Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T185131233C0132132525B52E5F8A0775A2293C32EDE4708491B7CDB913BFBDAA798795D |
|
CONTENT
ssdeep
|
768:BYRe/CtiGL13/hRJ6a+co6v+c6o4IE/Irb5dEoGEqOzVWsPk6TRC1mX6nw3GT8v:KReatpL13/fJ6fco6Gc6o4L/Irb5dEoR |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b3154d151555dd55 |
|
VISUAL
aHash
|
26e7ffe7e7e7e7ff |
|
VISUAL
dHash
|
cc0d484c4c4c4c20 |
|
VISUAL
wHash
|
00c4c4c4c7c7c7ff |
|
VISUAL
colorHash
|
07000030000 |
|
VISUAL
cropResistant
|
cc0d484c4c4c4c20 |
• Amenaza: Phishing
• Objetivo: Usuarios de Amazon
• Método: Suplantación de identidad por correo electrónico y solicitud de verificación falsa
• Exfil: Desconocido, probablemente contraseña o detalles de la cuenta a través de una página de inicio de sesión falsa (no visible en la captura de pantalla).
• Indicadores: Dominio no coincidente, logotipo de la marca, llamadas a la acción para 'verificar'
• Riesgo: Alto
The attacker sends a fake email to Amazon customers, using the Amazon brand and logo. The email includes text designed to induce a sense of urgency. The email directs the user to click a 'Continue Verification' button that will take them to a fake login page that harvests the user's account credentials.
The attacker uses social engineering tactics like fear and urgency to trick the user into clicking a link and providing their login details.
Pages with identical visual appearance (based on perceptual hash)
Found 10 other scans for this domain