Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T139523246260839A5C2B3489C94506684B387DB4FC921877086BC5E7F1FD2EA2A795F3F |
|
CONTENT
ssdeep
|
192:cQO0YOryHjbI1jaZPc4alDtPCZw7yBNQ6VyNU4JQMdBCWvoacsLjwpcBlb5h1oQg:2OryW4udiy3Bg6BR+FhoQ |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
d2a5528dad52a75a |
|
VISUAL
aHash
|
e7e7e7fffffcfcfc |
|
VISUAL
dHash
|
0d4d4d0c00080808 |
|
VISUAL
wHash
|
00e7e381f3f0f0f0 |
|
VISUAL
colorHash
|
07000000580 |
|
VISUAL
cropResistant
|
0d4d4d0c00080808,451144f4b4064145,c9c8b0b09088aa8e |
• Threat: Phishing
• Target: BT/EE customers
• Method: Impersonation through a fake login page
• Exfil: Likely credentials harvesting
• Indicators: Free hosting, brand logo
• Risk: High
The site likely attempts to steal login credentials through a fake login form that redirects to the actual BT/EE website. Users enter their credentials and are redirected to the real site, unaware their information has been stolen.
Redirecting users to a phishing page after successful login is another common tactic.
Pages with identical visual appearance (based on perceptual hash)
Found 1 other scan for this domain