EN ES PT
Back to Stats

Visual Capture

Screenshot of bdo-2t2.com

Detection Info

https://bdo-2t2.com/ph
Detected Brand
BDO (BDO Unibank)
Country
International
Confidence
100%
HTTP Status
200
Report ID
c0033103-0dd…
Analyzed
2026-03-02 03:20

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T1A2B27479A480223F325352C59A30FF05A3D3A78DCA065995E3FA435D7FD6D88DC0AB25
CONTENT ssdeep
384:wesL9sRsSs9sDs8scLNmOq5ePnGS3b+K+KWKYnNPP:wes6RZZPnGFXVVX

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
b63647c949b84ce6
VISUAL aHash
00c7c7c7ffffff00
VISUAL dHash
a82c2c3ce8d81c2c
VISUAL wHash
00878787ffff8700
VISUAL colorHash
06000000180
VISUAL cropResistant
0000000000000000,2c2c3c1ce83cd82c,804498a8ac1a502c,394d2d2dad2c31c8,fffffff3f3f7ffff,00000090904024c8

Code Analysis

Risk Score 94/100
Threat Level ALTO
⚠️ Phishing Confirmed
🎣 Credential Harvester 🎣 OTP Stealer 🎣 Card Stealer 🎣 Banking 🎣 Personal Info
WebSocket C2

🔬 Threat Analysis Report

• Threat: Phishing
• Target: BDO customers
• Method: Impersonation and Social Engineering
• Exfil: WebSockets detected for potential data exfiltration.
• Indicators: Recent domain, obfuscated javascript, form with phone number, brand impersonation.
• Risk: HIGH

🔒 Obfuscation Detected

  • fromCharCode
  • unescape
  • base64_strings

🎯 Kit Endpoints

  • https://www.bdo.com.ph/business/business-solutions/cash-management/business-login

📊 Risk Score Breakdown

Total Risk Score
90/100

Contributing Factors

Domain Age
The domain is very new, indicating it was likely created for malicious purposes.
Obfuscated Javascript
Obfuscated Javascript is a common method of hiding malicious code.
Brand Impersonation
The site mimics BDO's website, increasing the likelihood of users falling for the scam.
Forms
Form requesting sensitive information to be used for phishing/pharming.

🔬 Comprehensive Threat Analysis

Threat Type
Banking Credential Harvester
Target
BDO (BDO Unibank) users (International)
Attack Method
Brand impersonation + credential harvesting forms + real-time WebSocket exfiltration + obfuscated JavaScript
Exfiltration Channel
WebSocket (1 endpoints)
Risk Assessment
CRITICAL - Automated credential harvesting with WebSocket (1 endpoints)

⚠️ Indicators of Compromise

  • Kit types: Credential Harvester, OTP Stealer, Card Stealer, Banking, Personal Info
  • 5 obfuscation techniques

🏢 Brand Impersonation Analysis

Impersonated Brand
BDO (BDO Unibank)
Official Website
null
Fake Service
BDO Rewards Program

Fraudulent Claims

⚔️ Attack Methodology

Primary Method: Phishing through Brand Impersonation

The attackers are impersonating BDO's website using a very recent domain and are attempting to obtain user information, which can then be used to gain access to their account. The page requests user's phone numbers. Furthermore, the javascript on the page is obfuscated.

Secondary Method: Social Engineering

The site uses social engineering by including language about a reward points program to entice users.

🌐 Infrastructure Indicators of Compromise

Domain Information

Domain
bdo-2t2.com
Registered
2024-02-26
Registrar
Unknown
Status
active

🤖 AI-Extracted Threat Intelligence

Scan History for bdo-2t2.com

Found 1 other scan for this domain

😰
"I Never Thought It Would Happen to Me"
That's what 2.3 million victims say every year. Don't wait to become a statistic.