Hunting AitM Phishing Infrastructure using Certificate Transparency

1. How It Began It all began when my university was attacked. I was still a student at UMBC in my final semester when I received a suspicious email over the weekend. Initial phishing email and redirect chain I immediately became suspicious, because while the email urged me to click a link regarding my university ID, there were some grammatical errors. Additionally, I saw the urgency implied by the email and that made me even more suspicious. At this point I realized it was a phishing scam. The email was sent from an email address within UMBC, but it was not the appropriate one for that kind of message. ...

January 14, 2026 · 11 min