Detailed analysis of captured phishing page
• Amenaza: Kit de phishing para robo de credenciales
• Objetivo: Usuarios de DHL internacionalmente
• Método: Formulario falso que roba contraseñas
• Exfil: Desconocido, probablemente enviado al servidor del atacante
• Indicadores: Dominio no relacionado, imita la marca DHL, formulario de inicio de sesión presente
• Riesgo: ALTO - Robo inmediato de credenciales
The phishing page impersonates DHL and presents a login form to harvest victim credentials. Once submitted, the credentials are likely exfiltrated to an attacker-controlled server for unauthorized access to DHL accounts.
The harvested credentials can be used for further attacks, such as accessing linked services, stealing personal data, or conducting fraudulent transactions.
┌──────────────────────────────────────────────────────────┐
│ 1. VICTIM RECEIVES PHISHING EMAIL │
│ - Email mimics DHL branding │
│ - Contains link to fake login page │
└────────────────────┬─────────────────────────────────────┘
│
▼
┌──────────────────────────────────────────────────────────┐
│ 2. FAKE LOGIN PAGE DISPLAYED │
│ - Victim enters Banking credentials │
│ - Form appears legitimate (DHL branding) │
└────────────────────┬─────────────────────────────────────┘
│
▼
┌──────────────────────────────────────────────────────────┐
│ 3. CREDENTIAL CAPTURE │
│ - Input data collected by attacker │
│ - Victim redirected to error page │
└────────────────────┬─────────────────────────────────────┘
│
▼
┌──────────────────────────────────────────────────────────┐
│ 4. DATA EXFILTRATION │
│ - Stolen credentials sent via HTTP POST │
│ - Standard form submission to attacker server │
└────────────────────┬─────────────────────────────────────┘
│
▼
┌──────────────────────────────────────────────────────────┐
│ 5. ACCOUNT TAKEOVER │
│ - Attacker uses credentials to access victim's bank │
│ - Unauthorized transactions initiated │
└──────────────────────────────────────────────────────────┘
┌──────────────────────────────────────────────────────────┐
│ 1. VICTIM RECEIVES PHISHING EMAIL │
│ - Email mimics DHL branding │
│ - Contains link to fake login page │
└────────────────────┬─────────────────────────────────────┘
│
▼
┌──────────────────────────────────────────────────────────┐
│ 2. FAKE LOGIN PAGE DISPLAYED │
│ - Victim enters Banking credentials │
│ - Form appears legitimate (DHL branding) │
└────────────────────┬─────────────────────────────────────┘
│
▼
┌──────────────────────────────────────────────────────────┐
│ 3. CREDENTIAL CAPTURE │
│ - Input data collected by attacker │
│ - Victim redirected to error page │
└────────────────────┬─────────────────────────────────────┘
│
▼
┌──────────────────────────────────────────────────────────┐
│ 4. DATA EXFILTRATION │
│ - Stolen credentials sent via HTTP POST │
│ - Standard form submission to attacker server │
└────────────────────┬─────────────────────────────────────┘
│
▼
┌──────────────────────────────────────────────────────────┐
│ 5. ACCOUNT TAKEOVER │
│ - Attacker uses credentials to access victim's bank │
│ - Unauthorized transactions initiated │
└──────────────────────────────────────────────────────────┘
Found 10 other scans for this domain