Xiaomi Phishing Attempt - Red Flags You Can't Afford to Ignore
A recent phishing campaign targets Xiaomi users by impersonating corporate HR communications regarding a new certification. The emails contain masked hyperlinks that redirect victims to a convincing replica of the Xiaomi login portal designed to harvest account credentials.
Authors: Exequiel Ortega
Source:
Cofense
- domainwww[.]amolikhousing[.]co[.]inDomain hosting the credential harvesting page.
- emailbacking@ocode.or.tzSender email address used to distribute the phishing lures.
- urlhxxps://www[.]amolikhousing[.]co[.]in/XIAOMI/Malicious landing page hosting the fake Xiaomi credential harvesting portal.
Key Takeaways
- Threat actors are impersonating Xiaomi HR/IT to steal user credentials via targeted phishing emails.
- The phishing email uses a fake 'new certification' lure with a 24-hour urgency deadline to pressure victims.
- The malicious link is masked behind a legitimate-looking Xiaomi URL but redirects to a compromised or malicious domain (amolikhousing.co.in).
- The landing page is a highly convincing, visually accurate replica of the Xiaomi 'Mi Account' login portal.
Affected Systems
- Xiaomi Accounts
- Email Users
Attack Chain
The attacker sends a phishing email impersonating Xiaomi HR, claiming the user has a new certification to review within 24 hours. The email contains a masked hyperlink that visually appears to point to a legitimate Xiaomi administrative portal. When clicked, the victim is redirected to a malicious domain hosting a fake Xiaomi 'Mi Account' login page. If the user enters their credentials, the data is captured and sent directly to the threat actors.
Detection Availability
- YARA Rules: No
- Sigma Rules: No
- Snort/Suricata Rules: No
- KQL Queries: No
- Splunk SPL Queries: No
- EQL Queries: No
- Other Detection Logic: No
The article does not provide specific detection rules but highlights visual and structural indicators of the phishing email and landing page for manual identification.
Detection Engineering Assessment
EDR Visibility: None — This is a purely web-based and email-based credential harvesting attack; no endpoint malware is executed. Network Visibility: Medium — Network logs (DNS, proxy, web filter) can detect traffic to the malicious domain, but the traffic itself is HTTPS encrypted. Detection Difficulty: Moderate — The phishing page is hosted on a likely compromised legitimate domain, and the email uses convincing social engineering, making it difficult for standard filters to block without robust URL analysis.
Required Log Sources
- Email Gateway Logs
- DNS Query Logs
- Web Proxy Logs
Hunting Hypotheses
| Hypothesis | Telemetry | ATT&CK Stage | FP Risk |
|---|---|---|---|
| Users are receiving emails from the .tz top-level domain containing links to unrelated third-party domains. | Email Gateway Logs | Initial Access | Low |
| Internal users are navigating to the domain amolikhousing.co.in, specifically the /XIAOMI/ URI. | Web Proxy Logs | Credential Access | Low |
Control Gaps
- Basic Email Filtering
- User Awareness
Key Behavioral Indicators
- Mismatch between visible hyperlink text and actual destination URL in emails
- Emails originating from unexpected TLDs (e.g., .tz) impersonating corporate entities
False Positive Assessment
- Low
Recommendations
Immediate Mitigation
- Block the domain amolikhousing.co.in and the sender backing@ocode.or.tz at the email gateway and web proxy.
- Search email logs for the subject line '[EXT] Xiaomi : HR Case HR00FR6026344' and purge matching emails from user inboxes.
Infrastructure Hardening
- Implement advanced email filtering that analyzes URL redirects and masked hyperlinks.
- Enforce multi-factor authentication (MFA) on all corporate accounts to mitigate the impact of stolen credentials.
User Protection
- Deploy password managers to help users identify fake login pages, as password managers will not auto-fill credentials on mismatched domains.
Security Awareness
- Train users to hover over links to verify the actual destination URL before clicking.
- Educate employees on the red flags of urgent HR or IT requests, especially those enforcing tight deadlines (e.g., 24 hours).
MITRE ATT&CK Mapping
- T1566.002 - Phishing: Spearphishing Link
Additional IOCs
- Domains:
ocode[.]or[.]tz- Sender domain used in the phishing campaign.
- Urls:
hxxps://gl[.]xms[.]be[.]xiaomi[.]com/admin/crt!main.action#cp/- Decoy URL used as the masked hyperlink text in the email body to appear legitimate.
- Other:
Chai Chanjuan- Sender display name used in the phishing email.[EXT] Xiaomi : HR Case HR00FR6026344- Subject line of the phishing email.
Related
- Punchbowl Phishing Attack Explained: How Digital Invites Are Used to Steal Credentials·3
- Steal Smarter, Not Harder: Malicious use of Vercel for Credential Phishing·2
- Quasar Linux (QLNX) – A Silent Foothold in the Supply Chain: Inside a Full-Featured Linux RAT With Rootkit, PAM Backdoor, Credential Harvesting Capabilities·2