Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsPNB MetLife Phishing Attack: Multi-Stage Scheme Steals Data, Triggers UPI Payments
PNB MetLife Phishing Attack: Multi-Stage Scheme Steals Data, Triggers UPI Payments
Cybersecurity

PNB MetLife Phishing Attack: Multi-Stage Scheme Steals Data, Triggers UPI Payments

•January 22, 2026
0
GBHackers On Security
GBHackers On Security•Jan 22, 2026

Companies Mentioned

Telegram

Telegram

PhonePe

PhonePe

Why It Matters

The attack converts trusted brand interactions into direct financial loss, exposing a critical vulnerability in the insurance sector’s digital payment ecosystem. It underscores the need for stronger anti‑phishing controls and rapid takedown mechanisms for free‑hosting abuse.

Key Takeaways

  • •Phishing pages hosted on free EdgeOne Pages
  • •Data exfiltrated instantly via Telegram bots
  • •QR codes and clipboard tricks force UPI payments
  • •Advanced template harvests full banking credentials

Pulse Analysis

The rise of mobile‑first phishing exploits reflects a broader shift in cybercrime, where attackers capitalize on the ubiquity of SMS and instant messaging. By deploying counterfeit payment portals on free hosting services, threat actors bypass traditional security vetting and reach victims within seconds of message receipt. This low‑cost infrastructure, combined with real‑time Telegram bot exfiltration, creates a rapid feedback loop that amplifies fraud success rates, especially in markets where UPI payments dominate daily transactions.

Technically, the campaign chains several tactics: unvalidated form fields capture personal and policy data, which is immediately sent to Telegram bots via hard‑coded tokens. JavaScript then renders a UPI URI as a QR code, omitting the amount to compel manual entry, while clipboard‑abuse scripts silently replace copied text with attacker‑controlled UPI IDs. Deep‑link redirects push users into legitimate payment apps, completing the fraudulent transfer without raising suspicion. The second‑stage template adds a credential‑harvesting layer, prompting victims for bank details under the guise of policy updates, thereby expanding the attack from payment fraud to full‑scale financial credential theft.

For insurers and financial institutions, the incident highlights urgent gaps in customer education, channel monitoring, and third‑party hosting oversight. Implementing robust SMS filtering, enforcing multi‑factor authentication for policy changes, and collaborating with hosting providers to block malicious subdomains are essential defenses. Moreover, regulators must consider mandating rapid takedown protocols for phishing kits that exploit free platforms, while law enforcement should prioritize tracking Telegram bot activity to disrupt the exfiltration pipeline. Proactive measures can mitigate both direct monetary loss and reputational damage in an increasingly digitized insurance landscape.

PNB MetLife Phishing Attack: Multi-Stage Scheme Steals Data, Triggers UPI Payments

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...