Forcepoint researchers uncovered a phishing campaign that uses PDF attachments and trusted cloud infrastructure to harvest Dropbox credentials while evading email security controls. The multi-stage attack chain exploits legitimate services including Vercel blob storage and Telegram bots for exfiltration.

Campaign overview

AttributeDetails
DiscoveryForcepoint X-Labs
TargetDropbox credentials
DeliveryPDF attachments via email
HostingVercel blob storage
ExfiltrationTelegram bot API
Data collectedEmail, password, IP, geolocation, device info

Attack chain overview

Email → PDF attachment → Vercel-hosted PDF → Redirect PDF → Fake Dropbox login → Telegram exfiltration

The attack is designed so that no single stage appears malicious, defeating traditional security controls that analyze components in isolation.

Stage-by-stage breakdown

Stage 1: Clean email

Victims receive procurement-themed emails with subjects like:

  • “PO #[number] - Urgent Review Required”
  • “Invoice Attached - Please Confirm”
  • “Document for Your Review”
  • “Tender Submission Request”
  • “Contract Amendment - Signature Required”

The emails contain no links—only a PDF attachment. This bypasses URL scanning and link reputation checks in email security gateways.

Email characteristicSecurity bypass
No embedded URLsURL scanners find nothing
No malware payloadSandbox analysis passes
Legitimate-looking senderSPF/DKIM may pass
Business-relevant subjectUser opens without suspicion

Stage 2: PDF on trusted hosting

The PDF uses an AcroForm object to link to a file hosted on:

public.blob.vercel-storage.com

Vercel’s blob storage is a legitimate service used by thousands of developers. Security tools that check domain reputation see a trusted Microsoft-owned infrastructure provider, not a known malicious host.

PDF techniquePurpose
FlateDecode compressionObscures content from basic scanners
AcroForm objectsEmbeds clickable elements
No JavaScriptAvoids JS-based detection
Clean metadataNo obvious attacker artifacts

Stage 3: Second redirect

The Vercel-hosted file is another PDF with a prominent “DOWNLOAD FILE HERE” button. This additional redirect:

  • Adds another layer of separation from the original email
  • Makes the victim an active participant (clicking download)
  • Creates a sense of legitimate document retrieval
  • Frustrates security tools that analyze single hops

Stage 4: Credential harvesting

The final destination is a convincing Dropbox login page clone. Key features:

ElementPurpose
Pixel-perfect Dropbox UIVisual legitimacy
Pre-filled email fieldUses victim’s email from earlier redirect
5-second delay after submissionMakes “incorrect password” error believable
”Try again” promptEncourages second credential entry
Browser fingerprintingCollects device metadata
SSL certificateShows padlock for false trust

The 5-second delay is particularly effective—it mimics the time a real authentication system would take to validate credentials, making the subsequent “incorrect password” error seem authentic.

Stage 5: Exfiltration via Telegram

Harvested credentials and system metadata are sent to an attacker-controlled Telegram bot. Using Telegram provides:

AdvantageExplanation
Encrypted communicationHard to intercept in transit
Instant notificationAttackers receive credentials immediately
Difficult-to-block infrastructureTelegram is legitimate business tool
No traditional C2 serverNo infrastructure to take down
Anonymous bot creationLow attribution risk
Reliable deliveryEnterprise-grade uptime

Data collected

The phishing page harvests extensive information beyond just credentials:

Data typeCollection method
Email addressForm input
PasswordForm input (often twice)
IP addressServer-side logging
City/countryIP geolocation
Device typeUser-agent parsing
BrowserUser-agent parsing
Screen resolutionJavaScript
TimezoneJavaScript
Referrer chainHTTP headers

This metadata enables attackers to:

  • Prioritize high-value targets
  • Craft follow-up attacks using victim context
  • Identify corporate vs. personal accounts
  • Time account takeover attempts appropriately

Technical indicators

Vercel blob storage patterns:

public.blob.vercel-storage.com/[random-string]

Phishing page characteristics:

  • Dropbox branding with subtle URL differences
  • Form POST to non-Dropbox domain
  • JavaScript delay before error display
  • Browser fingerprinting scripts
  • Missing standard Dropbox footer elements

Telegram exfiltration pattern:

api.telegram.org/bot[token]/sendMessage

Why it’s effective

Traditional DefenseWhy It Fails
Email link scanningNo links in email—only attachment
Attachment sandboxingPDF contains no malware, just a link
URL reputationVercel is a trusted service
Domain blocklistingPhishing pages use fresh domains
User awarenessMulti-step process builds false confidence
Safe links rewritingNo links to rewrite in original email

“A clean PDF is much more likely to get through email security and reach the victim. Malware often triggers alarms, blocks delivery or causes attachments to be quarantined. By avoiding malware and focusing only on credentials theft, the attackers increase the chances that the email is delivered, opened and trusted.” — Hassan Faizan, Senior Security Researcher, Forcepoint

Abuse of legitimate services

The campaign highlights a broader trend: adversaries weaponizing trusted cloud infrastructure to evade detection.

ServiceLegitimate UseAttacker Abuse
Vercel blob storageDeveloper file hostingPhishing redirect hosting
Telegram botsAutomation, notificationsCredential exfiltration
Cloud storage URLsDocument sharingLure delivery
CDN providersContent deliveryMalware hosting
Form servicesSurvey collectionCredential harvesting

Security tools that allowlist major cloud providers inadvertently provide cover for these attacks.

Detection opportunities

Email layer

IndicatorDetection logic
PDF with AcroForm to blob storageFlag external links to cloud storage
Procurement themes from unfamiliar sendersSender reputation + content analysis
Mismatched sender domains and display namesSPF/DMARC alignment checks
PDF-only attachments in financial contextsBehavioral analysis

Network layer

IndicatorDetection logic
Connections to public.blob.vercel-storage.com followed by credential entryCorrelation analysis
Traffic to Telegram API endpoints from non-Telegram applicationsApplication identification
Multiple redirects ending at Dropbox-branded pages not on dropbox.comURL chain analysis
POST requests to non-Dropbox domains with credential-like payloadsDLP inspection

Endpoint layer

IndicatorDetection logic
PDF readers spawning connections to cloud storageProcess behavior monitoring
Browser navigating to Dropbox lookalike domainsURL filtering
Form submissions to recently registered domainsDomain age checks

Recommendations

For security teams

ControlImplementation
Phishing-resistant MFAFIDO2 keys or passkeys for cloud services
PDF inspectionScan AcroForm objects for external links
Cloud service monitoringAlert on unusual blob storage access patterns
Telegram blockingConsider blocking Telegram API if not business-critical
User reportingMake suspicious email reporting easy
Domain age filteringBlock or warn on domains < 30 days old

Email gateway configuration

SettingRecommendation
PDF link extractionEnable deep PDF analysis
Cloud storage link inspectionFollow and analyze destination
Sender reputationWeight heavily for financial themes
Attachment sandboxingExtend timeout for multi-stage analysis

For users

  1. Be suspicious of unexpected document-sharing requests
  2. Verify sender identity through separate channel before opening attachments
  3. Check URLs carefully before entering credentials—look for the real domain
  4. Never re-enter credentials after an “incorrect password” error without verifying the site
  5. Report suspicious emails even if you didn’t click
  6. Use password manager autofill—it won’t fill credentials on fake sites

Similar campaigns

This attack follows a pattern seen across multiple credential harvesting operations:

CampaignHosting abuseTarget
CurrentVercel blob storageDropbox
2025 campaignsFirebase, AWS S3Microsoft 365
2024 campaignsCloudflare R2Google Workspace
OngoingGitHub PagesVarious

The consistent theme: leveraging trusted infrastructure to bypass reputation-based defenses.

Context

This campaign demonstrates the evolution of phishing beyond obvious “click here” attacks. By chaining multiple legitimate services and adding psychological manipulation (the 5-second delay, procurement urgency), attackers create believable scenarios that bypass both technical controls and human judgment.

Organizations should assume that email security alone cannot stop sophisticated phishing. Defense in depth—combining email filtering, endpoint detection, network monitoring, phishing-resistant MFA, and user training—remains essential. The most effective control for credential theft is phishing-resistant authentication that doesn’t rely on passwords at all.