Hackers add email verification to hide phishing from researchers

Written by

Published 10 Apr 2025

Fact checked by

We maintain a strict editorial policy dedicated to factual accuracy, relevance, and impartiality. Our content is written and edited by top industry professionals with first-hand experience. The content undergoes thorough review by experienced editors to guarantee and adherence to the highest standards of reporting and publishing.

Disclosure

person standing near LED sign

Hackers have learned to hide their phishing pages from everyone except their targets. A new phishing technique called “precision-validated credential theft” appeared this week, letting hackers target specific accounts while avoiding security detection.

Security researchers from Cofense Intelligence first spotted this technique on April 9, 2025. It works by checking entered email addresses against lists that hackers already have. If someone types an email address not on their list, they’ll see an error message or get sent to a legitimate website like Wikipedia.

    Cofense Intelligence found two main ways hackers check emails. Some phishing kits integrate legitimate email verification APIs. Others deploy JavaScript-based scripts that ping attacker servers to check if the email matches their pre-made list.

    These attacks create big problems for security teams who normally study phishing by entering test credentials. When phishing pages reject unrecognized emails, this strategy becomes ineffective.

    Even when security experts try using a real target’s email, many campaigns now send verification codes to that person’s inbox, blocking further investigation. This prevents security teams from accessing the actual phishing content.

    Johannes Ullrich from the SANS Institute explained that old detection methods aren’t working against this approach. “This is very difficult to defend against,” he said. “The only real solution is to move away from traditional credentials to phishing-safe authentication methods like Passkeys.”

    The technique also makes sharing threat information harder since not everyone can see the malicious content. URL scanning tools might fail to flag these pages as threats since they look normal to most visitors.

    Security experts suggest companies use behavior analysis and anomaly detection to catch these attacks before they reach users. David Shipley, head of Beauceron Security, stressed how important it is for employees to report suspicious emails, noting, “You can have a false sense of security if you’re running a large enterprise and say, ‘We stopped 950,000 phishing emails this month.’ But the 500 that got through could really sink the battleship.”

    Marie Mamarii from Cofense called the ongoing security battle “a relentless game of cat and mouse” where defenders must constantly adjust to new tricks.

    As attackers improve their methods, security teams must develop new ways to detect these more targeted attacks.