OwO Network, LLC Network Operations Center
Threat Intelligence & Abuse Response
网络运营中心
威胁情报与滥用处置
Incident Report 事件调查报告 Issued 6 May 2026
Document Version 1.0
签发日期:2026 年 5 月 6 日
文档版本 1.0

Threat Intelligence Advisory

威胁情报通报

Investigation Report:
UnionPay-Impersonation Phishing Infrastructure

调查报告:
仿冒中国银联的钓鱼基础设施

SMS-delivered lure impersonating China UnionPay, targeting cardholder credentials and one-time passwords in the Tokyo metropolitan area; correlated to a domain cluster hosted on 104.225.145.101 (AS25820 / IT7 Networks Inc).

通过短信投递的中国银联仿冒钓鱼诱导,面向东京地区的银联持卡人,窃取持卡人凭证和一次性验证码;相关基础设施可关联到托管在 104.225.145.101(AS25820 / IT7 Networks Inc)的域名集群。

Report Date
报告日期
6 May 2026
2026 年 5 月 6 日
Incident Date
事件时间
5–6 May 2026
2026 年 5 月 5–6 日
Classification
信息分级
TLP:CLEAR
Prepared By
编写人
Vincent Yang, NOC
Vincent Yang,NOC

1. Abstract摘要

This report documents a high-confidence payment-card phishing incident in which SMS messages impersonating China UnionPay directed the victim to https://up.cnpayglobal.com/. The incident occurred shortly after a payment activity near 〒104-0061 Tokyo, Chuo City, Ginza, 3 Chome-3-13, at approximately 35.6728586, 139.7624018. The fraudulent site collected payment-card verification data and SMS one-time passwords; subsequent banking notifications recorded an attempted online payment of CNY 11,987.95.

本报告记录一起高置信度的银行卡钓鱼事件。攻击者通过仿冒“中国银联”的短信,引导受害人访问 https://up.cnpayglobal.com/。事件发生于受害人在日本〒104-0061 东京都中央区银座 3 丁目 3-13 附近消费之后,坐标约为 35.6728586, 139.7624018。钓鱼网站收集持卡人验证资料和短信一次性验证码;随后,银行通知记录了一笔人民币 11,987.95 元的网上支付尝试。

Technical investigation links the observed lure domain and related infrastructure to a cluster hosted on 104.225.145.101, associated with IT7 Networks Inc. and AS25820. The phishing site additionally presents implementation characteristics consistent with a Vite.js-built web application. RDAP records show consistent use of NameSilo, DNSOWL nameservers, and PrivacyGuardian privacy protection across the cluster.

技术分析显示,已观察到的诱导域名及关联基础设施属于托管在 104.225.145.101 的域名集群,该 IP 与 IT7 Networks Inc 和 AS25820 相关。钓鱼网站还呈现出与 Vite.js 构建的 Web 应用一致的实现特征。RDAP 记录显示,该域名集群普遍使用 NameSilo 注册商、DNSOWL 域名服务器和 PrivacyGuardian 隐私保护服务。

Keywords
phishing · UnionPay impersonation · SMS spoofing · payment-card fraud · RDAP · NameSilo · AS25820

关键词
钓鱼攻击 · 仿冒中国银联 · 短信发件人伪造 · 银行卡欺诈 · RDAP · NameSilo · AS25820

2. Incident Overview事件概述

Shortly after a payment activity near 〒104-0061 Tokyo, Chuo City, Ginza, 3 Chome-3-13, the victim received SMS messages impersonating China UnionPay. The message claimed that the victim's overseas payment capability had been disabled and instructed re-authentication through https://up.cnpayglobal.com/. The destination presented a UnionPay-themed card authentication interface and requested sensitive cardholder information, including card number, CVV/CVN2, expiration date, mobile telephone number, and SMS verification code.

受害人在日本〒104-0061 东京都中央区银座 3 丁目 3-13 附近消费后不久,收到仿冒“中国银联”的短信。短信声称受害人的银行卡境外支付功能已关闭,并要求通过 https://up.cnpayglobal.com/ 重新认证。目标网站展示仿银联的银行卡认证界面,并要求填写银行卡号、CVV/CVN2、有效期、手机号和短信验证码等敏感信息。

Following selection of the verification-code function, the page remained in a loading state for approximately one to two minutes. This delay is consistent with a live-relay or operator-assisted fraud workflow. One plausible hypothesis is that the backend operators were manually entering the submitted card details into a downstream purchase flow, such as airline-ticket or hotel bookings sometimes associated with low-price proxy-purchase fraud. This is an inference from the observed behaviour and subsequent bank payment SMS, not direct proof of the downstream merchant or purchase category.

受害人点击获取验证码后,页面保持加载或转圈状态约 1 至 2 分钟。该延迟符合实时中继或人工介入欺诈流程的特征。一种合理的调查假设是,后台操作人员可能正在将受害人提交的银行卡信息手动输入到下游消费流程中,例如机票或酒店订单;这类流程也可能与常见的低价机票、酒店代购欺诈相关。该判断基于页面行为和随后出现的银行支付验证短信,并不能直接证明具体下游商户或消费类别。

The phishing interface displayed an English option in the upper-right corner, but clicking it had no effect. The non-functional language switch, combined with the Chinese-language SMS lure and UnionPay-themed page content, supports the assessment that the campaign primarily targeted Chinese-speaking UnionPay cardholders physically present in Japan. The timing, location, and spoofed sender identity are also consistent with suspected SMS sender spoofing or pseudo-base-station activity; this remains an inference based on victim-side evidence pending carrier-side records.

钓鱼页面右上角显示 English 选项,但受害人观察到点击无效。结合中文短信诱导、银联主题页面和中文交互流程,该特征支持本次活动主要面向身处日本的中文银联持卡人。短信发件人标识被仿冒,且事件与银座现场消费在时间和地点上高度相关,因此符合短信发件人伪造或伪基站活动的特征;该判断仍属于基于受害人侧证据的推断,若要最终确认短信投递机制,需要运营商侧日志或执法机关调取的电信记录。

The one-to-two-minute verification-code delay is consistent with live relay or operator-assisted fraud; the precise downstream purchase workflow remains an investigative hypothesis pending corroborating telemetry from the card issuer.
获取验证码后出现的 1 至 2 分钟加载延迟符合实时中继或人工介入欺诈流程的特征;具体的下游消费流程仍属调查假设,需要发卡机构侧数据进一步印证。

3. Documentary Evidence证据材料

The following screenshots constitute primary victim-side evidence, documenting the SMS lure, bank verification messages, phishing landing page, and credential collection form.

以下截图为主要受害人端证据,分别记录诱导短信、银行支付验证短信、钓鱼落地页和银行卡信息采集表单。

Spoofed UnionPay SMS lure
Figure 1Spoofed UnionPay SMS lure containing https://up.cnpayglobal.com/.
图 1仿冒中国银联的诱导短信,其中包含 https://up.cnpayglobal.com/
Bank payment verification SMS
Figure 2Bank SMS verification messages for an attempted online payment of CNY 11,987.95.
图 2银行短信显示人民币 11,987.95 元网上支付验证请求。
UnionPay-themed phishing landing page
Figure 3Phishing landing page presenting a UnionPay-style card authentication prompt.
图 3up.cnpayglobal.com 钓鱼落地页展示仿银联银行卡认证弹窗。
Credential and OTP harvesting form
Figure 4Credential and OTP harvesting form requesting CVN2/CVV, expiration date, mobile number, and SMS code.
图 4银行卡凭证和一次性验证码采集表单,要求输入 CVN2/CVV、有效期、手机号和短信验证码。

4. Attack Chain Analysis攻击链分析

  1. The victim completed a payment activity near 〒104-0061 Tokyo, Chuo City, Ginza, 3 Chome-3-13.
  2. The victim received SMS messages impersonating China UnionPay.
  3. The SMS messages directed the victim to https://up.cnpayglobal.com/.
  4. The phishing page requested full card verification data and SMS OTP.
  5. The verification-code request remained in a loading state for approximately one to two minutes, suggesting possible live relay or operator-assisted backend interaction with a real payment workflow.
  6. A plausible investigative hypothesis is that the submitted card details were being manually used for downstream purchases, such as airline-ticket or hotel bookings; this has not been independently confirmed.
  7. The upper-right English option on the phishing page was non-functional, suggesting the workflow was designed primarily for Chinese-speaking users in Japan.
  8. The victim received bank verification messages for an attempted CNY 11,987.95 online payment.
  9. The victim identified the website as phishing and reported it to the registrar, registry, and hosting network.
  1. 受害人在日本〒104-0061 东京都中央区银座 3 丁目 3-13 附近完成消费。
  2. 受害人收到仿冒中国银联的短信。
  3. 短信诱导受害人访问 https://up.cnpayglobal.com/
  4. 钓鱼页面要求输入完整的银行卡验证资料和短信一次性验证码。
  5. 获取验证码后页面加载约 1 至 2 分钟,提示攻击者可能在后台实时中继或人工对接真实支付流程。
  6. 一种合理的调查假设是,提交的银行卡信息被人工用于下游消费,例如机票或酒店订单;该点尚未得到独立证实。
  7. 钓鱼页面右上角 English 按钮点击无效,说明该流程更可能主要面向在日本的中文银联持卡人。
  8. 受害人随后收到银行短信,提示一笔人民币 11,987.95 元的网上支付验证请求。
  9. 受害人确认该网站为钓鱼网站,并已向注册商、注册局和托管网络举报。

5. Infrastructure Indicators基础设施指标

5.1 Primary indicators of compromise5.1 主要失陷指标

Indicator指标 Value
Primary lure host主要诱导主机名up.cnpayglobal.com
Root domain根域名cnpayglobal.com
Hosting IP托管 IP 地址104.225.145.101
Web build frameworkWeb 构建框架Vite.js (observed bundler signature)Vite.js(观察到的构建工具特征)
ASNAS25820 · IT7NET
Registrar注册商NameSilo, LLC · IANA ID 1479
Registrar abuse注册商滥用举报abuse@namesilo.com
IP / ASN abuseIP / ASN 滥用举报abuse@sioru.com
Nameservers域名服务器NS1.DNSOWL.COM, NS2.DNSOWL.COM, NS3.DNSOWL.COM

5.2 Related infrastructure on 104.225.145.1015.2 104.225.145.101 上的关联基础设施

FOFA-derived asset data identifies a cluster of similarly themed "Bank Card Authentication" hosts colocated on the same IP address.

FOFA 资产数据识别出一组部署在同一 IP 地址上的相似“银行卡认证”站点。

Host主机 Port(s)端口 Page title页面标题 Root domain根域名
cn.lianhezf.com80 / 443Bank Card Authentication银行卡认证lianhezf.com
cn.up-hwrz.com80 / 443Bank Card Authentication银行卡认证up-hwrz.com
cn.yinlianasia.com80 / 443Bank Card Authentication银行卡认证yinlianasia.com
cn.uphwzf.com80 / 443Bank Card Authentication银行卡认证uphwzf.com
cn.yinlianworld.com80 / 443Bank Card Authentication银行卡认证yinlianworld.com
cn.jingwaizf.com80 / 443Bank Card Authentication银行卡认证jingwaizf.com
zgyinlian-zf.com80 / 443Bank Card Authentication / 400银行卡认证 / 400zgyinlian-zf.com
cn.uprenzheng.com80 / 443Bank Card Authentication银行卡认证uprenzheng.com
cn.upjprz.com80 / 443Bank Card Authentication银行卡认证upjprz.com
zhifu-oversea.com
cn.zhifu-oversea.com
80 / 443Bank Card Authentication / blank银行卡认证 / 空zhifu-oversea.com
104.225.145.10180 / 443 / 888 / 22Bank Card Authentication / 400 / 403银行卡认证 / 400 / 403

6. RDAP and WHOIS FindingsRDAP 与 WHOIS 查询结果

Registry dates below are based on Verisign RDAP unless otherwise noted. Registrar-side dates may differ by one calendar day, as NameSilo reports normalized registrar dates separately from the Verisign timestamp.

下表中的注册时间主要依据 Verisign 注册局 RDAP;除非另有说明,均以该数据为准。NameSilo 注册商侧日期可能相差一个自然日,因为 NameSilo 会单独展示归一化后的注册商侧日期,而 Verisign 返回的是精确 UTC 时间戳。

6.1 Domain RDAP summary6.1 域名 RDAP 摘要

Domain域名 Status at query time查询时状态 Registration (UTC)注册时间(UTC) Expiration (UTC)到期时间(UTC)
cnpayglobal.comclient transfer prohibited2026-05-05 01:35:562027-05-05 01:35:56
lianhezf.comclient transfer prohibited2026-04-02 03:45:272027-04-02 03:45:27
up-hwrz.comclient transfer prohibited2025-12-20 05:55:482026-12-20 05:55:48
yinlianasia.comclient hold; client transfer prohibited2026-04-21 03:27:592027-04-21 03:27:59
uphwzf.comclient transfer prohibited2025-12-25 08:15:202026-12-25 08:15:20
yinlianworld.comclient hold; client transfer prohibited2026-04-04 03:08:182027-04-04 03:08:18
jingwaizf.comclient hold; client transfer prohibited2025-11-19 08:25:352026-11-19 08:25:35
zgyinlian-zf.comclient transfer prohibited2025-11-22 17:22:022026-11-22 17:22:02
uprenzheng.comclient hold; client transfer prohibited2025-12-13 04:15:482026-12-13 04:15:48
upjprz.comclient hold; client transfer prohibited2025-12-13 04:24:002026-12-13 04:24:00
zhifu-oversea.comclient hold; client transfer prohibited2025-12-06 03:07:122026-12-06 03:07:12

6.2 Common registrar and DNS pattern6.2 注册商与 DNS 共性

Registrar注册商NameSilo, LLC (IANA ID 1479)
Registrar support注册商支持联系方式support@namesilo.com
Registrar abuse注册商滥用举报联系方式abuse@namesilo.com · +1.480.524.0066
Privacy service隐私保护服务PrivacyGuardian.org
Common privacy phone隐私保护记录中的共用电话+1.3478717726
DNS providerDNS 服务商DNSOWL
DNSSECNot delegation-signed未进行 DNSSEC 委派签名

6.3 Hosting RDAP — 104.225.145.1016.3 托管网络 RDAP — 104.225.145.101

Network handle网络句柄NET-104-225-144-0-2
Address range地址段104.225.144.0104.225.159.255
Network name网络名称CL-104-225-144-0-20
Type / status类型 / 状态Assignment / active
IP registrantIP 注册主体IT7 Networks Inc · 530 W 6th Street, Los Angeles, CA 90014, USA
Related registrant关联注册主体Cluster Logic Inc
Abuse contact滥用举报联系方式abuse@sioru.com · +1-408-260-5757
NOC / tech / adminNOC / 技术 / 管理联系方式arin-noc@sioru.com, arin-tech@sioru.com, arin-admin@sioru.com

6.4 Hosting RDAP — AS258206.4 托管网络 RDAP — AS25820

AS numberAS 编号AS25820
AS nameAS 名称IT7NET
Status状态Active
Registrant注册主体IT7 Networks Inc
Registrant address注册主体地址4974 Kingsway Ave, Suite 668, Burnaby, BC V5H 4M9, Canada
Abuse contact滥用举报联系方式abuse@sioru.com · +1-408-260-5757
NOC / tech / adminNOC / 技术 / 管理联系方式arin-noc@sioru.com, arin-tech@sioru.com, arin-admin@sioru.com

7. Assessment分析结论

This incident is assessed as a high-confidence UnionPay-themed payment-card phishing campaign. The conclusion is supported by the following observations:

综合判断,该事件属于高置信度的仿冒中国银联银行卡钓鱼活动。主要依据如下:

  1. The SMS impersonates China UnionPay and directs the victim to a non-official, newly registered domain.
  2. cnpayglobal.com was registered on 2026-05-05, matching the incident window.
  3. The phishing page solicits CVV/CVN2, expiration date, telephone number, and SMS verification code.
  4. A real bank payment verification SMS for CNY 11,987.95 followed the interaction.
  5. The one-to-two-minute verification-code delay is consistent with a live-relay workflow and may indicate operator-assisted downstream purchase attempts.
  6. The non-functional English option and Chinese-language interaction path support a target profile of Chinese-speaking UnionPay users in Japan.
  7. The site appears to have been implemented as a Vite.js-built web application, providing a useful technical fingerprint for log searches, file-system triage, and related-site clustering.
  8. FOFA asset data identifies many similarly themed "Bank Card Authentication" hosts on the same IP address.
  9. RDAP records demonstrate strong infrastructure overlap across registrar, DNS provider, privacy service, and hosting IP.
  10. Several related domains already show client hold, suggesting prior abuse handling or takedown activity against the same cluster.
  1. 短信仿冒中国银联,并诱导受害人访问非官方且新近注册的域名。
  2. cnpayglobal.com 注册于 2026-05-05,与事件时间窗口一致。
  3. 钓鱼页面要求输入 CVV/CVN2、有效期、手机号和短信验证码。
  4. 页面交互后出现真实的人民币 11,987.95 元银行支付验证短信。
  5. 获取验证码后的 1 至 2 分钟加载延迟符合实时中继流程特征,也可能指向人工介入的下游消费尝试。
  6. English 按钮无效且主要交互路径为中文,支持“目标群体为身处日本的中文银联持卡人”这一画像。
  7. 钓鱼网站疑似使用 Vite.js 构建,该技术指纹可用于日志检索、文件系统排查和关联站点聚类。
  8. FOFA 资产数据显示,同一 IP 上存在多个“银行卡认证”主题相似站点。
  9. RDAP 记录显示注册商、DNS 服务商、隐私保护服务和托管 IP 存在高度重合。
  10. 多个关联域名查询时已处于 client hold 状态,说明同一集群可能已触发既往滥用处置或下架流程。

8. Actions Already Taken已采取行动

The domain cnpayglobal.com has been reported to NameSilo with a request for suspension of all DNS resolution. The matter has further been submitted to Verisign in its capacity as the .com registry, and the AS25820 / IT7 Networks abuse contact identified through RDAP has been notified.

受害人已经向 NameSilo 举报 cnpayglobal.com,并要求暂停其全部 DNS 解析。该事件也已提交给作为 .com 注册局的 Verisign。受害人还通过 RDAP 查询到的 AS25820 / IT7 Networks 滥用举报联系方式提交了通知。

9. Current Status当前状态

The following table records the response status of each notified party as of the most recent update. This section will be revised as further responses are received.

下表记录截至最近一次更新时,各已通知相关方的响应状态。后续收到回复后,本节将继续修订。

Party相关方 Status状态 Disposition处理结果
NameSilo, LLC
Registrar注册商
Acknowledged · Action taken已确认 · 已处理 NameSilo Support has replied and confirmed that cnpayglobal.com has been placed on ClientHold status, effectively suspending DNS resolution for the lure domain.NameSilo 支持团队已回复,确认 cnpayglobal.com 已被置于 ClientHold 状态,实际效果是暂停该诱导域名的 DNS 解析。
Verisign, Inc.
.com Registry.com 注册局
Awaiting response等待回复 Abuse submission acknowledged on receipt; no substantive response received at the time of this update.滥用举报提交后已收到自动确认;截至本次更新尚未收到实质性回复。
IT7 Networks Inc.
AS25820 hosting networkAS25820 托管网络
Awaiting response等待回复 RDAP-listed abuse contact abuse@sioru.com notified; no response received at the time of this update. Phishing content on 104.225.145.101 remains observable.已通知 RDAP 中列出的滥用举报联系人 abuse@sioru.com;截至本次更新尚无回复。104.225.145.101 上的钓鱼内容仍可被观测到。
NameSilo's ClientHold action removes the lure domain from DNS resolution but does not affect the underlying hosting infrastructure or related domains within the cluster. Sustained takedown still requires action from the hosting network and from the registry against the broader domain set.
NameSilo 设置的 ClientHold 仅会将该诱导域名从 DNS 解析中移除,不影响底层托管基础设施或集群内的其他关联域名。若要实现持续下架,仍需托管网络处理钓鱼内容,并由注册局对更大范围的相关域名集采取行动。

11. Conclusion结论

The collected SMS evidence, phishing-page screenshots, FOFA asset data, RDAP records, and Vite.js implementation fingerprint together support the conclusion that up.cnpayglobal.com and the related domains constitute coordinated payment-card phishing infrastructure impersonating China UnionPay. The one-to-two-minute verification-code delay and the non-functional English option further support a live-relay fraud workflow aimed at Chinese-speaking UnionPay cardholders in Japan. Immediate takedown, log preservation, and cross-provider correlation are warranted.

综合现有短信证据、钓鱼页面截图、FOFA 资产数据、RDAP 记录和 Vite.js 实现指纹,可以确认 up.cnpayglobal.com 及其关联域名构成一组协同运作、仿冒中国银联的银行卡钓鱼基础设施。获取验证码后的 1 至 2 分钟延迟,以及无效的 English 选项,进一步支持“面向在日本的中文银联持卡人实施实时中继式欺诈”这一判断。建议立即下架、保全日志,并由注册商、注册局、托管网络、银行和运营商进行跨服务提供方关联调查。

A. Appendix — Takedown List附录 — 下架清单

up.cnpayglobal.com
cnpayglobal.com
cn.lianhezf.com
cn.up-hwrz.com
cn.yinlianasia.com
cn.uphwzf.com
cn.yinlianworld.com
cn.jingwaizf.com
zgyinlian-zf.com
cn.uprenzheng.com
cn.upjprz.com
zhifu-oversea.com
cn.zhifu-oversea.com
104.225.145.101
Prepared by 编写人
Vincent Yang
Network Operations Center
OwO Network, LLC
网络运营中心
OwO Network, LLC
Date of Issue 发布日期
6 May 2026
2026 年 5 月 6 日
Tokyo, Japan
日本东京