EN ES PT
Back to Stats

Visual Capture

Screenshot of ldgeer-ledger.webflow.io

Detection Info

https://ldgeer-ledger.webflow.io/
Detected Brand
Ledger
Country
International
Confidence
95%
HTTP Status
200
Report ID
1aabbc7d-f62…
Analyzed
2026-03-04 00:11

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T1F7D1C827C544111E5F2702A8E69FB7FEC3E6405DB7A44CE968B8825E33D910A83F6DD1
CONTENT ssdeep
192:+iIGPWw2gKatuaKy3/OYElsi66tKGrNu3:XWw2gKatuaKy3LECkt3u3

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
c16bd4906bd1947e
VISUAL aHash
7c000000007e7e7e
VISUAL dHash
d8c0c0c0d0d0dcc4
VISUAL wHash
7e0000607e7e7e7e
VISUAL colorHash
3a000e00000
VISUAL cropResistant
a280c1899dccc0a2,c03030d098383080,a2808ba3a3a7a781,d8c0c0c0d0d0dcc4

Code Analysis

Risk Score 53/100
Threat Level ALTO
⚠️ Phishing Confirmed
🎣 Credential Harvester

🔬 Threat Analysis Report

• Threat: Phishing
• Target: Ledger users
• Method: Impersonation via a fake website.
• Exfil: Unknown, likely harvesting login credentials or other sensitive information.
• Indicators: Free hosting (webflow.io) + Ledger logo.
• Risk: High

🔒 Obfuscation Detected

  • fromCharCode

📊 Risk Score Breakdown

Total Risk Score
90/100

Contributing Factors

Free Hosting
The site is hosted on a free platform (webflow.io), which is a common indicator of phishing.
Impersonation
The website attempts to mimic the Ledger website's appearance.

🔬 Comprehensive Threat Analysis

Threat Type
Credential Harvesting Kit
Target
Ledger users (International)
Attack Method
Brand impersonation + credential harvesting forms + obfuscated JavaScript
Exfiltration Channel
Form submission (backend endpoint not detected - likely JavaScript-based)
Risk Assessment
MEDIUM - Automated credential harvesting with Form submission (backend endpoint not detected - likely JavaScript-based)

⚠️ Indicators of Compromise

  • Kit types: Credential Harvester
  • 2 obfuscation techniques

🏢 Brand Impersonation Analysis

Impersonated Brand
Ledger
Official Website
https://www.ledger.com/
Fake Service
Ledger Live Web

⚔️ Attack Methodology

Primary Method: Credential Harvesting

The attacker likely aims to steal user credentials by mimicking the Ledger website and prompting users to enter their login information.

Secondary Method: Wallet connection

The attacker may redirect users to a fraudulent wallet connection to steal crypto assets.

🌐 Infrastructure Indicators of Compromise

Domain Information

Domain
ldgeer-ledger.webflow.io
Registered
None
Registrar
None
Status
Inactive

🤖 AI-Extracted Threat Intelligence

😰
"I Never Thought It Would Happen to Me"
That's what 2.3 million victims say every year. Don't wait to become a statistic.