It Landed in My Primary Inbox
On March 7, 2026, I received a phishing email that most people would have clicked on without a second thought. Not because the lure was particularly sophisticated — it was a generic Starbucks Yeti Rambler Tumbler giveaway, the kind of brand impersonation scam that's been circulating for over a year. What made it notable was where it landed: directly in my Gmail primary inbox. Not spam. Not promotions. Primary.
For someone who receives a steady stream of phishing attempts, that's unusual. Gmail's classifiers are generally effective at routing unsolicited marketing and obvious phishing into secondary tabs or spam. The fact that this particular email bypassed all of those layers warranted investigation. What I found was a well-engineered phishing kit employing five distinct anti-spam evasion techniques working in concert, routing victims through a five-hop redirect chain across three cloud providers, and terminating at a fake antivirus scareware page designed to monetize fear through affiliate fraud commissions.
This writeup documents the full investigation: header forensics, infrastructure mapping, redirect chain deobfuscation, phishing kit fingerprinting, and correlation with known campaign families.
Pulling the Headers Apart
The email arrived from Customer Appreciation <prettybuyie42@gmail.com> — a throwaway Gmail
account with no connection to any legitimate brand. But the X-Google-Original-From header
revealed
the true origin: 1lAZtxmvQuFytG.CasVvkmNdeDhZ@visualstudio.com, a randomized string abusing a
Microsoft domain. The email was relayed through mail.examples1.com at IP
147.185.243.153 before being injected into Gmail's SMTP infrastructure via authenticated
ESMTPSA.
Here's where it gets interesting. SPF, DKIM, and DMARC all passed — but they validated against
gmail.com, the envelope sender domain, not against Starbucks or any brand the email claims to
represent. The attacker authenticated through Gmail's own submission infrastructure, which means Google's
trust
chain effectively vouched for the message.
The headers were also a Frankenstein of conflicting email service provider markers. X-headers from Sailthru, Salesforce Marketing Cloud, SendGrid, AWeber, and Klaviyo all appeared simultaneously. No legitimate sender routes through five ESPs at once. This is header stuffing — injecting trusted marketing platform identifiers to confuse reputation classifiers.
Other notable anomalies: the MIME type was declared as multipart/report (a delivery status
notification type) instead of multipart/alternative; the In-Reply-To and
References headers referenced message IDs at both visualstudio.com and
gmail.com, making it look like a reply in an existing thread; and the header
rcpt_domain: nike.com suggested the template was recycled from a campaign targeting Nike
customers.
One more detail that matters for clustering: the header Content-Transfer-Enfcoding — a
misspelling
of "Encoding" — appears in the DKIM signed headers. That typo is baked into the phishing kit and can be
searched
across email threat intelligence platforms to find other messages generated by the same tool.
Why It Beat Gmail — Five Evasion Layers
The primary inbox placement wasn't luck. It was the result of five distinct anti-spam evasion techniques stacked together, each reinforcing the others to create a compounding trust signal.
The email was injected through smtp.gmail.com using ESMTPSA, causing SPF, DKIM, and
DMARC to
validate against Gmail's own domain. Gmail inherently trusts mail that passes its own authentication
stack,
even when the true origin is an external VPS.
The In-Reply-To and References headers reference existing message IDs,
making
Gmail treat the email as a reply within an existing conversation rather than a cold inbound message.
The HTML body contains the entirety of an MS Research Australia newsletter (June 2017, Issue 47) embedded in hidden table rows. This floods Gmail's content classifier with tokens associated with educational, nonprofit, and health content, diluting the scam-associated tokens below the detection threshold.
Declaring Content-Type: multipart/report instead of multipart/alternative
causes
the email to be evaluated under heuristics designed for delivery status notifications —
system-generated
messages that are almost never spam.
X-headers from five different email service providers (Sailthru, Salesforce Marketing Cloud, SendGrid, AWeber, Klaviyo) make the email's fingerprint resemble legitimate enterprise marketing infrastructure.
No single technique would likely have been sufficient. But the layered combination creates a situation where authentication validates the sender, threading establishes conversational context, Bayesian poisoning neutralizes content analysis, MIME abuse triggers relaxed rules, and ESP headers provide infrastructure legitimacy. It's a multiplicative effect.
Mapping the Sending Infrastructure
The originating IP 147.185.243.153 belongs to Kamatera (ASN 396948 / CLOUDWEBMANAGE-SC), a cloud
VPS
provider based in New York operating datacenter infrastructure in San Jose, California. Scamalytics rates
Kamatera
at 50/100 fraud risk, with approximately 50% of observed web traffic flagged as potentially fraudulent.
Passive DNS via Silent Push revealed four domains historically resolved to this IP:
okarun.site and mail.okarun.site (active January 2026), plus
savbossmedia.xyz and mail.savbossmedia.xyz (active November 2025). The
mail. subdomain pattern on both confirms this IP serves as a dedicated mail-sending node for
phishing
campaigns.
Certificate transparency logs (crt.sh) revealed that okarun.site has hundreds of Let's Encrypt
certificates with new issuances every few days — a hallmark of automated, industrialized infrastructure.
This is
not a one-off campaign; this is an operation running at scale.
Shodan scanning of the /23 subnet returned 8,699 results. Two adjacent hosts stood out:
147.185.242.98 runs smtp.hufford.me — another mail server in the same block.
147.185.242.121 runs FlexBlaster Bot on mail.dmpstuf.com — a mass-mailing tool
commonly
associated with spam and phishing operations.
Following the Redirect Chain
The email's CTA linked to a DigitalOcean Spaces bucket with a keyboard-mash name:
kdfbglsdjfngsldjbngsljbnlgjsg.nyc3.digitaloceanspaces.com/1.html. The URL included a hash
fragment
carrying affiliate tracking sub-IDs.
I submitted the URL to URLScan.io and examined the DOM capture. The page was only 603 bytes — a first-hop JavaScript redirector that extracts the hash fragment, splits it, and reassembles the values into affiliate tracking parameters for the next hop.
The complete five-hop kill chain:
prettybuyie42@gmail.com via
147.185.243.153. Lure: Starbucks Yeti Rambler giveaway. Link target: DO Spaces
bucket with
hash fragment.
/1.html. Function: Extract hash
fragment,
reassemble into affiliate tracking URL. Size: 603 bytes, zero visible content.poxtra.com/264PQW94/7HCHNFTM/. Response: HTTP 302
redirect.
Cookie: uniqueClick_7HCHNFTM. Tracking:
source_id=20435, sub5=102962.
barmeoe.com/2W1Q1KK/3322XCQM/. Response: HTTP 302
redirect.
Cookie: uniqueClick_3322XCQM.zemfrook.com →
trk.single-energy-soil-bar.run. Final:
safepremiumfreeriskfree.autos. Content:
Fake antivirus scareware — "WARNING: Antivirus Protection EXPIRED!"
All three broker domains (poxtra.com, barmeoe.com, zemfrook.com)
follow
the same registration pattern: Namecheap registrar, Withheld for Privacy ehf, Cloudflare fronting,
sequential
creation dates (January 24 and February 3, 2026).
The End of the Chain — Scareware for Profit
The final landing page at safepremiumfreeriskfree.autos displays a fake antivirus expiration
warning:
"WARNING: Antivirus Protection EXPIRED!" with urgency language and a "RE-ACTIVATE" button. The page title is
"Security Center."
The trk.single-energy-soil-bar.run tracking domain with source_id and campaign
parameters confirms this is an affiliate fraud operation. The actor (source_id=20435) earns a
CPA
commission for every victim who clicks through. The "RE-ACTIVATE" button likely either pushes a legitimate
AV
affiliate purchase or downloads a PUA/malware payload.
The operation has diversified its monetization. Earlier public reporting (Botcrawl, November 2025) documented this campaign family terminating at credit card harvesting checkout pages. This March 2026 variant pivots to scareware affiliate fraud instead, showing the operator adapting while keeping infrastructure patterns identical.
32 Pages, Same Kit
URLScan's structural similarity engine identified 32 pages with matching structure across different domains,
IPs,
and ASNs. The domains follow descriptive naming patterns: phoneservicesecurity.top,
protection-scanner-security-recommended.top, verifiedphoneimmediatesupport.top,
scannerleak.top, and many others. These span approximately two years.
A Known Campaign Family
Open-source research confirms this is part of a well-documented campaign:
Botcrawl (November 2025) published a teardown of the same Starbucks Yeti Rambler lure with identical operational patterns. Botcrawl (December 2025) documented a Starbucks Bearista Cup variant. Bitdefender Antispam Labs confirmed global scope, with the US as the primary target at 35%. Gen Digital's Q2/2024 Threat Report documented the broader category — fake AV scams exploiting affiliate programs for commissions.
The complete five-hop redirect chain, the pivot to scareware monetization, the five-layer anti-spam
evasion
analysis, Kamatera infrastructure mapping, FlexBlaster Bot co-tenancy, the
Content-Transfer-Enfcoding kit fingerprint, and the Bayesian poisoning technique using a
specific
2017 medical newsletter.
Indicators of Compromise
| Sender | prettybuyie42@gmail.com |
| Original From | 1lAZtxmvQuFytG.CasVvkmNdeDhZ@visualstudio.com |
| Subject | A Gift as a Sign of Appreciation |
| Campaign ID | 511517 |
| X-rpcampaign | stcsp86697076 |
| Kit Fingerprint | Content-Transfer-Enfcoding (misspelled header) |
| IP | 147.185.243.153 (ASN 396948 / Kamatera) |
| Domain | okarun.site / mail.okarun.site |
| Domain | savbossmedia.xyz / mail.savbossmedia.xyz |
| Adjacent | 147.185.242.98 (smtp.hufford.me) |
| Adjacent | 147.185.242.121 (FlexBlaster Bot / mail.dmpstuf.com) |
| DO Spaces | kdfbglsdjfngsldjbngsljbnlgjsg.nyc3.digitaloceanspaces.com |
| Broker | poxtra.com (Namecheap, 2026-01-24) |
| Broker | barmeoe.com (Namecheap, 2026-02-03) |
| Broker | zemfrook.com |
| Tracker | trk.single-energy-soil-bar.run |
| Landing | safepremiumfreeriskfree.autos (NameSilo, 2025-10-04) |
| Source ID | 20435 |
| Campaign ID | 193dc024-7a51-4b39-8834-ddd485e73400 |
| Sub5 | 102962 |
Takeaways
Layered evasion works. The combination of authenticated Gmail relay, conversation threading injection, Bayesian poisoning, MIME type abuse, and multi-ESP header stuffing represents a sophisticated approach to bypassing modern email classifiers. Together they compound into a trust signal that even Gmail accepted.
The operation is persistent and adaptive. The same campaign family has been running for over a year, rotating brand lures, infrastructure, and monetization endpoints. The 32 structurally similar URLScan results confirm industrial scale.
Email authentication doesn't mean legitimacy. SPF, DKIM, and DMARC all passed. Those protocols verify the sender identity, not content legitimacy.
Affiliate fraud enables the ecosystem. The five-hop chain with source_id and
sub parameters confirms a multi-tier affiliate model that remains financially viable as long as
CPA
networks don't police traffic sources.
CrimsonVector Security — Fraud intelligence, threat infrastructure mapping, and security research.