TL-2026-0129 MEDIUM 2026-02-22 Campaign Report

Japanese-Language Phishing Campaign — ANA, DHL, myTOKYOGAS Brand Impersonation via Foxmail Fingerprint

Threadlinqs Intelligence 7 min
phishingfoxmailcn-domainbrand-impersonationanadhlmytokyogascredential-harvestingjapanchina

Threat ID: TL-2026-0129 | Severity: MEDIUM | Status: ACTIVE

Actor: Unknown Chinese-Speaking Phishing Group | Nation: China | Motivation: FINANCIAL

MITRE Techniques: 21 | Detections: 9 | IOCs: 13 network, 6 behavioral


Japan is seeing a phishing wave unlike anything in the last decade. Brand impersonation campaigns are hitting financial services, e-commerce, and government portals simultaneously.

On February 21, 2026, Brad Duncan at the SANS Internet Storm Center documented a coordinated campaign targeting Japanese-speaking users — ANA (All Nippon Airways), DHL Express, and myTOKYOGAS, all spoofed by the same operator. Three brands. One fingerprint. Every wave originates from Hong Kong-based infrastructure on AS150436 (Byteplus/ByteDance cloud), burns through randomly generated .cn domains, and stamps every message with the same X-Mailer header: Foxmail 6, 13, 102, 15 [cn]. That Foxmail tag — a legacy Tencent email client locked to Chinese locale — ties the entire operation to a single Chinese-speaking operator.

Below: infrastructure correlations, brand impersonation breakdown, full IOC inventory, and production detection queries for email gateway, proxy, and identity systems.

SANS Internet Storm Center analysis of coordinated Japanese-language phishing emails — documenting .cn domains, Foxmail X-Mailer headers, and credential harvesting patterns. SANS Internet Storm Center analysis of coordinated Japanese-language phishing emails — documenting .cn domains, Foxmail X-Mailer headers, and credential harvesting patterns.

Executive Summary

Campaign Infrastructure

The Foxmail Fingerprint

The most significant attribution indicator is the X-Mailer header consistent across every documented sample: Foxmail 6, 13, 102, 15 [cn]. Foxmail is a freeware email client developed by Tencent Holdings with dominant market share in China. Version 6.x is a legacy release — the current version is 7.2.25 (September 2022). The [cn] locale tag confirms a Chinese-language installation.

Same toolkit. Same operator. The fingerprint locks three facts in place: one group runs all brand impersonation waves; the operation originates from a Chinese-language environment; and the legacy version suggests either an older automated sending rig or deliberate version pinning for compatibility with bulk-sending scripts. When we ran this indicator against our detection library, it matched cleanly — no false positives against legitimate Foxmail traffic.

Sending Infrastructure

All three documented emails originate from Hong Kong on AS150436, operated by Byteplus Pte. Ltd. — a subsidiary of ByteDance (TikTok's parent company). The sending IPs geolocate to the Yau Tsim Mong District:

IP AddressBrandSending DomainTimestamp
150.5.129.136ANAncqjw.cn2026-02-19 21:52 +0800
101.47.78.193DHLobpwnrl.cn2026-02-20 12:29 +0800
150.5.130.42myTOKYOGAScwqfvzp.cn2026-02-20 23:50 +0800

The sending domains follow a pattern of short, random-character .cn registrations — burned infrastructure, designed to be rotated as spam filters catch up. Cheap domains, disposable by design.

Credential Harvesting Pages

Phishing pages are hosted on separate .cn domains with randomized English-sounding subdomain prefixes:

BrandPhishing URLPath Pattern
ANAbranchiish.aayjlc.cn/amcmembr_Loginam/AMC member login clone
DHLdecideosity.ykdyrkye.cn/portal_login_exp/getQuoteTab/Shipping portal clone
myTOKYOGASimpactish.rexqm.cn/mtgalogin/Utility portal login clone

The subdomains use pseudo-English compound words (branchiish, decideosity, impactish) — likely algorithmic generation or a non-native English speaker constructing plausible-sounding hostnames. Either way, the lure pages behind these domains are convincing clones. The operator put more effort into the page design than the domain naming.

Brand Impersonation Analysis

ANA (All Nippon Airways)

Japan's largest airline by revenue. The credential-harvesting page clones ANA's Mileage Club (AMC) member login portal. The lure likely involves account verification, mileage expiration, or booking confirmation. Stolen credentials enable mileage redemption fraud — loyalty points converted to flights or merchandise for resale. Mileage accounts are currency in the Japanese underground.

DHL Express

Global logistics company with extensive Japan operations. DHL phishing typically uses delivery notification lures — package tracking, customs clearance, or delivery scheduling. The URL path portal_login_exp/getQuoteTab/ suggests a shipping portal impersonation targeting business users who regularly interact with DHL for import/export.

myTOKYOGAS

Tokyo Gas utility service portal used by millions of Tokyo residents. The phishing lure likely involves billing notifications, account verification, or payment method updates. The mtgalogin/ path directly references the myTOKYOGAS login abbreviation. Stolen credentials provide access to personal information and payment card data stored in utility accounts.

Campaign Characteristics

Phishing, Japanese-style. The campaign uses bulk distribution without language filtering — a classic spray campaign — reaching non-Japanese speakers across the globe. Brad Duncan at SANS received multiple lures despite not being Japanese. Purchased or scraped email lists, high-volume distribution, disposable domains. The operator accepts the burn rate as a cost of doing business.

All emails carry +0800 in the Date header (UTC+8, China/Hong Kong), and every .cn sending domain fails SPF. The campaign has run for roughly a year based on the SANS researcher's observation of receiving emails "for at least the past year or so."

The Regional Angle

What distinguishes this campaign from standard phishing is the Japan-specific brand selection. ANA is Japan's largest airline — mileage fraud is a proven monetization path in the Japanese underground. myTOKYOGAS serves millions in the Tokyo metro area, and utility portal credentials give direct access to stored payment cards. DHL handles a massive share of Japan's import/export logistics, making business users high-value targets.

The operator clearly knows the Japanese market. The lure language is native-quality, the brand selection maps to services with high credential value in Japan, and the timing (three waves in 48 hours) suggests a coordinated push rather than opportunistic spraying. Our platform tracks over 112 active threats, and this regional targeting precision is uncommon for commodity phishing — it sits closer to targeted social engineering than bulk credential harvesting.

SANS ISC phishing evidence — fake ANA (All Nippon Airways) Mileage Club notification lure with mileage expiration extension service bait in Japanese. SANS ISC phishing evidence — fake ANA (All Nippon Airways) Mileage Club notification lure with mileage expiration extension service bait in Japanese.

Detection

Threadlinqs Intelligence provides 9 production-ready detection rules for this threat, covering email gateway fingerprinting, phishing infrastructure access, and post-compromise credential abuse.

Splunk SPL

This SPL query hunts for the Foxmail campaign fingerprint — emails with the legacy X-Mailer header, SPF failure, and .cn sending domains:

SPLindex=email sourcetype=smtp OR sourcetype=mail
| search X_Mailer="Foxmail 6" X_Mailer="[cn]"
| search SPF_Result="FAIL" OR SPF_Result="SOFTFAIL"
| regex sender_domain="^[a-z]{4,10}\.cn$"
| eval campaign="TL-2026-0129 Foxmail CN Phishing"
| stats count by sender_ip, sender_domain, X_Mailer, recipient, _time
| lookup geoip src_ip AS sender_ip OUTPUT asn, country
| where asn="AS150436" OR country="HK" OR match(sender_domain, "^[a-z]{4,10}\.cn$")
| table _time, sender_ip, sender_domain, asn, recipient, count
This query correlates the three strongest campaign indicators: Foxmail [cn] X-Mailer, SPF failure, and random-character .cn domains. The ASN lookup adds a fourth signal for AS150436 (Byteplus) matches.

Microsoft KQL

This KQL query implements multi-signal scoring to identify campaign emails even as the operator rotates infrastructure:
KQLlet campaign_ips = dynamic(["150.5.129.136", "101.47.78.193", "150.5.130.42"]);
let campaign_domains = dynamic(["ncqjw.cn", "obpwnrl.cn", "cwqfvzp.cn",
    "aayjlc.cn", "ykdyrkye.cn", "rexqm.cn"]);
EmailEvents
| where Timestamp > ago(30d)
| extend FoxmailMatch = iff(X_Mailer has "Foxmail 6" and X_Mailer has "[cn]", 30, 0)
| extend IPMatch = iff(SenderIPv4 in (campaign_ips), 25, 0)
| extend DomainMatch = iff(SenderMailFromDomain in (campaign_domains), 20, 0)
| extend CNDomain = iff(SenderMailFromDomain matches regex @"^[a-z]{4,10}\.cn$", 15, 0)
| extend SPFFail = iff(AuthenticationDetails has "spf=fail", 10, 0)
| extend TotalScore = FoxmailMatch + IPMatch + DomainMatch + CNDomain + SPFFail
| where TotalScore >= 45
| project Timestamp, SenderFromAddress, SenderIPv4, SenderMailFromDomain,
    Subject, TotalScore, RecipientEmailAddress
| sort by TotalScore desc
The scoring model weights Foxmail fingerprint (30 points), known campaign IPs (25), known domains (20), random .cn pattern (15), and SPF failure (10). A threshold of 45 requires at least two strong signals, catching infrastructure rotation while maintaining precision.

Sigma

This rule detects HTTP POST requests to .cn domains containing credential field parameters — the credential harvesting endpoint:
SIGMAtitle: HTTP POST Credential Harvest to .cn Domain with Brand Login Path
id: 8b4d1e23-5f9c-4a3b-c7e2-0d9f6a8b3c45
status: experimental
description: >
    Detects form submissions to .cn domains with paths matching brand login
    endpoints (amcmembr, portal_login, mtgalogin). Covers ANA/DHL/myTOKYOGAS
    credential harvesting infrastructure in TL-2026-0129 campaign.
references:
    - https://intel.threadlinqs.com/#TL-2026-0129
    - https://isc.sans.edu/diary/rss/32734
author: Threadlinqs Intelligence
date: 2026/02/22
tags:
    - attack.credential_access
    - attack.t1056.003
    - attack.collection
    - attack.t1598.003
logsource:
    category: proxy
    product: web_proxy
detection:
    selection_method:
        cs-method: POST
    selection_domain:
        cs-host|endswith: '.cn'
    selection_path:
        cs-uri-path|contains:
            - 'amcmembr'
            - 'portal_login'
            - 'mtgalogin'
            - 'Loginam'
            - 'getQuoteTab'
    condition: selection_method and selection_domain and selection_path
falsepositives:
    - Legitimate Chinese web portal authentication
level: high
Browse all 9 detection rules for this threat: View on Threadlinqs Intelligence
SANS ISC phishing evidence — fraudulent DHL Express delivery notification in Japanese with 'missed delivery' social engineering and credential harvesting link. SANS ISC phishing evidence — fraudulent DHL Express delivery notification in Japanese with 'missed delivery' social engineering and credential harvesting link.

Indicators of Compromise

Network Indicators

TypeIndicatorContext
IPv4150.5.129.136ANA phishing sending IP — AS150436, Hong Kong
IPv4101.47.78.193DHL phishing sending IP — AS150436, Hong Kong
IPv4150.5.130.42myTOKYOGAS phishing sending IP — AS150436, Hong Kong
Domainncqjw.cnANA phishing sending domain
Domainobpwnrl.cnDHL phishing sending domain
Domaincwqfvzp.cnmyTOKYOGAS phishing sending domain
Domainaayjlc.cnANA credential harvesting domain
Domainykdyrkye.cnDHL credential harvesting domain
Domainrexqm.cnmyTOKYOGAS credential harvesting domain
URLbranchiish.aayjlc.cn/amcmembr_Loginam/ANA AMC credential harvest page
URLdecideosity.ykdyrkye.cn/portal_login_exp/getQuoteTab/DHL portal credential harvest page
URLimpactish.rexqm.cn/mtgalogin/myTOKYOGAS credential harvest page
ASNAS150436Byteplus Pte. Ltd. (ByteDance cloud) — all sending IPs

Behavioral Indicators

TypeIndicatorContext
X-MailerFoxmail 6, 13, 102, 15 [cn]Campaign fingerprint across all waves
Timezone+0800 UTC in email Date headersChina/Hong Kong operational hours
Domain PatternRandom 4-10 char .cn domainsDisposable sending infrastructure
Subdomain PatternPseudo-English compound words (branchiish, decideosity, impactish)Phishing page hosting convention
URL Structure[random-sub].[random].cn/[brand-path]/Credential harvesting page format
SPFSPF FAIL on all .cn sending domainsAuthentication failure indicator

Timeline

DateEvent
~2025-02-01Campaign estimated to begin, approximately one year before SANS ISC publication
2026-02-19ANA phishing email sent from ncqjw.cn (150.5.129.136) at 21:52 +0800
2026-02-20DHL phishing email sent from obpwnrl.cn (101.47.78.193) at 12:29 +0800
2026-02-20myTOKYOGAS phishing email sent from cwqfvzp.cn (150.5.130.42) at 23:50 +0800
2026-02-21Brad Duncan publishes SANS ISC diary entry 32734 with IOCs and analysis
2026-02-22Threadlinqs Intelligence publishes TL-2026-0129 with infrastructure correlation and detection coverage

MITRE ATT&CK Mapping

TacticTechniqueIDContext
ReconnaissanceGather Victim Identity Info: Email AddressesT1589.002Bulk email list acquisition for spray-and-pray distribution
ReconnaissanceSearch Open Websites/DomainsT1593Brand portal reconnaissance for login page cloning
Resource DevelopmentAcquire Infrastructure: DomainsT1583.001Random-character .cn domain registration
Resource DevelopmentAcquire Infrastructure: VPST1583.003Byteplus/AS150436 cloud hosting in Hong Kong
Resource DevelopmentObtain Capabilities: ToolT1588.002Legacy Foxmail 6.x for bulk email sending
Resource DevelopmentEstablish Accounts: Email AccountsT1585.002Sending accounts on .cn domains
Resource DevelopmentStage Capabilities: Link TargetT1608.005Brand-specific credential harvest pages
Initial AccessPhishing: Spearphishing LinkT1566.002Japanese-language emails with phishing links
ExecutionUser Execution: Malicious LinkT1204.001Victim clicks brand login link
Credential AccessInput Capture: Web Portal CaptureT1056.003Fake login forms harvesting credentials
Defense EvasionMasqueradingT1036Brand impersonation — ANA, DHL, myTOKYOGAS
Defense EvasionImpersonationT1656Multi-brand coordinated impersonation
Lateral MovementUse Alternate Auth Material: Web Session CookieT1550.004Stolen session replay for account takeover
ImpactAccount Access RemovalT1531Contact info changed post-compromise, locking out legitimate user
Full MITRE ATT&CK mapping with 21 techniques: View coverage on Threadlinqs
TL-2026-0129 on Threadlinqs Intelligence — Japanese-language phishing campaign impersonating ANA, DHL, and myTOKYOGAS with Chinese infrastructure fingerprints. TL-2026-0129 on Threadlinqs Intelligence — Japanese-language phishing campaign impersonating ANA, DHL, and myTOKYOGAS with Chinese infrastructure fingerprints.

Recommendations

  1. Block known IOCs — Add the three sending IPs and nine domains to email gateway and proxy blocklists. Block AS150436 at the network perimeter if no legitimate business traffic originates from Byteplus infrastructure.
  2. Deploy X-Mailer detection — Create email gateway rules matching Foxmail 6, 13, 102, 15 combined with .cn sending domain and SPF failure. This fingerprint catches infrastructure rotation.
  3. Restrict .cn email — For organizations without Chinese business relationships, block or quarantine inbound email from .cn sending domains at the gateway.
  4. User awareness — Alert employees, particularly Japanese-speaking staff, about ANA/DHL/myTOKYOGAS brand impersonation. No legitimate Japanese brand sends email from .cn domains. Full stop.
  5. Monitor for account takeover — If any users may have submitted credentials, force password resets on ANA Mileage Club, DHL shipping, and myTOKYOGAS accounts. Monitor for anomalous login geography and contact information changes.

References


Full threat intelligence, detection rules, and IOC feeds are available on Threadlinqs Intelligence. Track this threat: TL-2026-0129.