Back to reports

Registered Five Minutes Apart With a Rome Address: Inside a Russian-Speaking Actors Italian Banking Phishing Campaign

Two Cloudflare accounts, a high-fidelity FattureWeb clone, a compromised WordPress stager, and a Russian language leak

PublishedApril 3, 2026

When @ShadowOpCode flagged phishing pages impersonating InBank and Intesa Sanpaolo -- two Italian financial institutions -- we expected a commodity phishing kit pointed at Italian users. What we found was a Russian-speaking actor using Italian registrant details, a shared Cloudflare account linking two campaigns definitively, a high-fidelity FattureWeb clone with stolen analytics configurations, and a compromised American ISP's WordPress site as a staging server.

Two Clusters, One Operator

The four phishing domains split into two infrastructure clusters that converge on a single operator:

Cluster A -- Banking (Cloudflare)

  • loginportal-id75328983[.]com (InBank impersonation)
  • auth-login-dashboard[.]com (Intesa Sanpaolo impersonation)

Both registered through Wild West Domains (GoDaddy reseller) five minutes apart with identical Rome, Italy registrant information. Both use the same Cloudflare nameserver pair (edward / galilea) -- confirming a single Cloudflare account.

Cluster B -- Invoice (Keyweb DE)

  • fattureweb-sistem[.]digital (FattureWeb invoice platform clone)
  • wilconetworks[.]net (compromised WordPress staging)

The FattureWeb clone sits on a Keyweb DE server in Germany. The staging path goes through a compromised WordPress installation at wilconetworks[.]net -- a legitimate American ISP operating since 2015 -- exploited via a vulnerable responsive-countdown plugin.

The Russian Connection

The operator's language leaked through an OPSEC failure. The domain dashboard-panel[.]online, found adjacent to the phishing infrastructure, redirects to Google with the HTML language attribute set to lang="ru" -- Russian. The adjacent IP 95.169.191[.]216 hosts mail.ru, bk.ru, and list.ru infrastructure, further confirming a Russian-speaking actor.

An Italian address on the domain registration. Russian in the browser configuration. This is a Russian-speaking operator using fabricated Italian registrant details to add geographic plausibility to their Italian-targeted campaigns.

The FattureWeb Clone

The Intesa Sanpaolo impersonation is basic. The FattureWeb clone is not.

At 23KB of HTML plus seven JavaScript files, it's a high-fidelity reproduction of the legitimate FattureWeb invoice management platform. The clone includes:

  • Stolen Dynatrace RUM configuration -- the Real User Monitoring script from the legitimate site, copied verbatim, which would beacon to the real Dynatrace endpoint and potentially alert the legitimate site owner
  • reCAPTCHA keys from the legitimate site
  • A CSP nonce that Base64-decodes to the string "FATTURE WEB" -- the operator's signature embedded in a security header

The clone is designed to harvest credentials from Italian businesses that use FattureWeb for electronic invoicing -- a mandatory system in Italy since 2019.

Indicators of Compromise

Network Indicators

  • loginportal-id75328983[.]com (InBank phishing)
  • auth-login-dashboard[.]com (Intesa Sanpaolo phishing)
  • fattureweb-sistem[.]digital (FattureWeb clone)
  • wilconetworks[.]net/demo/wp-content/plugins/responsive-countdown/lib/ssl/ (compromised WP staging)
  • dashboard-panel[.]online (operator infrastructure, Russian locale)
  • Cloudflare NS pair: edward / galilea

Detection

Four YARA rules and ten Suricata signatures are available on our GitHub:


h/t @ShadowOpCode for the tips.

Share