Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1C7F1C62FD208110D0F2441F97A1053AFE35A50DEF2228FDE7DFAD43C62965A58972DDA |
|
CONTENT
ssdeep
|
192:sjTP0zwTw8tUM7J6aZeMJU/UfNO3xMueO/KxON1r:e76wTw8tUM77cBcceueO/1r |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
a525d1d8ccced287 |
|
VISUAL
aHash
|
c3030383f7ffffff |
|
VISUAL
dHash
|
96164e2626b446ae |
|
VISUAL
wHash
|
03030303e3f73f5f |
|
VISUAL
colorHash
|
06038000000 |
|
VISUAL
cropResistant
|
96164e2626b446ae |
• Amenaza: Phishing
• Objetivo: Usuarios de KuCoin
• Método: Suplantación de identidad mediante clonación de sitios web en hosting gratuito
• Exfil: Desconocido, probablemente robo de credenciales
• Indicadores: Hosting gratuito, logotipo de la marca presente, formulario de registro
• Riesgo: ALTO
The attacker aims to steal user credentials (email/phone and password) by creating a fake KuCoin sign-up page. The user is tricked into entering their information, which the attacker then collects.
Pages with identical visual appearance (based on perceptual hash)