Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1A232134622083965C2F3489994507684B387DF4FC9618B7086BC5E3F1FD2AA2A795F3F |
|
CONTENT
ssdeep
|
192:cQO0YOryHjbI1jetPCZw7yBNQ6VyNU4JQMdBCWvoacsLjwpcBlb5h1oQ46X8Yz+h:2OryZdiy3Bg6BR+FhoQ |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
d2a5528dad5aad52 |
|
VISUAL
aHash
|
e7e7e7fffffcfcfc |
|
VISUAL
dHash
|
4d4d4d000c000808 |
|
VISUAL
wHash
|
e0e0e680f3f0f0f0 |
|
VISUAL
colorHash
|
070000004c0 |
|
VISUAL
cropResistant
|
4d4d4d000c000808,455105f4b4a44145,c9c8b0b09088aa8e |
• Threat: Phishing
• Target: EE (BT Broadband) users
• Method: Impersonation through a fake website.
• Exfil: Unknown (likely credentials)
• Indicators: Free hosting, brand logo, and suspicious call to action.
• Risk: High
The attacker aims to steal user credentials by creating a fake login page that mimics the legitimate EE/BT site. When users enter their credentials on the fake site, the attacker captures the information.
Redirecting the user to a malicious page that then can attempt to download malware onto the users device through social engineering methods.
Pages with identical visual appearance (based on perceptual hash)
Found 7 other scans for this domain