77.90.141.0/24 is a suspected stolen or misappropriated BGP prefix currently being used for QuickBooks callback phishing and abusive email delivery. In the phishing samples reviewed for this report, three separate emails were sent directly from hosts inside 77.90.141.0/24. Those messages impersonated Intuit and QuickBooks, used the same callback phishing template, and were still active as of 13 Mar 2026 PT.
This post focuses only on direct evidence tied to 77.90.141.0/24. Nine phishing emails were reviewed in total. Three were directly linked to this prefix. Six others were sent from different IP space and are not attributed here to 77.90.141.0/24.
77.90.141.0/24 routing and RIPE data
The RIPE data reviewed for this report identifies the prefix as:
- inetnum: 77.90.141.0 – 77.90.141.255
- netname: SUBALLOC-CONTRUST
- country: DE
- status: SUB-ALLOCATED PA
- responsible organisation: K&K Kommunikationssysteme GmbH
- abuse contact: alex.kontrast.eu@gmail.com
The same RIPE data shows a route object for 77.90.141.0/24 with origin AS396073. The route object was created on 11 Oct 2025 UTC. The inetnum object for the current /24 record was created on 12 Oct 2025 UTC.
The routing-history view reviewed for this prefix shows older visibility, a long quiet period after 2019, and later reappearance under multiple origin ASNs, including AS62425, AS208485, and AS396073. That is not what normal, stable, long-term stewardship of a customer prefix looks like. It looks like a questionable custody trail followed by active abuse.
For that reason, the most accurate description here is not a classic short-lived BGP hijack. The better description is a suspected stolen prefix, a likely misappropriated prefix, or a quietly taken-over netblock that is now being used for phishing operations.
Direct phishing evidence from 77.90.141.0/24
Three QuickBooks phishing emails in the reviewed set were sent directly from IPs inside 77.90.141.0/24.
1) 26 Feb 2026 PT
- Subject:
Your QuickBooks Subscription is due for renewal [redacted] - Display identity:
notification@quickbooks.intuit.com - Return-path:
info@qbmarketpro.biz - Source host:
server7.hgranticsy.com - Source IP:
77.90.141.39
2) 6 Mar 2026 PT
- Subject:
Your QuickBooks subscription is due for renewal [redacted] - Display identity:
Intuit inc - Return-path:
info@freshledas.com - Source host:
server6.freshledas.com - Source IP:
77.90.141.9
3) 13 Mar 2026 PT
- Subject:
Your QuickBooks subscription is due for renewal. [redacted] - Display identity:
notification@intuit.com - Return-path:
info@enlito.info - Source host:
server4.enlito.info - Source IP:
77.90.141.11
These were not random lookalike spam messages. These were structured Intuit and QuickBooks impersonation emails delivered from three separate IPs inside the same /24 over a short time period.
This was callback phishing, not ordinary click phishing
The QuickBooks lure in these emails was designed to push the recipient into a phone-based scam workflow. The messages claimed there was a QuickBooks subscription renewal problem, payment issue, or billing failure and instructed the recipient to call a toll-free number for assistance.
The repeated callback number in the three emails was:
+1 (803) 210-4380
That makes this a callback phishing campaign. The goal is not just to get a click. The goal is to get the target on the phone with the operator.
That matters because callback phishing often targets businesses, accounting staff, finance personnel, and users who are more likely to trust a billing problem than a generic credential theft page.
Shared fingerprints across the three emails
The three emails sent from 77.90.141.0/24 shared multiple technical fingerprints that tie them together as one operation or one reusable phishing kit.
Observed shared traits:
- same QuickBooks subscription renewal lure
- same callback number:
+1 (803) 210-4380 - same mailer fingerprint:
X-Mailer: Smart_Send_4_4_2 - same Message-ID host pattern:
@WIN-KEJVO9CLD80 - same pair of inline image attachments:
1.pngand2.png - same overall wording and structure, with only minor date changes
This is a strong cluster, not three unrelated messages.
Why these messages are more dangerous than average junk spam
These messages were built to look polished and familiar. They used Intuit and QuickBooks branding, billing language, renewal language, and a support-style phone workflow. The text was cleaner than low-grade commodity phishing. The senders also rotated throwaway domains while keeping the same lure, the same phone number, and the same mailer artifacts.
Two of the three messages authenticated cleanly for the attacker-controlled sender domains using SPF, DKIM, and DMARC. The third soft-failed SPF but still passed DKIM and DMARC. That does not make the emails legitimate. It means the phishing operator controlled the sender domains well enough to pass basic email checks for its own infrastructure.
That is a higher-effort operation than the usual low-quality phish.
Why 77.90.141.0/24 should be treated as hostile
The case against 77.90.141.0/24 does not rest on one bad domain or one isolated email. The evidence chain is broader:
- questionable routing and custody history for the BGP prefix
- new RIPE route and inetnum records appearing in Oct 2025
- later visibility under multiple origin ASNs
- active QuickBooks callback phishing sent directly from multiple IPs in the /24
- shared infrastructure fingerprints across the phishing emails
Taken together, the observed behavior is consistent with abuse-tolerant infrastructure and phishing delivery. Whether the best label is suspected stolen prefix, misappropriated prefix, or quietly taken-over netblock, the operational conclusion is the same: traffic originating from 77.90.141.0/24 should be treated as high risk.
Indicators
Prefix and ASN
77.90.141.0/24AS396073- historical origins observed in supplied routing history:
AS62425,AS208485,AS396073
Observed phishing source IPs
77.90.141.3977.90.141.977.90.141.11
Observed source hosts
server7.hgranticsy.comserver6.freshledas.comserver4.enlito.info
Observed sender domains
qbmarketpro.bizfreshledas.comenlito.info
Phishing theme
- QuickBooks subscription renewal
- QuickBooks billing problem
- Intuit impersonation
- callback phishing
Reused callback number
+1 (803) 210-4380
Shared mailer artifact
Smart_Send_4_4_2
Bottom line
77.90.141.0/24 is a suspected stolen or misappropriated prefix that is actively being used for QuickBooks callback phishing. Based on the phishing samples reviewed for this report, this was not a one-off event. The same infrastructure delivered multiple near-identical Intuit and QuickBooks lures from multiple IPs inside the same /24 between 26 Feb 2026 PT and 13 Mar 2026 PT.
That is enough to classify 77.90.141.0/24 as phishing infrastructure.


Leave a Reply