EN ES PT
Back to Stats

Captura Visual

Screenshot of kntn.ly

Información de Detección

https://kntn.ly/20dfde68
Detected Brand
myGov
Country
Australia
Confidence
100%
HTTP Status
200
Report ID
033b5f76-ef6…
Analyzed
2026-02-25 17:14
Final URL (after redirects)
https://login-mygov-au.base44.app/

Hashes de Contenido (Similitud HTML)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T1B922D83612501E7F5A03C688F6D4B319A79FA257C677D849B1EC835B23D2E21DD231B8
CONTENT ssdeep
192:8XO6uEkEkX2XS445iPxOYs4YgAlXU1jRXVRXJWYThkkXGXXpRDeJW:5gxOYVYkjRXVRXJWYqJXDeA

Hashes Visuales (Similitud de Captura)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
b3b34c990de44ce6
VISUAL aHash
0effe7ffffffff00
VISUAL dHash
da1c0e189d140e20
VISUAL wHash
00c7c3ffc7cfc300
VISUAL colorHash
06007000000
VISUAL cropResistant
c2180e0e1c16160e,2000606008600020

Análisis de Código

Risk Score 94/100
Threat Level ALTO
⚠️ Phishing Confirmed
🎣 Credential Harvester 🎣 OTP Stealer 🎣 Banking 🎣 Personal Info
⚡ Supabase Backend

🔬 Threat Analysis Report

• Amenaza: Phishing
• Objetivo: Ciudadanos australianos (usuarios de myGov)
• Método: Suplantación de identidad
• Exfil: qtrypzzcjebvfcihiynt.supabase.co
• Indicadores: Coincidencia de dominio, Ofuscación de Javascript
• Riesgo: Alto

🔒 Obfuscation Detected

  • fromCharCode
  • unescape
  • base64_strings

🎯 Kit Endpoints

  • https://login-mygov-au.base44.app
  • https://login-mygov-au.base44.app/manifest.json

☁️ Cloud Backend

  • Supabase: qtrypzzcjebvfcihiynt.supabase.co

📊 Desglose de Puntuación de Riesgo

Total Risk Score
90/100

Contributing Factors

Domain Mismatch
The domain kntn.ly does not belong to the brand.
JavaScript Obfuscation
Javascript obfuscation found, which is a common tactic to hide malicious code.
Forms and Credentials
Page contains a form asking for username and password.

🔬 Análisis Integral de Amenazas

Tipo de Amenaza
Banking Credential Harvester
Objetivo
myGov users (Australia)
Método de Ataque
Brand impersonation + credential harvesting forms + obfuscated JavaScript
Canal de Exfiltración
Supabase Database
Evaluación de Riesgo
CRITICAL - Automated credential harvesting with Supabase Database

⚠️ Indicators of Compromise

  • Kit types: Credential Harvester, OTP Stealer, Banking, Personal Info
  • 4 obfuscation techniques

🏢 Análisis de Suplantación de Marca

Impersonated Brand
myGov
Official Website
https://www.my.gov.au/
Fake Service
myGov login

⚔️ Metodología de Ataque

Primary Method: Credential Harvesting

The attacker is attempting to steal login credentials for myGov accounts. The victim is tricked into entering their username and password on a fake login form.

Secondary Method: JavaScript Obfuscation

The use of JavaScript obfuscation is to hide malicious code or credential harvesting, making it more difficult to detect the phishing attempt.

🌐 Indicadores de Compromiso de Infraestructura

Domain Information

Domain
kntn.ly
Registered
2021-08-18T10:03:33+00:00
Registrar
None
Status
None

🤖 AI-Extracted Threat Intelligence

Similar Websites

Pages with identical visual appearance (based on perceptual hash)

😰
"Nunca pensé que me pasaría a mí"
Esto dicen las 2.3 millones de víctimas cada año. No esperes a ser una estadística.