It Landed in My Primary Inbox

On March 7, 2026, I received a phishing email that most people would have clicked on without a second thought. Not because the lure was particularly sophisticated — it was a generic Starbucks Yeti Rambler Tumbler giveaway, the kind of brand impersonation scam that's been circulating for over a year. What made it notable was where it landed: directly in my Gmail primary inbox. Not spam. Not promotions. Primary.

For someone who receives a steady stream of phishing attempts, that's unusual. Gmail's classifiers are generally effective at routing unsolicited marketing and obvious phishing into secondary tabs or spam. The fact that this particular email bypassed all of those layers warranted investigation. What I found was a well-engineered phishing kit employing five distinct anti-spam evasion techniques working in concert, routing victims through a five-hop redirect chain across three cloud providers, and terminating at a fake antivirus scareware page designed to monetize fear through affiliate fraud commissions.

This writeup documents the full investigation: header forensics, infrastructure mapping, redirect chain deobfuscation, phishing kit fingerprinting, and correlation with known campaign families.

Phishing email in Gmail primary inbox showing Starbucks Yeti Rambler lure
Fig 1. Phishing email in Gmail primary inbox showing Starbucks Yeti Rambler lure

Pulling the Headers Apart

The email arrived from Customer Appreciation <prettybuyie42@gmail.com> — a throwaway Gmail account with no connection to any legitimate brand. But the X-Google-Original-From header revealed the true origin: 1lAZtxmvQuFytG.CasVvkmNdeDhZ@visualstudio.com, a randomized string abusing a Microsoft domain. The email was relayed through mail.examples1.com at IP 147.185.243.153 before being injected into Gmail's SMTP infrastructure via authenticated ESMTPSA.

Here's where it gets interesting. SPF, DKIM, and DMARC all passed — but they validated against gmail.com, the envelope sender domain, not against Starbucks or any brand the email claims to represent. The attacker authenticated through Gmail's own submission infrastructure, which means Google's trust chain effectively vouched for the message.

The headers were also a Frankenstein of conflicting email service provider markers. X-headers from Sailthru, Salesforce Marketing Cloud, SendGrid, AWeber, and Klaviyo all appeared simultaneously. No legitimate sender routes through five ESPs at once. This is header stuffing — injecting trusted marketing platform identifiers to confuse reputation classifiers.

Other notable anomalies: the MIME type was declared as multipart/report (a delivery status notification type) instead of multipart/alternative; the In-Reply-To and References headers referenced message IDs at both visualstudio.com and gmail.com, making it look like a reply in an existing thread; and the header rcpt_domain: nike.com suggested the template was recycled from a campaign targeting Nike customers.

One more detail that matters for clustering: the header Content-Transfer-Enfcoding — a misspelling of "Encoding" — appears in the DKIM signed headers. That typo is baked into the phishing kit and can be searched across email threat intelligence platforms to find other messages generated by the same tool.

Why It Beat Gmail — Five Evasion Layers

The primary inbox placement wasn't luck. It was the result of five distinct anti-spam evasion techniques stacked together, each reinforcing the others to create a compounding trust signal.

01 Authenticated Gmail Relay

The email was injected through smtp.gmail.com using ESMTPSA, causing SPF, DKIM, and DMARC to validate against Gmail's own domain. Gmail inherently trusts mail that passes its own authentication stack, even when the true origin is an external VPS.

02 Conversation Threading Injection

The In-Reply-To and References headers reference existing message IDs, making Gmail treat the email as a reply within an existing conversation rather than a cold inbound message.

03 Bayesian Poisoning

The HTML body contains the entirety of an MS Research Australia newsletter (June 2017, Issue 47) embedded in hidden table rows. This floods Gmail's content classifier with tokens associated with educational, nonprofit, and health content, diluting the scam-associated tokens below the detection threshold.

04 MIME Type Abuse

Declaring Content-Type: multipart/report instead of multipart/alternative causes the email to be evaluated under heuristics designed for delivery status notifications — system-generated messages that are almost never spam.

05 Multi-ESP Header Stuffing

X-headers from five different email service providers (Sailthru, Salesforce Marketing Cloud, SendGrid, AWeber, Klaviyo) make the email's fingerprint resemble legitimate enterprise marketing infrastructure.

No single technique would likely have been sufficient. But the layered combination creates a situation where authentication validates the sender, threading establishes conversational context, Bayesian poisoning neutralizes content analysis, MIME abuse triggers relaxed rules, and ESP headers provide infrastructure legitimacy. It's a multiplicative effect.

Mapping the Sending Infrastructure

The originating IP 147.185.243.153 belongs to Kamatera (ASN 396948 / CLOUDWEBMANAGE-SC), a cloud VPS provider based in New York operating datacenter infrastructure in San Jose, California. Scamalytics rates Kamatera at 50/100 fraud risk, with approximately 50% of observed web traffic flagged as potentially fraudulent.

Spur.us IP intelligence for 147.185.243.153 showing Kamatera datacenter
Fig 2. Spur.us IP intelligence for 147.185.243.153 showing Kamatera datacenter

Passive DNS via Silent Push revealed four domains historically resolved to this IP: okarun.site and mail.okarun.site (active January 2026), plus savbossmedia.xyz and mail.savbossmedia.xyz (active November 2025). The mail. subdomain pattern on both confirms this IP serves as a dedicated mail-sending node for phishing campaigns.

Silent Push passive DNS showing domains resolved to 147.185.243.153
Fig 3. Silent Push passive DNS showing domains resolved to 147.185.243.153

Certificate transparency logs (crt.sh) revealed that okarun.site has hundreds of Let's Encrypt certificates with new issuances every few days — a hallmark of automated, industrialized infrastructure. This is not a one-off campaign; this is an operation running at scale.

Shodan scanning of the /23 subnet returned 8,699 results. Two adjacent hosts stood out: 147.185.242.98 runs smtp.hufford.me — another mail server in the same block. 147.185.242.121 runs FlexBlaster Bot on mail.dmpstuf.com — a mass-mailing tool commonly associated with spam and phishing operations.

Shodan subnet scan showing FlexBlaster Bot and mail servers in the /23
Fig 4. Shodan subnet scan showing FlexBlaster Bot and mail servers in the /23

Following the Redirect Chain

The email's CTA linked to a DigitalOcean Spaces bucket with a keyboard-mash name: kdfbglsdjfngsldjbngsljbnlgjsg.nyc3.digitaloceanspaces.com/1.html. The URL included a hash fragment carrying affiliate tracking sub-IDs.

I submitted the URL to URLScan.io and examined the DOM capture. The page was only 603 bytes — a first-hop JavaScript redirector that extracts the hash fragment, splits it, and reassembles the values into affiliate tracking parameters for the next hop.

URLScan DOM capture of the 603-byte JavaScript redirector
Fig 5. URLScan DOM capture of the 603-byte JavaScript redirector

The complete five-hop kill chain:

Redirect Kill Chain — 5 Hops
1
Phishing Email Origin
Sender prettybuyie42@gmail.com via 147.185.243.153. Lure: Starbucks Yeti Rambler giveaway. Link target: DO Spaces bucket with hash fragment.
2
JS Redirector Relay
Host: DO Spaces bucket /1.html. Function: Extract hash fragment, reassemble into affiliate tracking URL. Size: 603 bytes, zero visible content.
3
Broker #1 Redirect
Host: poxtra.com/264PQW94/7HCHNFTM/. Response: HTTP 302 redirect. Cookie: uniqueClick_7HCHNFTM. Tracking: source_id=20435, sub5=102962.
4
Broker #2 Redirect
Host: barmeoe.com/2W1Q1KK/3322XCQM/. Response: HTTP 302 redirect. Cookie: uniqueClick_3322XCQM.
5
Tracker → Landing Terminal
Intermediate: zemfrook.comtrk.single-energy-soil-bar.run. Final: safepremiumfreeriskfree.autos. Content: Fake antivirus scareware — "WARNING: Antivirus Protection EXPIRED!"

All three broker domains (poxtra.com, barmeoe.com, zemfrook.com) follow the same registration pattern: Namecheap registrar, Withheld for Privacy ehf, Cloudflare fronting, sequential creation dates (January 24 and February 3, 2026).

VirusTotal HTTP response for poxtra.com showing 302 redirect and affiliate parameters
Fig 6. VirusTotal HTTP response for poxtra.com showing 302 redirect and affiliate parameters
URLScan HTTP transactions showing full redirect chain to scareware landing
Fig 7. URLScan HTTP transactions showing full redirect chain to scareware landing

The End of the Chain — Scareware for Profit

The final landing page at safepremiumfreeriskfree.autos displays a fake antivirus expiration warning: "WARNING: Antivirus Protection EXPIRED!" with urgency language and a "RE-ACTIVATE" button. The page title is "Security Center."

Fake antivirus scareware landing page - WARNING: Antivirus Protection EXPIRED
Fig 8. Fake antivirus scareware landing page — WARNING: Antivirus Protection EXPIRED

The trk.single-energy-soil-bar.run tracking domain with source_id and campaign parameters confirms this is an affiliate fraud operation. The actor (source_id=20435) earns a CPA commission for every victim who clicks through. The "RE-ACTIVATE" button likely either pushes a legitimate AV affiliate purchase or downloads a PUA/malware payload.

Key Finding

The operation has diversified its monetization. Earlier public reporting (Botcrawl, November 2025) documented this campaign family terminating at credit card harvesting checkout pages. This March 2026 variant pivots to scareware affiliate fraud instead, showing the operator adapting while keeping infrastructure patterns identical.

32 Pages, Same Kit

URLScan's structural similarity engine identified 32 pages with matching structure across different domains, IPs, and ASNs. The domains follow descriptive naming patterns: phoneservicesecurity.top, protection-scanner-security-recommended.top, verifiedphoneimmediatesupport.top, scannerleak.top, and many others. These span approximately two years.

URLScan structural similarity showing 32 matching phishing kit deployments
Fig 9. URLScan structural similarity showing 32 matching phishing kit deployments

A Known Campaign Family

Open-source research confirms this is part of a well-documented campaign:

Botcrawl (November 2025) published a teardown of the same Starbucks Yeti Rambler lure with identical operational patterns. Botcrawl (December 2025) documented a Starbucks Bearista Cup variant. Bitdefender Antispam Labs confirmed global scope, with the US as the primary target at 35%. Gen Digital's Q2/2024 Threat Report documented the broader category — fake AV scams exploiting affiliate programs for commissions.

What This Investigation Adds

The complete five-hop redirect chain, the pivot to scareware monetization, the five-layer anti-spam evasion analysis, Kamatera infrastructure mapping, FlexBlaster Bot co-tenancy, the Content-Transfer-Enfcoding kit fingerprint, and the Bayesian poisoning technique using a specific 2017 medical newsletter.

Indicators of Compromise

Email Indicators
Sender prettybuyie42@gmail.com
Original From 1lAZtxmvQuFytG.CasVvkmNdeDhZ@visualstudio.com
Subject A Gift as a Sign of Appreciation
Campaign ID 511517
X-rpcampaign stcsp86697076
Kit Fingerprint Content-Transfer-Enfcoding (misspelled header)
Sending Infrastructure
IP 147.185.243.153 (ASN 396948 / Kamatera)
Domain okarun.site / mail.okarun.site
Domain savbossmedia.xyz / mail.savbossmedia.xyz
Adjacent 147.185.242.98 (smtp.hufford.me)
Adjacent 147.185.242.121 (FlexBlaster Bot / mail.dmpstuf.com)
Payload & Redirect Chain
DO Spaces kdfbglsdjfngsldjbngsljbnlgjsg.nyc3.digitaloceanspaces.com
Broker poxtra.com (Namecheap, 2026-01-24)
Broker barmeoe.com (Namecheap, 2026-02-03)
Broker zemfrook.com
Tracker trk.single-energy-soil-bar.run
Landing safepremiumfreeriskfree.autos (NameSilo, 2025-10-04)
Affiliate Tracking
Source ID 20435
Campaign ID 193dc024-7a51-4b39-8834-ddd485e73400
Sub5 102962

Takeaways

Layered evasion works. The combination of authenticated Gmail relay, conversation threading injection, Bayesian poisoning, MIME type abuse, and multi-ESP header stuffing represents a sophisticated approach to bypassing modern email classifiers. Together they compound into a trust signal that even Gmail accepted.

The operation is persistent and adaptive. The same campaign family has been running for over a year, rotating brand lures, infrastructure, and monetization endpoints. The 32 structurally similar URLScan results confirm industrial scale.

Email authentication doesn't mean legitimacy. SPF, DKIM, and DMARC all passed. Those protocols verify the sender identity, not content legitimacy.

Affiliate fraud enables the ecosystem. The five-hop chain with source_id and sub parameters confirms a multi-tier affiliate model that remains financially viable as long as CPA networks don't police traffic sources.

phishing scareware affiliate fraud email evasion threat intelligence OSINT Starbucks infrastructure analysis kill chain

CrimsonVector Security — Fraud intelligence, threat infrastructure mapping, and security research.