Paubox News | HIPAA Compliance, Email Security and Healthcare Tech

Storm-0900 launches large US phishing campaign using parking ticket and medical test lures

Written by Farah Amod | December 17, 2025

A coordinated email operation attempted to trick thousands of users with urgent, holiday-timed messages.

 

What happened

According to Cyber Press, threat actor Storm-0900 carried out a widespread phishing campaign on November 26 that used parking tickets and medical test-themed messages to draw users into opening malicious links. The wave of emails reached tens of thousands of inboxes across the United States and attempted to redirect victims to credential harvesting pages hosted on newly registered domains. Microsoft attributed the campaign to a financially motivated group with prior activity involving rapid infrastructure rotation and impersonation of public sector and healthcare entities.

 

Going deeper

The messages imitated routine administrative notices and health-related notifications that users might expect ahead of a holiday break. Parking ticket emails urged recipients to review or pay a fine, while medical test variations directed them to check lab results or schedule follow-up visits. These themes were chosen to prompt quick reactions, drawing users into pages controlled by the attackers. Storm-0900 registered multiple lookalike domains and obtained valid SSL certificates to lend credibility to the phishing pages. Many of the domains were short-lived, reflecting an approach in which attackers deploy, use, and retire infrastructure before blocklists can respond.

 

What was said

Microsoft stated that its detection systems blocked the campaign through a combination of email filtering, domain reputation checks, and endpoint controls. The company shared indicators of compromise with security partners and noted that holiday periods often see an increase in phishing activity due to reduced staffing and higher volumes of routine email traffic. The advisory encouraged organisations to use multifactor authentication, report unexpected attachments or urgent notices, and review sign-in logs for anomalies. Microsoft also recommended refresher training for users to help them recognise common social engineering patterns.

 

The big picture

Security analysts noted that the timing of the Storm-0900 activity was deliberate. One researcher explained, “Thanksgiving Eve is historically a high-traffic period for digital communication,” when people are rushing through inboxes and often relying on mobile devices. “People are distracted, checking emails on mobile devices while traveling, and are psychologically primed to clear their ‘to-do’ lists before the holiday break. Attackers know that a message about a parking fine or a medical result is likely to trigger an immediate, emotional click response,” the research said.

Microsoft confirmed that its defensive systems detected the spike in traffic and disrupted the wave in real time. The company stressed that the takedown applies only to this specific surge. Storm-0900 is still active, and analysts say people should be cautious with unsolicited messages that demand quick action or contain unexpected links, especially those using casual signatures like “sent from my mobile device” to mask formatting issues.

 

FAQs

Why did the attackers use parking tickets and medical test notices?

These themes trigger quick reactions from users who may not stop to verify the sender or the link.

 

How did Microsoft identify the malicious activity?

Telemetry from email filtering, endpoint systems, and identity services helped flag new domains and block the messages.

 

What risks do these phishing pages create?

Victims may unknowingly provide account credentials or download harmful files that grant attackers further access.

 

Why do holiday periods see more phishing attempts?

Attackers take advantage of reduced staffing and increased personal email activity, making urgent messages more convincing.

 

What should organisations do to reduce exposure?

Enable multifactor authentication, educate users about unexpected requests, monitor identity systems, and use domain reputation controls.