In a chilling discovery, mobile security leader Zimperium, a global leader in mobile security, has uncovered a highly sophisticated mobile-targeted phishing (mishing) campaign that is impersonating the United States Postal Service (USPS).
The advanced attack, revealed by Zimperium’s zLabs threat research team, specifically targets mobile devices, leveraging an innovative and deceptive method of obfuscation to deliver malicious PDF files.
These PDFs are designed to steal sensitive user credentials and compromise critical data, representing a significant threat to organisations and individuals across more than 50 countries.
The alarming campaign, discovered by Zimperium’s zLabs threat research team, highlights a disturbing evolution in phishing tactics.
Cybercriminals exploit the inherent trust users place in official-looking communications and the seemingly harmless PDF format.
The PDFs, weaponised with malicious elements, lure unsuspecting victims through social engineering techniques, manipulating them into opening the files and unknowingly jeopardising their personal data.
Mobile users are particularly vulnerable, as limited visibility into file contents before opening drastically amplifies the risk of falling victim to the attacks.
“Although USPS has no involvement, cybercriminals exploit its trusted name to mislead and target users,” said Nico Chiaraviglio, zLabs Chief Scientist at Zimperium.
“This campaign shows the growing sophistication and continued rise of mishing attacks, emphasisng the need for proactive mobile security measures.” Chiaraviglio said.
The investigation has identified more than 20 malicious PDF files and a staggering 630 phishing pages, making this one of the most extensive mishing campaigns detected to date.
The attackers use these fraudulent documents to lure victims into revealing sensitive credentials, compromising both personal and enterprise data on a massive scale.
What sets this campaign apart is its use of groundbreaking evasion techniques designed to bypass traditional endpoint security solutions.
The newly discovered methods obscure malicious links within PDFs, allowing attackers to slip past defenses unnoticed. For mobile users—who often trust PDFs implicitly and may have limited ability to inspect their contents—the risk is amplified.
Zimperium also warns that the attackers are exploiting the very format that many regard as safe and credible. The PDFs are crafted to appear legitimate, deceiving users into engaging with them, only to find their data compromised.
Key Findings:
- Campaign Scale: Over 20 malicious PDF files and 630 phishing pages identified, targeting organisations in 50+ countries.
- Innovative Evasion Techniques: Newly discovered methods obscure malicious links, evading traditional endpoint security solutions.
- Critical Vulnerability: PDFs used as a vector exploit mobile users’ confidence in the format, posing a significant threat to enterprise security.
Verifying The Message Authenticity – Key Tips
When confronted with potential SMS or PDF phishing attempts, especially ones that claim to be from trusted organisations like USPS, it’s crucial to follow these best practices to ensure your security:
- Scrutinise Sender Details: Always verify the sender’s phone number or email address. Official USPS messages will come from a verified source, so if anything looks off, don’t trust the message.
- Avoid Clicking on Links: Rather than clicking on suspicious links embedded in messages, it’s safer to navigate directly to the official USPS website or use their official mobile app to perform any necessary actions. This eliminates the risk of being directed to fraudulent sites.
- Inspect PDF Metadata: If the message includes a PDF, take the time to inspect the document’s metadata. On a desktop or through a trusted app, check for any unusual or mismatched information that could indicate the file isn’t legitimate.
- Enable Security Tools: Enhance your protection by enabling advanced mobile threat defense solutions. These tools can detect and block phishing attempts before they reach you, adding an extra layer of security.
- Report Suspicious Activity: If you receive a questionable message claiming to be from USPS, don’t hesitate to report it. Visit the official USPS phishing page or reach out directly through their support channels to ensure the issue is investigated.
Verification Explained
As mentioned in point 1, the first line of defense is to scrutinise the sender’s details. Scammers often impersonate trusted organisations like USPS by altering the sender’s phone number or email address just enough to make it appear legitimate.
Official USPS communications will always come from a verified source, so any message that seems off, whether it’s the phone number or email address, should be treated with caution.
Far too often, scammers rely on subtle alterations in sender information to convince recipients that their message is genuine. But even if the sender’s details check out, that doesn’t mean the message is safe.
One of the most common tactics scammers use is embedding malicious links in their messages, directing unsuspecting users to fraudulent websites. This is why experts advise against clicking on any link contained within a suspicious message.
Instead, recipients should navigate directly to the official USPS website or use their trusted mobile app. It’s a simple step that could save a world of trouble later on.
For those who receive messages with PDF attachments, there’s another layer of caution to consider. Scammers are known to send seemingly official documents, but these can often contain harmful code.
Before opening any PDF, it’s critical to inspect its metadata—an often-overlooked step that can reveal inconsistencies or signs of tampering. A quick check using a desktop or a trusted PDF app can help avoid falling victim to such deceptions.
The mobile security market has seen significant growth in recent years, expected to rise from $8.1 billion in 2024 to $9.85 billion in 2025, with a compound annual growth rate (CAGR) of 21.6%.

