
Redazione RHC : 14 December 2025 22:59
Barracuda has released details of a new stealthy, evasive phishing-as-a-service (PhaaS) kit that hides malicious content within web page iframes to evade detection and maximize resilience.
This is the first time Barracuda has detected a complete phishing framework built around the iframe technique.
Threat analysts have been monitoring the new PhaaS since September 2025 and have dubbed it GhostFrame . To date, over a million attacks have been attributed to this kit.
Barracuda’s technical analysis shows that GhostFrame’s functionality is deceptively simple, yet highly effective.
Unlike most phishing kits, GhostFrame uses a simple, seemingly innocuous HTML file, with all the malicious activity taking place within an iframe , a small window within a web page that can display content from another source. This approach makes the phishing page appear authentic, but hides its true origin and purpose.
GhostFrame phishing emails alternate traditional themes, such as fake business deals and fake HR updates. Like other phishing emails, they are designed to trick recipients into clicking on dangerous links or downloading malicious files.
“The discovery of GhostFrame highlights the speed and intelligence with which phishing kits are evolving. GhostFrame is the first example we’ve seen of a phishing platform based almost exclusively on iframes, and attackers are taking full advantage of this capability to increase flexibility and evade detection ,” said Saravanan Mohankumar, director of threat analysis at Barracuda.
“To stay protected, organizations must go beyond static defenses and adopt multi-layered strategies: user training, regular browser updates, security tools to detect suspicious iframes, continuous monitoring, and threat intelligence sharing.”
Follow us on Google News to receive daily updates on cybersecurity. Contact us if you would like to report news, insights or content for publication.
Redazione