Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1A2B27479A480223F325352C59A30FF05A3D3A78DCA065995E3FA435D7FD6D88DC0AB25 |
|
CONTENT
ssdeep
|
384:wesL9sRsSs9sDs8scLNmOq5ePnGS3b+K+KWKYnNPP:wes6RZZPnGFXVVX |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b63647c949b84ce6 |
|
VISUAL
aHash
|
00c7c7c7ffffff00 |
|
VISUAL
dHash
|
a82c2c3ce8d81c2c |
|
VISUAL
wHash
|
00878787ffff8700 |
|
VISUAL
colorHash
|
06000000180 |
|
VISUAL
cropResistant
|
0000000000000000,2c2c3c1ce83cd82c,804498a8ac1a502c,394d2d2dad2c31c8,fffffff3f3f7ffff,00000090904024c8 |
• Amenaza: Phishing
• Objetivo: Clientes de BDO
• Método: Suplantación de identidad e ingeniería social
• Exfil: Se detectaron WebSockets para la posible exfiltración de datos.
• Indicadores: Dominio reciente, javascript ofuscado, formulario con número de teléfono, suplantación de marca.
• Riesgo: ALTO
The attackers are impersonating BDO's website using a very recent domain and are attempting to obtain user information, which can then be used to gain access to their account. The page requests user's phone numbers. Furthermore, the javascript on the page is obfuscated.
The site uses social engineering by including language about a reward points program to entice users.
Pages with identical visual appearance (based on perceptual hash)