Phishing Kits & PhaaS
What Is GhostFrame?
GhostFrame is an advanced, highly evasive Phishing-as-a-Service (PhaaS) kit that powered over 1 million phishing attacks between its identification in September 2025 and December 2025, according to Barracuda Networks' threat research analysis published in December 2025.
GhostFrame is an advanced, highly evasive Phishing-as-a-Service (PhaaS) kit that powered over 1 million phishing attacks between its identification in September 2025 and December 2025, according to Barracuda Networks' threat research analysis published in December 2025. The platform employs a sophisticated two-stage iframe architecture combined with dynamic subdomain rotation and comprehensive anti-inspection obfuscation techniques to target Microsoft 365 and Google account credentials while evading email security gateways and endpoint detection systems.
The kit's defining technical innovation involves embedding phishing content within nested iframes that load from constantly rotating subdomains, with credential capture forms disguised inside Binary Large Object (BLOB) containers that appear to be video players or file handlers. This multi-layered evasion approach defeats static email scanners, content-based detection, and traditional domain blocking strategies, enabling GhostFrame to achieve exceptional attack velocity—more than 330,000 attacks per month during its documented operational period.
How Does GhostFrame Work?
GhostFrame operates through a carefully engineered multi-stage attack architecture designed to evade detection at every layer of the security stack, from email delivery through credential capture.
The attack sequence begins when victims receive phishing emails with subject lines designed to create urgency while appearing business-legitimate. Common lures identified by Barracuda researchers include "Secure Contract & Proposal Notification," "Annual Review Reminder," "Invoice Attached," and "Password Reset Request." These messages contain HTML file attachments or links to externally hosted HTML pages that serve as the attack's first stage.
When victims open these HTML files or click the embedded links, they encounter what appears to be a benign document viewer, contract preview, or file download interface. However, this visible content represents only the first iframe layer. The HTML file's structure includes minimal malicious code at this surface level—typically just enough JavaScript to load an externally hosted secondary iframe. This separation is critical to GhostFrame's evasion strategy: email security systems that scan attached HTML files encounter code that appears innocuous, containing no obvious credential harvesting forms or malicious JavaScript patterns that would trigger detection.
The externally hosted iframe that loads within this initial HTML file comes from a dynamically generated subdomain. GhostFrame's infrastructure creates unique subdomains for each victim or attack campaign, with these subdomains frequently rotating even during active phishing sessions. According to Malwarebytes' December 2025 analysis, this dynamic subdomain generation prevents traditional domain-based blocking, as security teams cannot maintain effective blocklists when adversaries generate new domains faster than defenders can identify and block them.
Before rendering the actual phishing content, GhostFrame implements subdomain verification using a built-in cryptographic key. This mechanism ensures that only properly generated subdomains associated with active campaigns can successfully load phishing content. If security researchers attempt to access GhostFrame infrastructure directly without the correct verification parameters, they encounter error messages or blank pages rather than exposed phishing content. This verification layer complicates analysis and prevents researchers from easily cataloging active phishing infrastructure.
The actual credential capture mechanism resides in a third layer—a secondary iframe nested within the dynamically generated subdomain's content. This innermost iframe contains the phishing form disguised through BLOB obfuscation. Binary Large Objects, typically used for handling video, audio, or large file transfers in web applications, serve as containers that hide the credential capture form. GhostFrame presents this BLOB content as a video player loading screen, a large file download interface, or a document viewer requiring authentication to access the content.
When victims enter their credentials into what they perceive as a login prompt for accessing a shared file or video, GhostFrame captures these credentials and exfiltrates them to attacker-controlled servers. The platform primarily targets Microsoft 365 and Google Workspace credentials, which provide access to corporate email, cloud storage, and other enterprise services that attackers can leverage for follow-on compromises.
GhostFrame implements comprehensive anti-inspection techniques to prevent victims from examining the phishing page's structure. The platform disables right-click context menus, blocks the F12 key that typically opens browser developer tools, prevents keyboard shortcuts like Ctrl+U (view source) and Ctrl+Shift+I (inspect element), and disables the Enter key in certain contexts. These restrictions, implemented through JavaScript event listeners, frustrate both curious users who might verify page legitimacy and security researchers attempting technical analysis.
The combination of these techniques creates multiple evasion layers. Email security gateways scanning the initial HTML attachment find minimal malicious content. Network security systems attempting to block malicious domains encounter constantly rotating subdomains. Endpoint security analyzing browser behavior sees legitimate iframe loading and BLOB handling rather than obvious phishing forms. Users attempting to verify page authenticity find their standard inspection methods blocked. This defense-in-depth approach for attackers explains GhostFrame's exceptional success rate despite modern security controls.
How Does GhostFrame Differ From Other Phishing Kits?
Aspect | GhostFrame | Sniper Dz | V3B | BlackForce |
|---|---|---|---|---|
Attack Scale | 1M+ attacks in 3 months | 140,000+ sites (lifetime) | Hundreds of campaigns | 5+ versions in 4 months |
Technical Sophistication | Very high (multi-stage iframe + BLOB) | Moderate | High (live operator support) | High (MitB injection) |
Evasion Technique | Nested iframes + subdomain rotation | Social platform impersonation | Code obfuscation | Real-time MFA bypass |
Anti-Inspection Methods | Comprehensive (7+ techniques) | Limited | Standard obfuscation | Browser injection evasion |
Primary Targets | Microsoft 365, Google Workspace | Social media credentials | European banking (54 institutions) | Multi-sector credentials + MFA |
Discovery to 1M Attacks | 3 months (Sep-Dec 2025) | Not reached in first year | Unknown timeline | Not documented |
Email Security Focus | Core design principle | Secondary consideration | Not primary focus | Client-side focus |
Infrastructure Strategy | Dynamic subdomain generation | Static domain rotation | Unknown | Telegram C2 + phishing server |
Ideal for | High-volume corporate credential theft | Social media account compromise | Targeted banking fraud | MFA-protected account takeover |
GhostFrame's attack velocity distinguishes it dramatically from competing phishing platforms. Achieving over 1 million attacks within three months of initial identification represents exceptional operational scale. While Sniper Dz powered approximately 140,000 phishing sites across its documented lifetime, GhostFrame exceeded this volume in a single quarter. This acceleration indicates either widespread adoption by numerous threat actor groups or operation by a well-resourced organization capable of managing high-volume campaigns.
The technical sophistication of GhostFrame's multi-stage iframe architecture exceeds most documented phishing kits. Traditional platforms like Sniper Dz rely primarily on social engineering and impersonation of familiar brands, with limited technical evasion capabilities. V3B implements code obfuscation but maintains relatively straightforward phishing page structures. GhostFrame's nested iframe approach with BLOB obfuscation represents a fundamental architectural difference—the phishing content itself remains invisible to most automated analysis tools until the complete iframe chain loads and BLOB content renders.
GhostFrame's dynamic subdomain rotation operates differently from standard domain rotation strategies. Traditional phishing campaigns register multiple domains and rotate through them as security vendors block each one. GhostFrame generates unique subdomains programmatically, potentially creating thousands or millions of distinct URLs from a smaller set of registered domains. This approach provides superior scalability compared to manual domain registration while complicating blocklist maintenance. According to Barracuda's January 2026 research on phishing kit evolution, this subdomain strategy represents a notable innovation that subsequent phishing kits have begun adopting.
The comprehensive anti-inspection implementation sets GhostFrame apart operationally. While various phishing kits implement individual anti-analysis techniques, GhostFrame's combination of right-click blocking, developer tools prevention, keyboard shortcut disabling, and Enter key restriction represents unusually thorough attention to preventing user verification. This suggests developers with professional web development experience who understand how technical users and security researchers examine suspicious pages.
GhostFrame's focus on Microsoft 365 and Google Workspace reflects targeting priorities different from specialized platforms like V3B. Rather than deeply customizing for specific regional banking systems with particular MFA implementations, GhostFrame optimizes for the cloud productivity platforms that dominate enterprise environments globally. This broader targeting expands the potential victim pool while avoiding the specialized authentication bypass challenges that banking-focused platforms must address.
Why Does GhostFrame Matter?
GhostFrame demonstrates a significant evolution in phishing kit sophistication that has implications extending beyond the platform itself, influencing threat landscape dynamics and defensive strategies.
The platform's rapid achievement of 1 million attacks within three months indicates that advanced evasion techniques no longer represent barriers to large-scale deployment. Historically, sophisticated phishing methods remained limited to targeted attacks by well-resourced threat actors because complexity reduced operational scalability. GhostFrame's success suggests that PhaaS platforms can now package advanced evasion techniques into accessible products that enable high-volume operations, effectively democratizing capabilities previously associated with advanced persistent threat actors.
The effectiveness of GhostFrame's email security bypass has direct implications for organizational security architectures that rely heavily on email gateway filtering. Many organizations implement comprehensive email security as their primary anti-phishing control, assuming that blocking malicious messages before they reach users provides sufficient protection. GhostFrame's specifically engineered approach to defeating static email scanners demonstrates that determined adversaries can design around these controls. Barracuda's research indicates that organizations discovered GhostFrame attacks primarily through user reports and endpoint detections rather than email gateway blocks, suggesting security architectures require defense-in-depth beyond perimeter controls.
The platform's targeting of Microsoft 365 and Google Workspace credentials creates particular organizational risk because compromised cloud productivity accounts provide attackers with extensive access. A single compromised Microsoft 365 account grants access to email, SharePoint documents, OneDrive files, Teams conversations, and potentially administrative functions depending on the victim's role. Malwarebytes' analysis noted that GhostFrame compromises frequently enable follow-on attacks including business email compromise, data exfiltration, and lateral movement through cloud infrastructure. This contrasts with social media credential theft, which typically limits attackers to reputation damage and spam distribution.
GhostFrame's documented success incentivizes other phishing kit developers to adopt similar techniques. Following Barracuda and Malwarebytes' public disclosure in December 2025, security researchers observed emerging phishing campaigns employing iframe-based obfuscation and BLOB disguise techniques that appear inspired by GhostFrame's approach. This innovation diffusion accelerates threat landscape evolution, as successful techniques propagate through the cybercriminal ecosystem. CyberNews coverage from December 2025 highlighted that GhostFrame's architectural principles were being discussed in underground forums, suggesting knowledge transfer to other threat actors.
The platform's comprehensive anti-inspection implementation reflects threat actors' understanding that technically sophisticated users and security researchers represent threats to phishing operations. By preventing standard verification techniques like viewing page source or opening developer tools, GhostFrame increases the likelihood that even suspicious users will fail to confirm their concerns before entering credentials. This defensive awareness by attackers complicates security awareness training, which often instructs users to inspect suspicious pages—advice that becomes less actionable when inspection capabilities are deliberately disabled.
What Are GhostFrame's Limitations?
Despite its sophisticated design and documented success, GhostFrame faces several operational constraints and defensive vulnerabilities that limit its effectiveness and sustainability.
Infrastructure complexity creates operational overhead and cost. Dynamic subdomain generation requires substantial backend infrastructure including domain name system management, SSL certificate provisioning for HTTPS support across rotating subdomains, load balancing to handle high-volume campaigns, and coordination systems to ensure the multi-stage iframe loading functions reliably. According to Infosecurity Magazine's December 2025 analysis, this infrastructure complexity represents significant operational investment compared to simpler phishing kits. Organizations running GhostFrame campaigns must maintain this infrastructure continuously, creating ongoing costs and potential single points of failure that could disrupt multiple campaigns simultaneously if infrastructure fails.
BLOB obfuscation introduces performance constraints. Hiding credential capture forms within Binary Large Object containers adds processing overhead that can create noticeable delays when phishing pages load, particularly on slower network connections or less powerful devices. These delays may cause victims to abandon pages before content fully renders, reducing campaign success rates. Additionally, the visual presentation of BLOB content as video players or file handlers sometimes appears inconsistent or broken depending on browser type and version, creating credibility problems that alert suspicious users.
Email security vendor response accelerates detection. Barracuda's December 2025 public disclosure of GhostFrame's techniques enabled email security vendors to develop specific detection signatures targeting the platform's characteristic patterns. Multiple vendors implemented detection rules for HTML attachments that load external iframes, BLOB-based credential capture forms, and JavaScript patterns associated with anti-inspection techniques. While GhostFrame's dynamic subdomain rotation complicates domain-based blocking, behavioral analysis detecting unusual iframe usage patterns provides vendor-agnostic detection that doesn't rely on known malicious domains.
Subdomain rotation creates forensic artifacts. While dynamic subdomain generation prevents effective blocklisting, it creates observable patterns in DNS query logs that behavioral analysis systems can detect. Organizations implementing DNS monitoring may identify unusual subdomain generation patterns—such as seeing requests for randomly generated subdomains of the same parent domain in quick succession—that indicate phishing infrastructure. Internet service providers and DNS resolvers can flag these patterns for investigation, potentially identifying GhostFrame infrastructure before widespread attack success occurs.
Anti-inspection techniques signal malicious intent. Legitimate websites rarely disable all user inspection capabilities, as doing so interferes with accessibility features and frustrates legitimate power users. GhostFrame's comprehensive blocking of right-click, developer tools, and keyboard shortcuts creates a behavioral signature that itself indicates malicious purpose. Security-conscious users who encounter these restrictions may recognize them as red flags and close the page without entering credentials. Browser vendors could potentially implement warnings when pages disable standard inspection features, converting GhostFrame's evasion technique into a detection opportunity.
Public research disclosure accelerates defensive adaptation. The detailed technical analysis published by Barracuda Networks and Malwarebytes in December 2025, followed by widespread security media coverage, provided defenders with comprehensive understanding of GhostFrame's architecture and techniques. This publicity enables organizations to implement specific controls targeting the platform while accelerating vendor detection development. Unlike undisclosed threats that can operate extensively before detection methods emerge, GhostFrame now faces defenders with full knowledge of its mechanisms, likely reducing future effectiveness as these countermeasures deploy broadly.
How Can Organizations Defend Against GhostFrame?
Effective defense against GhostFrame requires multi-layered controls addressing the platform's various evasion techniques, with particular emphasis on areas where the kit's sophisticated design creates detection opportunities.
Implement advanced email security with dynamic analysis capabilities. Organizations should deploy email security solutions that perform dynamic content analysis rather than relying solely on static scanning. Sandboxing suspicious email attachments enables security systems to observe actual behavior when HTML files load, revealing the iframe loading and external content retrieval that GhostFrame employs. Email gateways should flag messages containing HTML attachments that load external iframes as high-risk, requiring additional scrutiny or user warnings before delivery. Modern email security platforms can detonate suspicious content in isolated environments, observing the complete multi-stage loading process that reveals GhostFrame's true nature even when initial HTML appears benign.
Deploy phishing-resistant authentication mechanisms. The most effective defense against credential harvesting attacks like GhostFrame involves eliminating reliance on passwords that can be phished. Organizations should implement FIDO2 hardware security keys or platform-based authentication like Windows Hello for Business and Apple Face ID for Microsoft 365 and Google Workspace access. These cryptographic authentication methods verify that credentials are presented only to legitimate services, preventing their use on phishing sites even when victims reach fraudulent pages. Microsoft and Google both support passwordless authentication that GhostFrame cannot defeat, making this migration a high-priority security investment for organizations frequently targeted by phishing.
Enforce conditional access policies based on device compliance and location. Cloud identity platforms should implement risk-based authentication that evaluates login attempts for anomalous characteristics. Logins from unusual geographic locations, unmanaged devices, or following recent password changes should trigger step-up authentication or administrative review before granting access. When GhostFrame captures credentials and attackers attempt to use them, these contextual differences—such as the attacker's infrastructure location differing from the victim's typical access patterns—create detection opportunities. Organizations can configure policies that block logins meeting suspicious criteria while notifying the legitimate account owner of the attempt.
Monitor DNS queries for dynamic subdomain generation patterns. Network security teams should implement DNS monitoring that identifies unusual subdomain query patterns characteristic of GhostFrame infrastructure. Queries for multiple randomly generated subdomains of the same parent domain within short time periods indicate potential phishing infrastructure. DNS resolvers and security gateways can flag or block these patterns, preventing the iframe loading chain from completing successfully. Organizations should deploy DNS-layer security solutions that correlate query patterns across their user population, identifying when multiple users query similar suspicious subdomain patterns that indicate active phishing campaigns targeting their organization.
Educate users on credential context and anti-inspection red flags. Security awareness training should emphasize that legitimate file sharing, contract review, and video conferencing platforms do not require re-entering cloud productivity credentials to access content. Users should understand that if they are already logged into Microsoft 365 or Google Workspace, accessing shared content should not trigger separate login prompts. Training should specifically highlight that pages disabling right-click or developer tools likely indicate malicious intent. Organizations should instruct users to immediately close pages exhibiting these characteristics and report them to security teams rather than attempting further interaction.
Implement browser-based credential protection. Modern browsers include features that warn users when entering saved credentials on unfamiliar domains or provide password managers that refuse to autofill credentials on non-matching domains. Organizations should enforce use of enterprise password managers or browser-based credential storage that will not populate Microsoft 365 or Google credentials on GhostFrame phishing pages, creating a friction point that may alert users to the fraudulent nature of the page. Browser extension policies can also warn users when attempting to enter enterprise credentials on domains not in approved whitelists.
Deploy Cloud Access Security Brokers (CASB) with anomaly detection. CASB solutions that monitor cloud service usage can detect when credentials are used from unauthorized applications or contexts. If attackers successfully capture credentials through GhostFrame and attempt to access victim accounts, CASB systems can identify the access as originating from unauthorized locations, unusual applications, or suspicious patterns like rapid data exfiltration. These systems can automatically revoke sessions, force re-authentication, and alert security teams to investigate potential compromise before significant damage occurs.
Subscribe to and implement threat intelligence feeds. Organizations should consume threat intelligence from providers tracking GhostFrame infrastructure, including Barracuda's threat research, Malwarebytes' threat intelligence, and industry-specific information sharing organizations. These feeds provide indicators of compromise including known GhostFrame domains, subdomain generation patterns, and characteristic JavaScript signatures. Implementing these indicators in firewalls, web proxies, and endpoint detection systems enables proactive blocking of GhostFrame infrastructure before users interact with phishing content.
FAQs
What makes GhostFrame so difficult for email security systems to detect?
GhostFrame defeats traditional email security through deliberate architectural separation of malicious content across multiple loading stages. When email security gateways scan attached HTML files or embedded links, they analyze what appears to be innocuous content—typically just an HTML file that loads an iframe with minimal JavaScript. The actual phishing content resides in externally hosted iframes that only load when a user opens the file, meaning static scanning never encounters the credential capture forms or malicious scripts that would trigger traditional detection. This separation is further complicated by BLOB obfuscation, which hides credential capture forms inside containers designed for handling video or large files, making them unrecognizable to signature-based detection looking for typical login form patterns. Dynamic subdomain generation ensures that even if security vendors identify malicious infrastructure, blocklists quickly become obsolete as new subdomains generate automatically. According to Barracuda's December 2025 research, this combination defeats static analysis, signature-based detection, and domain-blocking approaches simultaneously, explaining why GhostFrame achieved such exceptional attack volumes before widespread detection mechanisms emerged.
How many attacks has GhostFrame been responsible for and what does this indicate about its effectiveness?
Barracuda Networks confirmed over 1 million phishing attacks powered by GhostFrame between the kit's identification in September 2025 and December 2025—representing more than 330,000 attacks per month during this three-month period. This attack velocity significantly exceeds most documented phishing platforms. For comparison, Sniper Dz, another widely adopted phishing kit, generated approximately 140,000 total phishing sites across its documented operational lifetime, suggesting GhostFrame achieved in three months what many platforms require years to accomplish. This exceptional scale indicates multiple factors: the platform's technical sophistication successfully evades defensive controls that stop simpler phishing attempts, enabling higher success rates that justify continued use; the PhaaS model provides accessible infrastructure that enables multiple threat actor groups to conduct simultaneous campaigns; and the targeting of Microsoft 365 and Google Workspace credentials provides broadly valuable targets that attract diverse cybercriminal operations. The rapid growth from zero to 1 million attacks also suggests active marketing and distribution through cybercriminal communities, though specific distribution channels and pricing remain undocumented in public research.
What specific credentials do GhostFrame attackers target and why?
GhostFrame campaigns identified by Barracuda and Malwarebytes primarily target Microsoft 365 and Google Workspace account credentials, representing the dominant cloud productivity platforms in enterprise environments globally. These credentials provide attackers with extensive access including corporate email accounts that enable business email compromise and impersonation attacks, cloud storage containing confidential documents and intellectual property, collaboration tools like Microsoft Teams and Google Chat that provide insight into organizational operations and enable further social engineering, calendar access revealing meeting schedules and business relationships, and potentially administrative access if compromised accounts have elevated privileges. This makes cloud productivity credentials significantly more valuable than social media or retail website credentials that many phishing kits target. Compromised Microsoft 365 or Google Workspace accounts serve as initial access points for follow-on attacks including data exfiltration, ransomware deployment through weaponized documents in shared storage, lateral movement to compromise additional accounts, and sophisticated business email compromise schemes that leverage the compromised account's legitimacy to defraud customers or business partners. The broad adoption of these platforms across industries and organization sizes creates a large target pool, while the high-value access they provide justifies the sophisticated infrastructure investment GhostFrame requires.
What are the common phishing email subject lines used in GhostFrame campaigns?
Barracuda's analysis identified several recurring subject line patterns in GhostFrame campaigns, all designed to create urgency while appearing to be routine business communications. Common examples include "Secure Contract & Proposal Notification," which suggests time-sensitive business documents requiring review; "Annual Review Reminder," creating expectations of performance reviews or compliance documentation; "Invoice Attached," leveraging the routine nature of billing documents while creating urgency around financial matters; and "Password Reset Request," exploiting security awareness training that often encourages users to act quickly on potential account compromise. These subject lines share characteristics of appearing business-legitimate rather than obviously suspicious, creating time pressure through words like "reminder" and "notification," avoiding obvious spam triggers like excessive capitalization or financial promises, and relating to common business workflows where users frequently receive and open email attachments. The specific phrasing varies across campaigns, but the consistent pattern involves trusted business contexts combined with implicit urgency. This approach proves more effective than sensational subject lines that trigger spam filters or user skepticism, instead blending into the routine flow of business communications where busy users may click without careful examination.
How can I protect myself if I encounter a page that disables right-click and developer tools?
If you navigate to a page that disables right-click, blocks developer tools, or prevents standard browser functions, you should treat this as a strong indicator of malicious intent and immediately close the page without entering any information. Legitimate websites rarely disable all inspection capabilities because doing so interferes with accessibility features, prevents users from saving images or text, and frustrates legitimate power users. The combination of blocking right-click, F12 developer tools, keyboard shortcuts, and Enter key functionality serves primarily to prevent verification of page legitimacy—exactly what phishing sites like GhostFrame want to accomplish. After closing the suspicious page, verify whether you reached it through a link in an email or message. If so, navigate directly to the legitimate service by typing the known web address or using a verified bookmark rather than clicking the provided link. Report the incident to your organization's security team if it's a work-related context, or to the impersonated organization if you identified the target of the impersonation. Clear your browser cache and cookies to remove any potentially malicious scripts, and run an antivirus scan if you interacted with the page before noticing the red flags. Most importantly, never enter credentials on pages exhibiting these characteristics, even if they appear visually identical to legitimate services—the anti-inspection functionality itself reveals malicious purpose regardless of visual appearance.



