Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1A2B27479A480223F325352C59A30FF05A3D3A78DCA065995E3FA435D7FD6D88DC0AB25 |
|
CONTENT
ssdeep
|
384:wesL9sRsSs9sDs8scLNmOq5ePnGS3b+K+KWKYnNPP:wes6RZZPnGFXVVX |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b63647c949b84ce6 |
|
VISUAL
aHash
|
00c7c7c7ffffff00 |
|
VISUAL
dHash
|
a82c2c3ce8d81c2c |
|
VISUAL
wHash
|
00878787ffff8700 |
|
VISUAL
colorHash
|
06000000180 |
|
VISUAL
cropResistant
|
0000000000000000,2c2c3c1ce83cd82c,804498a8ac1a502c,394d2d2dad2c31c8,fffffff3f3f7ffff,00000090904024c8 |
• Threat: Phishing
• Target: BDO customers
• Method: Impersonation and Social Engineering
• Exfil: WebSockets detected for potential data exfiltration.
• Indicators: Recent domain, obfuscated javascript, form with phone number, brand impersonation.
• Risk: HIGH
The attackers are impersonating BDO's website using a very recent domain and are attempting to obtain user information, which can then be used to gain access to their account. The page requests user's phone numbers. Furthermore, the javascript on the page is obfuscated.
The site uses social engineering by including language about a reward points program to entice users.
Pages with identical visual appearance (based on perceptual hash)