Case study banner with the headline “Lookalike-Domain Phishers Impersonate Hong Kong Manufacturing Firm to Steal Funds,” on a dark background with blue and orange wave lines.

Email Phishers Impersonate Hong Kong Precision Manufacturing Firm, Tricking Customer Into Making Fraudulent Payments

LAST EDITED:
PUBLISHED:
February 17, 2026

A Hong Kong precision manufacturing firm was impersonated via a lookalike email domain. Blackpanda traced Zoho-sent spoofing emails and fraud PDFs, including bank letters.

Key facts

Organisation
Hong Kong-based precision manufacturing firm (anonymised)
Threat
Lookalike-domain impersonation and payment diversion attempt
Initial vector
Newly registered lookalike domain used to send a reply-styled email
Fraud artefacts
Two forged PDF attachments (including bank letters) designed to induce payment diversion
Conclusion
External impersonation — no evidence of corporate email tenant compromise

What this case shows

  • Lookalike domains can “pass” authentication and still be criminal.
  • Forged attachments add pressure and false legitimacy to payment diversion.
  • Blocking lookalikes and tightening finance verification stops repeat fraud fast.

Need help validating impersonation attempts? Explore digital forensics and incident response readiness.

Summary A Hong Kong-based precision manufacturing firm was pulled into a classic payment-diversion plot — not by malware, but by impersonation. A customer received a suspicious “reply” email that appeared to come from a near-identical domain, complete with forged PDF attachments designed to push funds to an attacker-controlled bank account. Blackpanda was engaged to determine whether this was a compromised corporate mailbox or a clean impersonation attempt, and to provide evidence-led recommendations to stop repeat fraud.

Blackpanda’s analysis showed the malicious email originated from a newly registered lookalike domain and was sent via Zoho Mail — not the customer’s legitimate Microsoft-hosted email environment. The attacker also crafted attachments with metadata indicating they were generated on an iOS device on the same day the domain was registered — a sign of fast, opportunistic fraud execution.

Containing a Lookalike-Domain Email Impersonation Attempt Targeting a Hong Kong-Based Precision Manufacturing Firm in June to July 2025

CHALLENGE

A “reply email” that wasn’t a reply — it was a set-up

The incident was reported when a customer received a suspicious email from a lookalike domain resembling the firm’s legitimate domain. The core concern was urgent and binary: was this an internal email compromise, or an external impersonation designed to steal funds?

A modern fraud pattern: pass authentication, still malicious

Email authentication checks (SPF/DKIM/DMARC) can still show “pass” if the attacker controls the sending domain — even when that domain is a lookalike created solely for fraud. That makes this type of incident dangerous: it can feel legitimate to recipients and even to some mail gateways.

SOLUTION

1) Source validation through email header analysis

Blackpanda compared the malicious message headers against known legitimate email headers. The malicious email showed indicators consistent with Zoho Mail as the sending platform, while the legitimate corporate email flow reflected Microsoft infrastructure — supporting the conclusion that the message did not originate from the customer’s legitimate email tenant.

2) Lookalike-domain intelligence and timing analysis

Blackpanda reviewed domain registration (WHOIS) records for the lookalike domain and found it was registered on the same day the malicious email was sent — strong evidence that the domain was created specifically for this campaign.

3) Fraud attachment artefact review

Blackpanda analysed the attachment metadata and found indicators the PDFs were generated using an iOS Quartz PDFContext workflow, with timestamps aligning to the campaign timeline — consistent with an attacker rapidly forging supporting documents to pressure a payment action.

4) Preventive hardening recommendations

Blackpanda provided a practical set of steps to reduce repeat risk, including: blocking lookalike domains at the email gateway, flagging newly registered domains, searching gateway logs for prior messages from lookalikes, and issuing internal advisories to staff and customer-facing teams.

RESULTS

1) Evidence-led conclusion: impersonation, not tenant compromise

Based on headers and sending infrastructure, Blackpanda found no indication the organisation’s internal environment was compromised in this incident. The evidence supported an external impersonation attempt using a lookalike domain.

2) A clearer fraud narrative for stakeholder action

The firm gained a defensible explanation it could use to brief internal teams and affected counterparties: what was sent, how it was made to look real, and why it was not a legitimate corporate email.

3) A concrete prevention checklist aligned to how the criminals operated

Rather than generic “be careful” advice, the recommendations targeted the attacker’s exact playbook: fast domain registration, spoofed reply styling, and forged payment documents.

FAQ: Lookalike domains, impersonation, and payment diversion

Q1. Was the corporate email environment compromised?

The investigation found no indication of internal compromise in this case; the evidence pointed to external impersonation using a lookalike domain and third-party mail infrastructure.

Q2. Why would SPF/DKIM/DMARC still pass on a malicious email?

Because authentication can validate that the sender is authorised to send for that domain. If criminals own and configure the lookalike domain correctly, those checks may still pass.

Q3. Why register a domain on the same day as the attack?

It’s common tradecraft for short-lived fraud campaigns: register, send, attempt payment diversion quickly, then abandon the domain.

Q4. What’s the fastest way to reduce repeat risk?

Block identified lookalike domains, flag newly registered domains at the email gateway, and proactively search gateway logs for any prior lookalike messages.

Q5. What should finance teams do when “bank details” change via email?

Use an out-of-band verification step (call-back to known numbers, dual approvals, payment hold periods) before changing payee details or executing transfers.