Attack spotlight

Phishing for Xfinity credentials with malicious Zoom Docs

July 17, 2025

Phishing for Xfinity credentials with malicious Zoom Docs

Credential phishing attack targeting Xfinity accounts delivered via Zoom Docs

Ready to see Sublime 
in action
Get a demo
Authors
Brandon Webster
Brandon Webster
Detection

Sublime’s Attack Spotlight series is designed to keep you informed of the email threat landscape by showing you real, in-the-wild attack samples, describing adversary tactics and techniques, and explaining how they’re detected. These attacks can be prevented with a free Sublime account.

EMAIL PROVIDER: Microsoft 365

ATTACK TYPE: Credential Phishing

A few weeks back, we’d reported that we’d seen an uptick in Zoom-based attacks. In that post, we saw a credential phishing attack targeting Microsoft users that leveraged Zoom Events and Zoom Docs. But credential phishing attacks aren’t only limited to Microsoft and Google. In a recent attack, we saw a bad actor impersonate Xfinity customer service to deliver a multipage attack that ultimately ended with a credential phishing payload.

The attack started with an email sent from “Customer Services Team” and a body impersonating an Xfinity account notification. The subject and body contain character changes and typos to avoid detection. For example, a rule looking specifically for variants of “important” (denoting urgency) may miss “IMPT”, even though the recipient would likely understand the abbreviation.

Additionally, while the screenshot below only shows the sender’s display name (the default view for some email applications), the sender’s address is Gmail, not Xfinity or Comcast.

If the target clicks UPDATE N0W, they are taken to a Zoom Doc made to look like an Xfinity landing page. From here, they are presented with a CLICK TO UPDATE link. Note that there are no typos on this page, as the typos in the email body are intended for detection evasion. Because email attacks don’t end at the email, Sublime uses machine learning-powered Link Analysis to recursively analyze links in an email, which in this case showed a page with Xfinity branding and a docs.zoom[.]us URL.

If the target clicks on CLICK TO UPDATE, they are taken to a credential phishing page on an entirely new domain.

Detection signals

Sublime's AI-powered detection engine prevented this attack. Some of the top signals for this attack were:

  • Brand impersonation: The message is from Xfinity’s “Customer Services Team”, but the email was sent from a Gmail address.
  • Domain mismatch: The messages claims to be Xfinity, but links to docs.zoom[.]us.
  • Urgent language: The message contains urgent language, presenting the need for the target to take quick action to prevent account closure
  • Filter evasion: There are multiple intentional misspellings and random character strings have been inserted, both intended for filter evasion.

ASA, Sublime’s Autonomous Security Analyst, flagged this email as malicious. Here is ASA’s analysis summary:

Prevent attacks delivered through trusted sites

Living off Trusted Sites (LOTS) attacks are popular because they let bad actors hide behind friendly domains. That’s why the most effective email security platforms are adaptive, using AI and machine learning to shine a spotlight on seemingly minor discrepancies.

If you enjoyed this Attack Spotlight, be sure to check our blog every week for new blogs, subscribe to our RSS feed, or sign up for our monthly newsletter. Our newsletter covers the latest blogs, detections, product updates, and more.

Read more Attack Spotlights:

Heading

About the authors

Brandon Webster
Brandon Webster
Detection

Brandon is an Email Security Analyst at Sublime. Having a naturally sharp eye for details, patterns, and anomalies, he enjoys honing his skills in the ever-changing landscape of threat detection and prevention.

Get the latest

Sublime releases, detections, blogs, events, and more directly to your inbox.

check
Thank you!

Thank you for reaching out.  A team member will get back to you shortly.

Oops! Something went wrong while submitting the form.

Related Articles

January 6, 2026
HostPapa abuse treasure trove discovered in GoDaddy email threat hunt
Attack spotlight

HostPapa abuse treasure trove discovered in GoDaddy email threat hunt

Peter DjordjevicPerson
Peter Djordjevic
Detection
Person
December 29, 2025
5 email security trends from 2025
Sublime news

5 email security trends from 2025

Brian BaskinPerson
Brian Baskin
Threat Research
Person
December 18, 2025
How to build fast similarity search for email from the ground up
Sublime news

How to build fast similarity search for email from the ground up

Ross WolfPerson
Ross Wolf
Engineering
Person

Frequently asked questions

What is email security?
Email security refers to protective measures that prevent unauthorized access to email accounts and protect against threats like phishing, malware, and data breaches. Modern email security like Sublime use AI-powered technology to detect and block sophisticated attacks while providing visibility and control over your email environment.

Now is the time.

See how Sublime delivers autonomous protection by default, with control on demand.

BG Pattern