Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T185131233C0132132525B52E5F8A0775A2293C32EDE4708491B7CDB913BFBDAA798795D |
|
CONTENT
ssdeep
|
768:BYRe/CtiGL13/hRJ6a+co6v+c6o4IE/Irb5dEoGEqOzVWsPk6TRC1mX6nw3GT8v:KReatpL13/fJ6fco6Gc6o4L/Irb5dEoR |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b3154d151555dd55 |
|
VISUAL
aHash
|
26e7ffe7e7e7e7ff |
|
VISUAL
dHash
|
cc0d484c4c4c4c20 |
|
VISUAL
wHash
|
00c4c4c4c7c7c7ff |
|
VISUAL
colorHash
|
07000030000 |
|
VISUAL
cropResistant
|
cc0d484c4c4c4c20 |
• Threat: Phishing
• Target: Amazon Users
• Method: Impersonation via email and fake verification request
• Exfil: Unknown, likely password or account details through a fake login page (not visible in the screenshot).
• Indicators: Mismatched domain, brand logo, calls to action to 'verify'
• Risk: High
The attacker sends a fake email to Amazon customers, using the Amazon brand and logo. The email includes text designed to induce a sense of urgency. The email directs the user to click a 'Continue Verification' button that will take them to a fake login page that harvests the user's account credentials.
The attacker uses social engineering tactics like fear and urgency to trick the user into clicking a link and providing their login details.
Pages with identical visual appearance (based on perceptual hash)
Found 10 other scans for this domain