Phishers hide scam links with IPv6 trick in “free toothbrush” emails
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得仔细阅读文章,抓住主要信息。 文章讲的是钓鱼邮件伪装成United Healthcare,用免费的Oral-B牙刷作为诱饵。链接隐藏了IPv6地址,看起来复杂但有效。受害者会被引导到一个快速更换的落地页,目的是收集个人信息和信用卡数据,伪装成确认资格或支付运费费。 接下来,安全建议包括立即联系银行、取消卡片、更改密码、运行安全扫描等。还有IOCs和如何使用Malwarebytes检测诈骗。 现在我要把这些要点浓缩到100字以内。确保涵盖钓鱼邮件的目的、链接隐藏技术、攻击目标以及防范措施。 可能的结构:钓鱼邮件伪装成United Healthcare,用免费牙刷诱骗点击链接。链接隐藏IPv6地址,引导到收集个人信息和信用卡数据的页面。建议用户采取行动保护自己,并提供检测工具。 检查字数是否在限制内,并确保语言简洁明了。 </think> 这篇文章揭示了伪装成United Healthcare的钓鱼邮件利用免费Oral-B牙刷作为诱饵,通过隐藏IPv6地址的链接引导受害者到快速更换的落地页,收集个人信息和信用卡数据。建议用户注意可疑邮件并采取防范措施以避免受骗。 2026-3-11 18:17:56 Author: www.malwarebytes.com(查看原文) 阅读量:5 收藏

A recurring lure in phishing emails impersonating United Healthcare is the promise of a free Oral-B toothbrush. But the interesting part isn’t the toothbrush. It’s the link.

two email examples
Two examples of phishing emails

Recently we found that these phishers have moved from using Microsoft Azure Blob Storage (links looking like this:

https://{string}.blob.core.windows.net/{same string}/1.html

to links obfuscated by using an IPv6-mapped IPv4 address to hide the IP in a way that looks confusing but is still perfectly valid and routable. For example:

http://[::ffff:5111:8e14]/

In URLs, putting an IP in square brackets means it’s an IPv6 literal. So [::ffff:5111:8e14] is treated as an IPv6 address.

::ffff:x:y is a standard form called an IPv4-mapped IPv6 address, used to represent an IPv4 address inside IPv6 notation. The last 32 bits (the x:y part) encode the IPv4 address.

So we need to convert 5111:8e14 to an IPv4 address. 5111 and 8e14 are hexadecimal numbers. In theory that means:

  1. 0x5111 in decimal = 20753
  2. 0x8e14 in decimal = 36372

But for IPv4-mapped addresses we really treat that last 32 bits as four bytes. If we unpack 0x51 0x11 0x8e 0x14:

  1. 0x51 = 81
  2. 0x11 = 17
  3. 0x8e = 142
  4. 0x14 = 20

So, the IPv4 address this URL leads to is 81.17.142.20

The emails are variations on a bogus reward from scammers pretending to be United Healthcare that uses a premium Oral‑B iO toothbrush as bait. Victims are sent to a fast‑rotating landing page where the likely endgame is the collection of personally identifiable information (PII) and card data under the guise of confirming eligibility or paying a small shipping fee.

How to stay safe

What to do if you entered your details

If you submitted your card details:

  • Contact your bank or card issuer immediately and cancel the card
  • Dispute any unauthorized charges
  • Don’t wait for fraud to appear. Stolen card data is often used quickly
  • Change passwords for accounts linked to the email address you provided
  • Run a full scan with a reputable security product

Other ways to stay safe:

Indicators of Compromise (IOCs)

81.17.142.40

15.204.145.84

redirectingherenow[.]com

redirectofferid[.]pro


We don’t just report on scams—we help detect them

Cybersecurity risks should never spread beyond a headline. If something looks dodgy to you, check if it’s a scam using Malwarebytes Scam Guard. Submit a screenshot, paste suspicious content, or share a link, text or phone number, and we’ll tell you if it’s a scam or legit. Available with Malwarebytes Premium Security for all your devices, and in the Malwarebytes app for iOS and Android.

About the author

Was a Microsoft MVP in consumer security for 12 years running. Can speak four languages. Smells of rich mahogany and leather-bound books.


文章来源: https://www.malwarebytes.com/blog/scams/2026/03/phishers-hide-scam-links-with-ipv6-trick-in-free-toothbrush-emails
如有侵权请联系:admin#unsafe.sh