as a middleman, generating revenue not only from phishing kits but also from ancillary services. According to reports, the Haozi platform immediately gained nearly 2,000 followers on Telegram after its initial community on the encrypted messaging app was dismantled.

What sets Haozi apart is its fully automated installation process. Attackers simply input their server credentials into a hosted installation page, and the system automatically deploys a phishing site and admin dashboard, eliminating the need for command-line setup or server configuration. The kits themselves simulate real user experiences, with phishing templates mimicking bank verification and credit card prompts with response logic. For example, after capturing credit card details, the operator may decide to request a 2FA code based on the response received from a card transaction attempt. The resurgence of Haozi highlights the escalating threat presented by PhaaS networks and underscores the need for intensified cybersecurity training programs.
Original img attribution: https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEig4R9ljtWP2u-4c0s5Kwv9BG0GsZ02Ne_bsLkDhPVUmj8di6QoEHkU_v30b_GojuYwH5496CbaH-TcV8caBZCZv9YjDQVqApCjmFlyYL_isc2c_GF4qb-qaLM5zdUF23BvCkYSwoqYeXNoGy_FAUt46CJmbQJxYKCHEQtbP8YnM2A8XN1JzAC5zlsQhAw/s16000/Plug-and-Play.webp
ImgSrc: blogger.googleu

Share: bluesky twitterx--v2 facebook--v1 threads


References :
  • cyberpress.org: Haozi’s Plug-and-Play Phishing Attack Nets Over $280,000 from Victims
  • securityonline.info: Haozi Returns: The Phishing-as-a-Service Platform Making Cybercrime Easy
  • gbhackers.com: Haozi’s Plug-and-Play Phishing Attack Steals Over $280,000 From Users
  • www.scworld.com: Activity of Haozi phishing service surging, report finds
Classification: