Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T12E52554626083965C2B3489C94106684B387DF4FC921877086BC5E7F1FD2EA2A795F3F |
|
CONTENT
ssdeep
|
192:cQO0YOryHjbI1javF0Ar0sLqFtPCZw7yBNQ6VyNU4JQMdBCWvoacsLjwpcBlb5hk:2Oryl7rGFdiy3Bg6BR+FhoQ |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
d2a5528dad52a75a |
|
VISUAL
aHash
|
e7e7e7fffffcfcfc |
|
VISUAL
dHash
|
0d4d4d0c00080808 |
|
VISUAL
wHash
|
00e7e7810f0c0c0c |
|
VISUAL
colorHash
|
07000000580 |
|
VISUAL
cropResistant
|
0d4d4d0c00080808,451144f4b4064145,c9c8b0b09088aa8e |
• Threat: Phishing
• Target: BT/EE customers
• Method: Impersonation via a fake login page
• Exfil: Potentially harvesting credentials or other sensitive information.
• Indicators: Free hosting with brand logo, obfuscation detected.
• Risk: HIGH
The phishing site is designed to collect user login credentials by mimicking the legitimate BT/EE website. Users will be prompted to enter their login details, which will then be sent to the attackers.
Pages with identical visual appearance (based on perceptual hash)
Found 7 other scans for this domain