This cluster centers on 2764 connected domains tagged as BeaverTail, Kaiji, fbf543. 645 of these domains have been flagged by threat intelligence feeds including Google Safe Browsing and URLhaus. The connected infrastructure includes 1132 phone numbers (7638857447, 8664372914, 2157987305) with 10266 FTC complaints; 146 companies (JPMORGAN CHASE & CO., Advanced Resolution Services Inc., EVERBANK, NATIONAL ASSOCIATION) with 8616274 CFPB complaints; 298 email addresses (xxxxxxxxxxxxxxxxxxxxxxxx@vm...
crixerox-secondary.z15.web.core.windows.net
First seen Feb 22, 2026
- No SSL certificate
- 28 community reports from users
Campaign Intelligence
This cluster centers on 2874 connected domains tagged as QuasarRAT, StealitStealer, pw-k53mv9bc. 652 of these domains have been flagged by threat intelligence feeds including Google Safe Browsing and URLhaus. The connected infrastructure includes 1375 phone numbers (2157987305, 2025069230, 2028641298) with 14635 FTC complaints; 160 companies (JPMORGAN CHASE & CO., Advanced Resolution Services Inc., EVERBANK, NATIONAL ASSOCIATION) with 8680419 CFPB complaints; 299 email addresses (abuse@fb.com, ...
This cluster centers on 1486 connected domains tagged as None, keylogger. 5 of these domains have been flagged by threat intelligence feeds including Google Safe Browsing and URLhaus. The connected infrastructure includes 1364 phone numbers (3124141737, 3163966869, 8553892999) with 17909 FTC complaints; 170 companies (EQUIFAX, INC., TRANSUNION INTERMEDIATE HOLDINGS, INC., BANK OF AMERICA, NATIONAL ASSOCIATION) with 8747332 CFPB complaints; 187 email addresses (xxxxxxxxxxxxxxxxxxxxxxxx@vmh5.grup...
Details
Related Domains
Community Reports
"Xerox Scanned XXXXXXXXXXXX Document: Important Company Guideline Notes" Hello! I'm an IT admin and had one of my clients send me a copy of this kind of phishing email and I'm wondering just where it may have come from. The contents are clearly a phishing scam: "đ¨ď¸Attn: XXXXXXXXXXXX **-You have an important XXXXXXXXXXXX designated Document-** It was scanned and sent to you \[XXXXXXXXXXXX\] using a Xerox WorkCentre multifunction device on Microsoft Exchange Portal. For more XXXXXXXXXXXX-specific information as it relates to you, please visit XXXXXXXXXXXX **Retrieve Document**" I've X'd out any emails and links that look like they would belong to my client's domain, when they clearly don't. The "please visit" link is actually something like this: "[crixerox-secondary.z15.web.core.windows.net](https://crixerox-secondary.z15.web.core.windows.net)". It takes you to a fake Outlook Web App login page. This is what gets me: 1. At this particular client's location we've never had a Xerox printer until a week ago. Prior to that it's been all Epson and we never had emails like this. 2. I installed the Xerox printer myself and I disabled the Xerox cloud service, all the ports and protocols, except for the very necessary to get printing working in that particular location. I also installed the drivers (.INF based, not the .exe installer) myself on the workstations. 3. In addition, the whole network is firewall completely, only allowing VPN connections from the outside with logging and all that. There's no way someone would have just scanned the network remotely. 4. I'm suspecting one of the computers might have some sort of spyware installed? I have no other theory for why specifically a "Xerox" phishing email arrived in my client's inbox. Ideas where to look? Thank you!
"Xerox Scanned XXXXXXXXXXXX Document: Important Company Guideline Notes" Hello! I'm an IT admin and had one of my clients send me a copy of this kind of phishing email and I'm wondering just where it may have come from. The contents are clearly a phishing scam: "đ¨ď¸Attn: XXXXXXXXXXXX **-You have an important XXXXXXXXXXXX designated Document-** It was scanned and sent to you \[XXXXXXXXXXXX\] using a Xerox WorkCentre multifunction device on Microsoft Exchange Portal. For more XXXXXXXXXXXX-specific information as it relates to you, please visit XXXXXXXXXXXX **Retrieve Document**" I've X'd out any emails and links that look like they would belong to my client's domain, when they clearly don't. The "please visit" link is actually something like this: "[crixerox-secondary.z15.web.core.windows.net](https://crixerox-secondary.z15.web.core.windows.net)". It takes you to a fake Outlook Web App login page. This is what gets me: 1. At this particular client's location we've never had a Xerox printer until a week ago. Prior to that it's been all Epson and we never had emails like this. 2. I installed the Xerox printer myself and I disabled the Xerox cloud service, all the ports and protocols, except for the very necessary to get printing working in that particular location. I also installed the drivers (.INF based, not the .exe installer) myself on the workstations. 3. In addition, the whole network is firewall completely, only allowing VPN connections from the outside with logging and all that. There's no way someone would have just scanned the network remotely. 4. I'm suspecting one of the computers might have some sort of spyware installed? I have no other theory for why specifically a "Xerox" phishing email arrived in my client's inbox. Ideas where to look? Thank you!
"Xerox Scanned XXXXXXXXXXXX Document: Important Company Guideline Notes" Hello! I'm an IT admin and had one of my clients send me a copy of this kind of phishing email and I'm wondering just where it may have come from. The contents are clearly a phishing scam: "đ¨ď¸Attn: XXXXXXXXXXXX **-You have an important XXXXXXXXXXXX designated Document-** It was scanned and sent to you \[XXXXXXXXXXXX\] using a Xerox WorkCentre multifunction device on Microsoft Exchange Portal. For more XXXXXXXXXXXX-specific information as it relates to you, please visit XXXXXXXXXXXX **Retrieve Document**" I've X'd out any emails and links that look like they would belong to my client's domain, when they clearly don't. The "please visit" link is actually something like this: "[crixerox-secondary.z15.web.core.windows.net](https://crixerox-secondary.z15.web.core.windows.net)". It takes you to a fake Outlook Web App login page. This is what gets me: 1. At this particular client's location we've never had a Xerox printer until a week ago. Prior to that it's been all Epson and we never had emails like this. 2. I installed the Xerox printer myself and I disabled the Xerox cloud service, all the ports and protocols, except for the very necessary to get printing working in that particular location. I also installed the drivers (.INF based, not the .exe installer) myself on the workstations. 3. In addition, the whole network is firewall completely, only allowing VPN connections from the outside with logging and all that. There's no way someone would have just scanned the network remotely. 4. I'm suspecting one of the computers might have some sort of spyware installed? I have no other theory for why specifically a "Xerox" phishing email arrived in my client's inbox. Ideas where to look? Thank you!
"Xerox Scanned XXXXXXXXXXXX Document: Important Company Guideline Notes" Hello! I'm an IT admin and had one of my clients send me a copy of this kind of phishing email and I'm wondering just where it may have come from. The contents are clearly a phishing scam: "đ¨ď¸Attn: XXXXXXXXXXXX **-You have an important XXXXXXXXXXXX designated Document-** It was scanned and sent to you \[XXXXXXXXXXXX\] using a Xerox WorkCentre multifunction device on Microsoft Exchange Portal. For more XXXXXXXXXXXX-specific information as it relates to you, please visit XXXXXXXXXXXX **Retrieve Document**" I've X'd out any emails and links that look like they would belong to my client's domain, when they clearly don't. The "please visit" link is actually something like this: "[crixerox-secondary.z15.web.core.windows.net](https://crixerox-secondary.z15.web.core.windows.net)". It takes you to a fake Outlook Web App login page. This is what gets me: 1. At this particular client's location we've never had a Xerox printer until a week ago. Prior to that it's been all Epson and we never had emails like this. 2. I installed the Xerox printer myself and I disabled the Xerox cloud service, all the ports and protocols, except for the very necessary to get printing working in that particular location. I also installed the drivers (.INF based, not the .exe installer) myself on the workstations. 3. In addition, the whole network is firewall completely, only allowing VPN connections from the outside with logging and all that. There's no way someone would have just scanned the network remotely. 4. I'm suspecting one of the computers might have some sort of spyware installed? I have no other theory for why specifically a "Xerox" phishing email arrived in my client's inbox. Ideas where to look? Thank you!
"Xerox Scanned XXXXXXXXXXXX Document: Important Company Guideline Notes" Hello! I'm an IT admin and had one of my clients send me a copy of this kind of phishing email and I'm wondering just where it may have come from. The contents are clearly a phishing scam: "đ¨ď¸Attn: XXXXXXXXXXXX **-You have an important XXXXXXXXXXXX designated Document-** It was scanned and sent to you \[XXXXXXXXXXXX\] using a Xerox WorkCentre multifunction device on Microsoft Exchange Portal. For more XXXXXXXXXXXX-specific information as it relates to you, please visit XXXXXXXXXXXX **Retrieve Document**" I've X'd out any emails and links that look like they would belong to my client's domain, when they clearly don't. The "please visit" link is actually something like this: "[crixerox-secondary.z15.web.core.windows.net](https://crixerox-secondary.z15.web.core.windows.net)". It takes you to a fake Outlook Web App login page. This is what gets me: 1. At this particular client's location we've never had a Xerox printer until a week ago. Prior to that it's been all Epson and we never had emails like this. 2. I installed the Xerox printer myself and I disabled the Xerox cloud service, all the ports and protocols, except for the very necessary to get printing working in that particular location. I also installed the drivers (.INF based, not the .exe installer) myself on the workstations. 3. In addition, the whole network is firewall completely, only allowing VPN connections from the outside with logging and all that. There's no way someone would have just scanned the network remotely. 4. I'm suspecting one of the computers might have some sort of spyware installed? I have no other theory for why specifically a "Xerox" phishing email arrived in my client's inbox. Ideas where to look? Thank you!
"Xerox Scanned XXXXXXXXXXXX Document: Important Company Guideline Notes" Hello! I'm an IT admin and had one of my clients send me a copy of this kind of phishing email and I'm wondering just where it may have come from. The contents are clearly a phishing scam: "đ¨ď¸Attn: XXXXXXXXXXXX **-You have an important XXXXXXXXXXXX designated Document-** It was scanned and sent to you \[XXXXXXXXXXXX\] using a Xerox WorkCentre multifunction device on Microsoft Exchange Portal. For more XXXXXXXXXXXX-specific information as it relates to you, please visit XXXXXXXXXXXX **Retrieve Document**" I've X'd out any emails and links that look like they would belong to my client's domain, when they clearly don't. The "please visit" link is actually something like this: "[crixerox-secondary.z15.web.core.windows.net](https://crixerox-secondary.z15.web.core.windows.net)". It takes you to a fake Outlook Web App login page. This is what gets me: 1. At this particular client's location we've never had a Xerox printer until a week ago. Prior to that it's been all Epson and we never had emails like this. 2. I installed the Xerox printer myself and I disabled the Xerox cloud service, all the ports and protocols, except for the very necessary to get printing working in that particular location. I also installed the drivers (.INF based, not the .exe installer) myself on the workstations. 3. In addition, the whole network is firewall completely, only allowing VPN connections from the outside with logging and all that. There's no way someone would have just scanned the network remotely. 4. I'm suspecting one of the computers might have some sort of spyware installed? I have no other theory for why specifically a "Xerox" phishing email arrived in my client's inbox. Ideas where to look? Thank you!
"Xerox Scanned XXXXXXXXXXXX Document: Important Company Guideline Notes" Hello! I'm an IT admin and had one of my clients send me a copy of this kind of phishing email and I'm wondering just where it may have come from. The contents are clearly a phishing scam: "đ¨ď¸Attn: XXXXXXXXXXXX **-You have an important XXXXXXXXXXXX designated Document-** It was scanned and sent to you \[XXXXXXXXXXXX\] using a Xerox WorkCentre multifunction device on Microsoft Exchange Portal. For more XXXXXXXXXXXX-specific information as it relates to you, please visit XXXXXXXXXXXX **Retrieve Document**" I've X'd out any emails and links that look like they would belong to my client's domain, when they clearly don't. The "please visit" link is actually something like this: "[crixerox-secondary.z15.web.core.windows.net](https://crixerox-secondary.z15.web.core.windows.net)". It takes you to a fake Outlook Web App login page. This is what gets me: 1. At this particular client's location we've never had a Xerox printer until a week ago. Prior to that it's been all Epson and we never had emails like this. 2. I installed the Xerox printer myself and I disabled the Xerox cloud service, all the ports and protocols, except for the very necessary to get printing working in that particular location. I also installed the drivers (.INF based, not the .exe installer) myself on the workstations. 3. In addition, the whole network is firewall completely, only allowing VPN connections from the outside with logging and all that. There's no way someone would have just scanned the network remotely. 4. I'm suspecting one of the computers might have some sort of spyware installed? I have no other theory for why specifically a "Xerox" phishing email arrived in my client's inbox. Ideas where to look? Thank you!
"Xerox Scanned XXXXXXXXXXXX Document: Important Company Guideline Notes" Hello! I'm an IT admin and had one of my clients send me a copy of this kind of phishing email and I'm wondering just where it may have come from. The contents are clearly a phishing scam: "đ¨ď¸Attn: XXXXXXXXXXXX **-You have an important XXXXXXXXXXXX designated Document-** It was scanned and sent to you \[XXXXXXXXXXXX\] using a Xerox WorkCentre multifunction device on Microsoft Exchange Portal. For more XXXXXXXXXXXX-specific information as it relates to you, please visit XXXXXXXXXXXX **Retrieve Document**" I've X'd out any emails and links that look like they would belong to my client's domain, when they clearly don't. The "please visit" link is actually something like this: "[crixerox-secondary.z15.web.core.windows.net](https://crixerox-secondary.z15.web.core.windows.net)". It takes you to a fake Outlook Web App login page. This is what gets me: 1. At this particular client's location we've never had a Xerox printer until a week ago. Prior to that it's been all Epson and we never had emails like this. 2. I installed the Xerox printer myself and I disabled the Xerox cloud service, all the ports and protocols, except for the very necessary to get printing working in that particular location. I also installed the drivers (.INF based, not the .exe installer) myself on the workstations. 3. In addition, the whole network is firewall completely, only allowing VPN connections from the outside with logging and all that. There's no way someone would have just scanned the network remotely. 4. I'm suspecting one of the computers might have some sort of spyware installed? I have no other theory for why specifically a "Xerox" phishing email arrived in my client's inbox. Ideas where to look? Thank you!
"Xerox Scanned XXXXXXXXXXXX Document: Important Company Guideline Notes" Hello! I'm an IT admin and had one of my clients send me a copy of this kind of phishing email and I'm wondering just where it may have come from. The contents are clearly a phishing scam: "đ¨ď¸Attn: XXXXXXXXXXXX **-You have an important XXXXXXXXXXXX designated Document-** It was scanned and sent to you \[XXXXXXXXXXXX\] using a Xerox WorkCentre multifunction device on Microsoft Exchange Portal. For more XXXXXXXXXXXX-specific information as it relates to you, please visit XXXXXXXXXXXX **Retrieve Document**" I've X'd out any emails and links that look like they would belong to my client's domain, when they clearly don't. The "please visit" link is actually something like this: "[crixerox-secondary.z15.web.core.windows.net](https://crixerox-secondary.z15.web.core.windows.net)". It takes you to a fake Outlook Web App login page. This is what gets me: 1. At this particular client's location we've never had a Xerox printer until a week ago. Prior to that it's been all Epson and we never had emails like this. 2. I installed the Xerox printer myself and I disabled the Xerox cloud service, all the ports and protocols, except for the very necessary to get printing working in that particular location. I also installed the drivers (.INF based, not the .exe installer) myself on the workstations. 3. In addition, the whole network is firewall completely, only allowing VPN connections from the outside with logging and all that. There's no way someone would have just scanned the network remotely. 4. I'm suspecting one of the computers might have some sort of spyware installed? I have no other theory for why specifically a "Xerox" phishing email arrived in my client's inbox. Ideas where to look? Thank you!
"Xerox Scanned XXXXXXXXXXXX Document: Important Company Guideline Notes" Hello! I'm an IT admin and had one of my clients send me a copy of this kind of phishing email and I'm wondering just where it may have come from. The contents are clearly a phishing scam: "đ¨ď¸Attn: XXXXXXXXXXXX **-You have an important XXXXXXXXXXXX designated Document-** It was scanned and sent to you \[XXXXXXXXXXXX\] using a Xerox WorkCentre multifunction device on Microsoft Exchange Portal. For more XXXXXXXXXXXX-specific information as it relates to you, please visit XXXXXXXXXXXX **Retrieve Document**" I've X'd out any emails and links that look like they would belong to my client's domain, when they clearly don't. The "please visit" link is actually something like this: "[crixerox-secondary.z15.web.core.windows.net](https://crixerox-secondary.z15.web.core.windows.net)". It takes you to a fake Outlook Web App login page. This is what gets me: 1. At this particular client's location we've never had a Xerox printer until a week ago. Prior to that it's been all Epson and we never had emails like this. 2. I installed the Xerox printer myself and I disabled the Xerox cloud service, all the ports and protocols, except for the very necessary to get printing working in that particular location. I also installed the drivers (.INF based, not the .exe installer) myself on the workstations. 3. In addition, the whole network is firewall completely, only allowing VPN connections from the outside with logging and all that. There's no way someone would have just scanned the network remotely. 4. I'm suspecting one of the computers might have some sort of spyware installed? I have no other theory for why specifically a "Xerox" phishing email arrived in my client's inbox. Ideas where to look? Thank you!
Share Your Experience
What's Your Exposure?
Know your risk exposure to this message with a Thorough Analysis. It returns a detailed report covering the complaint history, your data breach exposure, related scam entities, and risk signals tied to this email message. Check the box and enter your email address now.
Proton VPN â Block malicious sites and encrypt your connection
Proton VPN routes your traffic through encrypted servers and blocks known malware domains. Free plan available.