How I Got In: The Raffle Phishing Campaign

by | Jul 4, 2025 | How I Got In







Linkedin recon image for phishing campaign


Phishing campaign LinkedIn phone number



Screenshot showing the National board of trustees



Excel doc to entice the user to enable macro


Macro-laced Excel document used in a real-world social engineering attack. The payload launches on click of "Enable Content."



Golf clubs image in the Excel document after enabling the macro


Reverse shell established through malicious macro


Email with clients address and fedex number inside.



domain admin access



Phishing campaign landing page mimicking their Outlook web app


Error page for the phishing campaign


Phishing email sent to employees


Realistic phishing portal used to harvest credentials during a simulated social engineering attack



Field rep login portal


Field rep found on LinkedIn


Field rep login credentials





What tool did you use to create the payload?

We used a VBA macro embedded in an Excel file to launch a PowerShell reverse shell. The connection came back over port 443 to a listener we controlled.

Would this kind of macro attack still work today?

Not in the same way. Microsoft now disables macros by default in downloaded files. Most modern environments would block this unless the user manually enabled it through multiple steps. Today, we would adapt the technique based on updated protections.

Did the CEO ever find out?

No. The engagement was performed quietly with internal coordination from the client. He was never told the details directly.

How long did it take to go from the first phone call to domain admin?

Less than a week from start to finish. Initial access came within 48 hours. Lateral movement and privilege escalation took another day or two.

What could have stopped this?

User training. Proper local admin controls. Endpoint monitoring. And most importantly, a security culture where people are encouraged to verify even the most believable requests.

Have any questions?

Fill out the form below

Leading-Edge Penetration Testing

Services