Analysis of HayPost Phishing Scam in Armenia

April 13, 2026

This report details a phishing attack impersonating HayPost, the national postal operator of Armenia. This campaign leverages social engineering tactics typical of package delivery scams to harvest credentials or personal information from Armenian-speaking targets.

Armenia -- Screenshot of a phishing attack impersonating HayPost, Yerevan, 13Apr2026Phishing Message Analysis

The attack utilizes a sense of urgency and technical manipulation to deceive the recipient:

  • Lure & Urgency: The message claims a delivery attempt was missed at 12:09 PM and that the package will be returned to the sender if no action is taken by April 12. Given the current date is April 13, 2026, the attacker is using a lapsed or immediate deadline to panic the user into clicking.
  • Malicious Infrastructure: The link provided, https://haypost.am-censor[.]cfd/ad, is a typo-squatted domain designed to look like the legitimate haypost.am. The use of the .cfd top-level domain (TLD) is a common choice for low-cost, disposable phishing infrastructure.
  • Interaction Trap: The message instructs the user to reply with “Y” to “activate the link.” This is a tactic used to bypass automated spam filters on messaging platforms like iMessage or SMS. By tricking the user into responding, the attacker makes the conversation appear legitimate to the platform’s security algorithms, which often only enable clickable links after a user interaction.
  • Technical Redirection: It suggests copying the link into “Safari” if it doesn’t open, ensuring the user manually bypasses any in-app browser protections that might flag the malicious URL.

Contextual Intelligence: Targeted Attacks in Armenia

While this specific URL and sender address ([email protected]) are not yet indexed in major databases, the campaign fits into a broader pattern of persistent phishing activity targeting the Caucasus region.

Indicators of Compromise (IoCs)

Indicator Type Value Context
URL https://haypost.am-censor.cfd/ad Phishing Landing Page
Domain haypost.am-censor.cfd Malicious Host
Email [email protected] iMessage Sender
File Hash (SHA256) a954dd8b40327cf5f9859685ef83f01be1f3a2b9061b75374e2193e027251ab9 Screenshot of the attack

Users are advised to avoid interacting with the message, refrain from replying, and navigate directly to the official HayPost website for any legitimate delivery tracking.