The Cofense Phishing Defense Center (PDC) has identified a sophisticated phishing campaign that manipulates government-related domains to deceive employees into believing they have outstanding toll balances requiring immediate payment.
The campaign leverages a .gov domain associated with GovDelivery, a legitimate mass communication platform used by several U.S. government agencies.
However, a notable incongruity exists in the campaign’s infrastructure: emails purporting to be from Texas authorities are actually routed through Indiana’s GovDelivery instance, signaling a critical indicator of compromise.
This phishing scheme uses fear and urgency as primary psychological triggers, warning recipients that failure to pay their alleged toll balance immediately could result in severe consequences, including fines and vehicle registration holds.

This strategy aims to induce rapid, unthinking user responses, prompting recipients to click malicious links embedded within the email to resolve the purported issue.
Multi-Stage Attack Progression
Upon clicking the phishing link, users are directed to a fraudulent website hosted under the domain txtag-help[.]xyz.
The attackers employ a façade of legitimacy by using branding consistent with the TxTag toll system and displaying official-looking graphics, including images of toll tags and messages referencing late fees.
According to the Report, these design elements are intended to convince users they are interacting with an authentic toll payment portal. The phishing site then initiates a multi-step data collection process.
Initial forms solicit personal details such as full name, email address, phone number, and mailing address information that would typically already be known to a legitimate toll agency and would not require re-entry.

This absence of mandatory login or account verification procedures is another red flag indicating the site’s illegitimacy.
Subsequent pages are designed to harvest sensitive financial information, requesting full credit card details.
The form incorporates basic validation measures, including requiring the correct number of digits for the card’s security code, to maintain the illusion of a genuine transaction process.
After submission, the site simulates payment processing but often returns a generic error message, prompting users to input alternate card details, thereby further compromising their financial data.
Advanced Social Engineering
This phishing campaign exemplifies the convergence of two potent social engineering tactics: exploitation of trusted institutional branding via government communication channels and the invocation of urgent punitive measures to compel victim action.
By imitating a recognized service and invoking fear of tangible consequences, the threat actors increase the likelihood of victim compliance.
The reliance on a .xyz top-level domain masked by the use of ‘txtag’ branding, coupled with the misuse of the GovDelivery platform, highlights the evolving sophistication of phishing methodologies that can circumvent standard perimeter email defenses.
It underscores the necessity for organizations to enhance their security posture by integrating human analysis with automated detection tools.
Solutions like Cofense’s Managed Phishing Detection and Response provide a crucial layer of defense, combining expert threat intelligence with advanced technology to identify and respond to subtle phishing attempts that conventional Secure Email Gateways (SEGs) may overlook.
Awareness and vigilance remain paramount as threat actors continue refining their approaches, especially during periods of heightened campaign activity such as the summer months.
Organizations are urged to educate employees on recognizing these phishing indicators and to implement layered defense mechanisms combining technical controls and user awareness training to effectively mitigate such threats.
Indicators of Compromise (IOCs)
| IOC Type | Details |
|---|---|
| Infection URLs | hXXps://txtag-help[.]xyz/ |
| hXXps://txtag-help[.]xyz/address | |
| hXXps://txtag-help[.]xyz/login | |
| hXXps://txtag-help[.]xyz/pay | |
| Domain TLD | .xyz (txtag-help[.]xyz) |
| Spoofed System | GovDelivery (.gov domain misuse) |
| Phishing Tactic | Urgency and fear inducement |
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant updates