Operation Social Undertow: A Phishing Campaign Spoofing the Social Security Administration
Threat actors deploy SimpleHelp RAT via sophisticated SSA phishing.
Written by
Pavel Petrenko
Published on
February 2, 2026
Executive Summary
This multi-stage attack leverages compromised WordPress sites to deliver a SimpleHelp RAT, cloaked as a Social Security statement, after a highly-verified phishing campaign bypasses email security.
The AegisAI Threat Intelligence team has been monitoring an active and sophisticated phishing campaign, dubbed Operation Social Undertow, that is leveraging a network of compromised WordPress sites to help deliver a remote access tool. Characterized by broad-based, indiscriminate targeting, this campaign poses a widespread threat that has been observed impacting enterprise companies across multiple sectors. Discovered on January 7, 2026, the campaign’s primary objective is the deployment of a SimpleHelp Remote Access Client, likely to facilitate data exfiltration or subsequent compromise events.
Key Findings
Metric
Detail
Discovery Date
January 7, 2026
Campaign
Phishing via compromised WordPress instances.
Primary Target
Broad-based, indiscriminate targeting via spoofing a message from the Social Security Administration.
Payload
SimpleHelp Remote Access Client (.exe file).
Sophistication
High. Utilizes Cloudflare TLS fingerprinting to evade automated scanning and analysis of attacker-controlled domains.
Technical Analysis
Unlike traditional credential harvesting phishing kits, this campaign's primary objective is to deliver a malicious executable file (My_Social_Security_eStatement_..._Pdf.exe) to the victim's device using a "drive-by download" technique, followed by a redirection to the legitimate SSA website to minimize suspicion. The attack follows a multi-stage redirection and execution flow:
Phishing Email
Initial Entry Vector (Compromised Site)
Malicious Landing Page
Payload Delivery
Decoy Redirection
1. Phishing Email
The emails are sent from compromised users from trusted domains and are designed to mimic legitimate Social Security Administration communications, using subject lines such as “Your Statement Is Ready for Viewing” or “Discover Your Updated Benefits.”
A. Delivery Status: These emails generally don't get classified as spam by popular email clients, and typically pass all authentication headers.
B. Automation: Emails were sent using Amazon SES, suggesting a high level of campaign automation.
C. Infection Flow: Users are lured to click a malicious link embedded in the body, which initially directs them to a compromised WordPress site.
Initial Infection Flow: Users are lured by a malicious link in the email body, which first directs them to a compromised WordPress site.
2. Initial Entry Vector (Compromised Site)
The victim initiates the infection flow by clicking a link that leads to a compromised WordPress site, a technique often favored by threat actors as tenured sites have a higher likelihood of evading spam detection.
A. URL: hxxps[://]buntai[.]com/wp-includes/Fubh3trgf[.]php?{victim_email}
B. Redirect: After the cookie pass (containing the victim's IPv6 address) is set, the server serves the malicious landing page. The IPv6 address is being tracked by the attacker controlled domain to check if users have already visited the link, whereas the {victim_email} is used for logging/tracking by the attacker at this stage. The {victim_email} is not passed to the landing page, because the final payload (Malware) does not require user context/pre-filling.
3. Malicious Landing Page
The victim lands on an attacker controlled domain (ex: hxxps[://]ss-a-ref[.]im/VR/), a spoofed page designed to mimic a legitimate Login.gov / SSA intermediary page.
A. Infrastructure: Proxied behind Cloudflare. Cloudflare is used to actively deny access to spoofed user agents, preventing traditional automated threat analysis and sandboxing.
Cloudflare Proxying: Attackers use Cloudflare to actively deny access to spoofed user agents, preventing automated threat analysis and sandboxing of their controlled domains.
B. Visuals: The page typically displays a message like "Check your email" or "Your Statement is Ready" and directs the victim to open the payload, and "hotlinks" CSS and JS assets directly from secure.login.gov in an attempt to spoof the page. Despite linking real assets, the page does not render correctly. The reliance on external assets combined with amateur inline styles (e.g., hardcoded margins) and potentially conflicting CSP (Content Security Policy) headers from the legitimate site causes the layout to break, serving as a potential visual warning to observant victims.
Broken Spoofing: The attacker's landing page attempts to mimic the SSA login.gov page by hotlinking real assets but fails to render correctly, providing a visual warning to users.
C. IPv6 Tracking: If a tracked IPv6 visits the same attacker controlled domain, the following message is displayed:
IPv6 Tracking: The campaign tracks the victim's IPv6 address to detect repeat visits to the attacker-controlled domain, which can then be used to display an alternate message (or block access) to previously tracked users.
4. Payload Delivery
A javascript function automatically triggers the download of the payload via:
Payload Delivery URL: The link delivers a SimpleHelp Remote Access Client (RAT) executable file, which is disguised as a Social Security eStatement PDF.
B. Details: The payload is a RAT (Remote Access Trojan) masquerading as a Social Security statement.
Malicious Payload: The file delivered is a Remote Access Trojan (RAT), disguised as a Social Security statement to trick the victim.
5. Decoy Redirection
After initiating the download and a short delay, the script redirects the user's browser to the legitimate https://www.ssa.gov. The user lands on the real SSA homepage, likely believing the download was a legitimate part of the process.
Decoy Redirection: After the malicious download, the victim is immediately redirected to the real SSA website (ssa.gov), minimizing suspicion and making the victim believe the download was a legitimate part of the process.