Skip to content
.ca
4 minmedium

Xiaomi Phishing Attempt - Red Flags You Can't Afford to Ignore

A recent phishing campaign targets Xiaomi users by impersonating corporate HR communications regarding a new certification. The emails contain masked hyperlinks that redirect victims to a convincing replica of the Xiaomi login portal designed to harvest account credentials.

Conf:highAnalyzed:2026-03-26reports

Authors: Exequiel Ortega

Source:Cofense

IOCs · 3

Key Takeaways

  • Threat actors are impersonating Xiaomi HR/IT to steal user credentials via targeted phishing emails.
  • The phishing email uses a fake 'new certification' lure with a 24-hour urgency deadline to pressure victims.
  • The malicious link is masked behind a legitimate-looking Xiaomi URL but redirects to a compromised or malicious domain (amolikhousing.co.in).
  • The landing page is a highly convincing, visually accurate replica of the Xiaomi 'Mi Account' login portal.

Affected Systems

  • Xiaomi Accounts
  • Email Users

Attack Chain

The attacker sends a phishing email impersonating Xiaomi HR, claiming the user has a new certification to review within 24 hours. The email contains a masked hyperlink that visually appears to point to a legitimate Xiaomi administrative portal. When clicked, the victim is redirected to a malicious domain hosting a fake Xiaomi 'Mi Account' login page. If the user enters their credentials, the data is captured and sent directly to the threat actors.

Detection Availability

  • YARA Rules: No
  • Sigma Rules: No
  • Snort/Suricata Rules: No
  • KQL Queries: No
  • Splunk SPL Queries: No
  • EQL Queries: No
  • Other Detection Logic: No

The article does not provide specific detection rules but highlights visual and structural indicators of the phishing email and landing page for manual identification.

Detection Engineering Assessment

EDR Visibility: None — This is a purely web-based and email-based credential harvesting attack; no endpoint malware is executed. Network Visibility: Medium — Network logs (DNS, proxy, web filter) can detect traffic to the malicious domain, but the traffic itself is HTTPS encrypted. Detection Difficulty: Moderate — The phishing page is hosted on a likely compromised legitimate domain, and the email uses convincing social engineering, making it difficult for standard filters to block without robust URL analysis.

Required Log Sources

  • Email Gateway Logs
  • DNS Query Logs
  • Web Proxy Logs

Hunting Hypotheses

HypothesisTelemetryATT&CK StageFP Risk
Users are receiving emails from the .tz top-level domain containing links to unrelated third-party domains.Email Gateway LogsInitial AccessLow
Internal users are navigating to the domain amolikhousing.co.in, specifically the /XIAOMI/ URI.Web Proxy LogsCredential AccessLow

Control Gaps

  • Basic Email Filtering
  • User Awareness

Key Behavioral Indicators

  • Mismatch between visible hyperlink text and actual destination URL in emails
  • Emails originating from unexpected TLDs (e.g., .tz) impersonating corporate entities

False Positive Assessment

  • Low

Recommendations

Immediate Mitigation

  • Block the domain amolikhousing.co.in and the sender backing@ocode.or.tz at the email gateway and web proxy.
  • Search email logs for the subject line '[EXT] Xiaomi : HR Case HR00FR6026344' and purge matching emails from user inboxes.

Infrastructure Hardening

  • Implement advanced email filtering that analyzes URL redirects and masked hyperlinks.
  • Enforce multi-factor authentication (MFA) on all corporate accounts to mitigate the impact of stolen credentials.

User Protection

  • Deploy password managers to help users identify fake login pages, as password managers will not auto-fill credentials on mismatched domains.

Security Awareness

  • Train users to hover over links to verify the actual destination URL before clicking.
  • Educate employees on the red flags of urgent HR or IT requests, especially those enforcing tight deadlines (e.g., 24 hours).

MITRE ATT&CK Mapping

  • T1566.002 - Phishing: Spearphishing Link

Additional IOCs

  • Domains:
    • ocode[.]or[.]tz - Sender domain used in the phishing campaign.
  • Urls:
    • hxxps://gl[.]xms[.]be[.]xiaomi[.]com/admin/crt!main.action#cp/ - Decoy URL used as the masked hyperlink text in the email body to appear legitimate.
  • Other:
    • Chai Chanjuan - Sender display name used in the phishing email.
    • [EXT] Xiaomi : HR Case HR00FR6026344 - Subject line of the phishing email.