top of page

Threat Brief: Valentine's Day Phishing Sweep

  • Writer: Patrick Duggan
    Patrick Duggan
  • Feb 14
  • 2 min read

# Threat Brief: Valentine's Day Phishing Sweep


**Date**: February 14, 2026

**Classification**: Pattern 38 Detection

**Report ID**: DUSA-2026-0214-PHISH-001


Executive Summary



During our evening security sweep, Oz decisions flagged a coordinated GitHub Pages phishing campaign. Six accounts, two created within the last seven days, were actively serving credential harvesting pages impersonating Amazon, Netflix, and Instagram.


Three minutes from account creation to live phishing page. Evidence cleanup observed yesterday. These aren't script kiddies learning HTML.


The Campaign



| Account | Created | Target | Evidence |

|---------|---------|--------|----------|

| laibadev01 | Feb 12 (2 days) | Amazon | 3-minute automated deployment |

| poojitha-teella | Feb 7 (1 week) | Amazon | Deleted `amazonecode.html` yesterday |

| sumitkumar4010 | Oct 2025 | Amazon | Template farm - 14 repos |

| kumaraswamybommali | Oct 2025 | Amazon | Clone repo |

| n97-m | Apr 2025 | Instagram | Login page replica |

| sudhan-blip | Mar 2021 | Netflix | Oldest - possibly compromised |


Technical Indicators



The laibadev01 deployment was particularly notable:

- Repository created: 2026-02-12T23:21:39Z

- First push: 2026-02-12T23:24:30Z

- **Time delta: 3 minutes**


That's automated infrastructure. Someone has a pipeline that spins up GitHub accounts, creates repos, and deploys phishing pages faster than you can order pizza.


The page content included classic tells: "amazon.inn" typo, Amazon branding, "Hello, sign in" prompt with credential fields.


Response



1. **Report Sent**: [email protected] received full technical report via Graph API

2. **IOCs Published**: 6 URLs added to our STIX feed for customer protection

3. **Pattern 38 Tagged**: Campaign tracked for correlation analysis


What This Means



GitHub Pages is free hosting with HTTPS certificates and a trusted domain. Perfect for phishing. The 2-day-old account with evidence deletion happening *yesterday* tells us this is active, maintained infrastructure.


When poojitha-teella deleted `amazonecode.html` on February 13, they weren't abandoning the campaign. They were cleaning up. The phishing page is still live.


Vercel Too



Same campaign is using Vercel for additional infrastructure:

- `amazonclone-two-gamma.vercel.app`

- `amazon-clone-khaki-eight.vercel.app`

- `amazon-clone-inceptioncodes.vercel.app`


Separate report queued.


For STIX Feed Consumers



These IOCs are now in our feed with tags:

- `pattern-38`

- `github-pages`

- `credential-harvesting`

- `amazon-impersonation` / `netflix-impersonation` / `instagram-impersonation`


Campaign ID: `github-pages-phishing-2026-02-14`




*47+ malware/phishing accounts reported. 30+ confirmed suspensions. The nets catch things.*


*Happy Valentine's Day.*





*Her name was Renee Nicole Good.*


*His name was Alex Jeffery Pretti.*

 
 
 

Comments

Rated 0 out of 5 stars.
No ratings yet

Add a rating
bottom of page