EN ES PT
Back to Stats

Visual Capture

Screenshot of bitfinex-app.net

Detection Info

https://bitfinex-app.net/
Detected Brand
Bitfinex
Country
International
Confidence
100%
HTTP Status
200
Report ID
8da4c9d1-c6e…
Analyzed
2026-02-22 11:27

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T16AA3DF234259752A4477C7D430AA1F3BD1BA994BFAE709400EDCC7F62BFAC60702B659
CONTENT ssdeep
768:SNs9tMbXReQ/GJi55RPGOrboCN8F/g0Alqcn/:d9tMbXlOJi55R+OvoCN8FBAlqcn/

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
9612ed690d773692
VISUAL aHash
00040e060600ffff
VISUAL dHash
977cecccbc0c0326
VISUAL wHash
000e0e0e0e8effff
VISUAL colorHash
02003400400
VISUAL cropResistant
bc6cccccbc0c0026,dcbd6c6cccecac7c,1c07432513161c3c

Code Analysis

Risk Score 73/100
Threat Level ALTO
āš ļø Phishing Confirmed
šŸŽ£ OTP Stealer šŸŽ£ Banking šŸŽ£ Personal Info

šŸ”¬ Threat Analysis Report

• Threat: Phishing
• Target: Bitfinex users
• Method: Credential harvesting
• Exfil: Unknown, likely to a server controlled by the attackers
• Indicators: Domain mismatch, form with sensitive fields, recent domain
• Risk: High

šŸ”’ Obfuscation Detected

  • unicode_escape

šŸ“” API Calls Detected

  • ./form/handle_form.php
  • https://amos-mamaya.fun/geo

šŸ“Š Risk Score Breakdown

Total Risk Score
90/100

Contributing Factors

Recent Domain
The domain is relatively new, which is a common tactic for phishing sites.
Form with sensitive fields
The site requests an email address, which can be used to harvest credentials.
Domain Mismatch
The domain is a clear attempt to impersonate Bitfinex, but is not the official domain.

šŸ”¬ Comprehensive Threat Analysis

Threat Type
Banking Credential Harvester
Target
Bitfinex users (International)
Attack Method
Brand impersonation + credential harvesting forms + obfuscated JavaScript
Exfiltration Channel
Form submission (backend endpoint not detected - likely JavaScript-based)
Risk Assessment
HIGH - Automated credential harvesting with Form submission (backend endpoint not detected - likely JavaScript-based)

āš ļø Indicators of Compromise

  • Kit types: OTP Stealer, Banking, Personal Info
  • 31 obfuscation techniques

šŸ¢ Brand Impersonation Analysis

Impersonated Brand
Bitfinex
Official Website
bitfinex.com
Fake Service
Signup platform

āš”ļø Attack Methodology

Primary Method: Credential Harvesting

The site mimics the appearance of a Bitfinex signup page to lure users into entering their personal information, particularly their email address.

Secondary Method: Javascript Form Submission and Obfuscation

The form utilizes Javascript, which can be used to exfiltrate the stolen information. Obfuscation techniques are often used to try to evade detection.

🌐 Infrastructure Indicators of Compromise

Domain Information

Domain
bitfinex-app.net
Registered
2024-03-07
Registrar
Namecheap, Inc.
Status
clientTransferProhibited

šŸ¤– AI-Extracted Threat Intelligence

Scan History for bitfinex-app.net

Found 1 other scan for this domain

😰
"I Never Thought It Would Happen to Me"
That's what 2.3 million victims say every year. Don't wait to become a statistic.