EN ES PT
Back to Stats

Visual Capture

Screenshot of docs.google.com

Detection Info

https://docs.google.com/forms/d/e/1FAIpQLSdtq47ivcAiicWXlVJTCFwSi6Eo2JNoRuC-mLdZuzXqdH1B4w/viewform
Detected Brand
Canada Post
Country
Canada
Confidence
100%
HTTP Status
200
Report ID
e1f1ee3a-2d3โ€ฆ
Analyzed
2026-02-23 14:22

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T12F52F973B122BC3B02138AE5B499BB1EB5A3924ECC1F106159BC13D12FECD91B09B746
CONTENT ssdeep
192:Flh+Hm+iQvI0ogxPorL+AZ+YaEs98tTuBcqauYI/YT5Y1:F+G+UJQQfvs2tTuBcq9YuYVY1

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
b13167663470cece
VISUAL aHash
c3c3ffcfffffffff
VISUAL dHash
8e9e60900c280000
VISUAL wHash
c0c0cccce4f8fc7c
VISUAL colorHash
070000001c2
VISUAL cropResistant
8e9e60900c280000,71ccd43313941561

Code Analysis

Risk Score 85/100
Threat Level ALTO
โš ๏ธ Phishing Confirmed
๐ŸŽฃ Credential Harvester ๐ŸŽฃ OTP Stealer ๐ŸŽฃ Banking ๐ŸŽฃ Personal Info

๐Ÿ”ฌ Threat Analysis Report

โ€ข Threat: Impersonation/Phishing
โ€ข Target: Canada Post customers
โ€ข Method: Deceptive Google Form.
โ€ข Exfil: The IP address provided. Potential redirection to malicious site.
โ€ข Indicators: IP address in link, brand impersonation.
โ€ข Risk: High

๐Ÿ” Credential Harvesting Forms

๐Ÿ”’ Obfuscation Detected

  • atob
  • eval
  • fromCharCode
  • unescape
  • hex_escape
  • unicode_escape
  • base64_strings

๐Ÿ“ค Form Action Targets

  • https://docs.google.com/forms/d/e/1FAIpQLSdtq47ivcAiicWXlVJTCFwSi6Eo2JNoRuC-mLdZuzXqdH1B4w/formResponse

๐Ÿ“Š Risk Score Breakdown

Total Risk Score
90/100

Contributing Factors

Brand Impersonation
The form attempts to impersonate Canada Post.
Suspicious Link
The link uses an IP address, not a legitimate Canada Post domain.
Use of Google Forms for a Likely Attack
The combination of the above with a Google Form adds suspicion.

๐Ÿ”ฌ Comprehensive Threat Analysis

Threat Type
Banking Credential Harvester
Target
Canada Post users (Canada)
Attack Method
Brand impersonation + credential harvesting forms + obfuscated JavaScript
Exfiltration Channel
HTTP POST to backend
Risk Assessment
CRITICAL - Automated credential harvesting with HTTP POST to backend

โš ๏ธ Indicators of Compromise

  • Kit types: Credential Harvester, OTP Stealer, Banking, Personal Info
  • 32 obfuscation techniques

๐Ÿข Brand Impersonation Analysis

Impersonated Brand
Canada Post
Official Website
https://www.canadapost-postescanada.ca/cpc/en
Fake Service
Delivery Notification

Fraudulent Claims

โš”๏ธ Attack Methodology

Primary Method: Brand Impersonation / Phishing

The attacker creates a Google Form designed to look like a communication from Canada Post. The user is prompted to click a malicious link to resolve a delivery issue.

Secondary Method: Social Engineering

The email uses a sense of urgency (delivery failed) to trick the user into clicking the link.

๐ŸŒ Infrastructure Indicators of Compromise

Domain Information

Domain
None
Registered
None
Registrar
None
Status
None

๐Ÿค– AI-Extracted Threat Intelligence

๐Ÿ˜ฐ
"I Never Thought It Would Happen to Me"
That's what 2.3 million victims say every year. Don't wait to become a statistic.