A phishing email impersonating Disney+ is delivered to a target, luring them with a credential harvesting campaign. The investigation involves tracing a multi-hop redirect chain, analysing browser capture files, dissecting JavaScript harvesters, and pivoting to uncover a broader banking phishing operation running on the same infrastructure.
The phishing email presents itself as a Disney+ communication, with the display name encoded in base64 — decoding RGlzbmV5Kw== reveals Disney+. The true sending address, however, is supp@agnisys[.]com, exposing the spoofed sender immediately.

From: =?utf-8?B?RGlzbmV5Kw==?= <supp@agnisys.com>
Reply-To: supp@agnisys.com
The email footer contains German-language content, indicating the campaign’s primary target audience is users located in Germany. The link embedded in the email points to url1817[.]epoc[.]com[.]br — the start of a multi-stage redirect chain.
Querying the first URI live returns a 404 — the domain is no longer active — but the provided PCAP confirms the original HTTP response was a 302 Found, redirecting via the Location header.
The Location header reveals the first hop: hxxps[://]jigsy[.]com/redirect.asp?url=hxxps[://]bedrockprop[.]com — meaning jigsy[.]com is the first domain in the redirect chain, acting as an open redirect service to obscure the true destination.
bedrockprop[.]com is itself a thin intermediary. Opening the captured HTML shows a meta refresh tag firing after one second, silently forwarding the browser to hxxp[://]mypixar[.]ssl[.]com/info/gg — the actual phishing landing page.

Importing the provided HAR file into Chrome DevTools Network tab reveals the full request timeline against mypixar-ssl[.]com. The landing page gg is returned with a 200 OK at Sun, 09 Apr 2023 22:53:43 GMT, served by Apache/2.4.29 (Ubuntu) as disclosed in the response headers.

Repeated fetch calls to /user/online appear throughout the capture at regular intervals — this is the heartbeat, polling the server to confirm the victim remains on the page. The full request URI is hxxp[://]mypixar-ssl[.]com/user/online.
The HAR initiator trace points to hxxp[://]mypixar-ssl[.]com/js/orra/credit[.]js as the script driving the landing page. Navigating to the orra subfolder reveals two JavaScript files — login.js and credit.js.
login.js implements the first harvester stage, collecting personal identity information and POSTing it to /afrekenen/inloggen/:
data.append('surname', surname.value);
data.append('name', name1.value);
data.append('address', address.value);
data.append('dob', dob.value);
data.append('zipcode', zipcode.value);
data.append('city', city.value);
data.append('tel', password.value);

“Afrekenen” is Dutch for checkout and “inloggen” for login — the campaign is specifically targeting Dutch-speaking banking customers.
credit.js handles the second stage, presenting a card details form after the identity data is submitted:
data.append('cardNum', cardNum.value);
data.append('cvc', cvc.value);
data.append('exp', exp.value);
This data is POSTed to /afrekenen/krediet/check/ — the same endpoint used as the heartbeat check for the credit stage.

The mypixar-ssl[.]com WHOIS report confirms the domain was registered on 2023-02-27 — just 41 days before the phishing email was received on 2023-04-09. Freshly registered domains used immediately for phishing are a classic indicator of compromise.

At the time of the campaign, the site was hosted on 213[.]226[.]123[.]49, geolocated to Russia.

Investigating the full JavaScript directory at mypixar-ssl[.]com/js/ exposes a far larger operation. Beyond the Disney+ lure, the server hosts 10 additional credential harvesters, each targeting a different financial institution. Two of the companies being impersonated beginning with ‘R’ stand out immediately: Rabobank and Regiobank — both Dutch banks, consistent with the language targeting observed in the harvester code.
All 10 impersonated companies share a single industry: banking.

Further investigation of login.js exposes an obfuscated admin endpoint — login.js contains a fetch to ('/lI1Dnoke7N' — this is the URI of the site’s admin dashboard. The dashboard itself is built on the SB Admin 2 Bootstrap template, identified by the presence of sb-admin-2.js and sb-admin-2.min.js in the js directory.

| Type | Value |
|---|---|
| supp[@]agnisys[.]com | |
| Domain | url1817[.]epoc[.]com[.]br |
| Domain | jigsy[.]com |
| Domain | bedrockprop[.]com |
| Domain | mypixar-ssl[.]com |
| IP | 213[.]226[.]123[.]49 |
| URI | hxxp[://]mypixar-ssl[.]com/user/online |
| URI | hxxp[://]mypixar-ssl[.]com/afrekenen/inloggen/ |
| URI | hxxp[://]mypixar-ssl[.]com/afrekenen/krediet/check/ |
| URI | hxxp[://]mypixar-ssl[.]com/lI1Dnoke7N |