Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T134B419A8F2B0640D43A7017A617F354473B6691EA56944287679CCEAB8E494C323FFFC |
|
CONTENT
ssdeep
|
6144:tRPyUDP0SutXn0HphBXi+ZcWW3Djwe6N8wXVB3q7lBIq5LtBo+8clJ:qOclSV0Bj5NlX |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
f7227588dd88d998 |
|
VISUAL
aHash
|
e7e7e7e7fffffffe |
|
VISUAL
dHash
|
4d4d4d4d000c0000 |
|
VISUAL
wHash
|
00e7242481ff3d3c |
|
VISUAL
colorHash
|
0700000008b |
|
VISUAL
cropResistant
|
4d4d4d4d000c0000,40cccccc8ccd06e8 |
โข Threat: Phishing
โข Target: BT/EE customers
โข Method: Impersonation through a fake update page.
โข Exfil: Unknown, but most likely data harvesting.
โข Indicators: Free hosting, brand logo, call to action.
โข Risk: High
The attacker likely aims to steal user credentials by creating a fake login page that mimics the appearance of the BT/EE website.
Pages with identical visual appearance (based on perceptual hash)
Found 4 other scans for this domain