Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1A56224705889EE3701E7A6D1CB71AB3DE1C192A6CA765D05C2F8878D4F46FADCE03906 |
|
CONTENT
ssdeep
|
192:VjoEJKsPVzRACInJ+PmifkYK76AL4zKSpwj5bXkTRLTT3SPo73q:Wpsa6Zw6nlb6Wa |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
aced43929238e1ed |
|
VISUAL
aHash
|
fffffbffff000000 |
|
VISUAL
dHash
|
1c2213372452f0d4 |
|
VISUAL
wHash
|
ffffc3d7d7000000 |
|
VISUAL
colorHash
|
070020001c0 |
|
VISUAL
cropResistant
|
163803121f372642,0c3232320aa49409,809248b2b2969680,00143070ccd4d4d4 |
• Ameaça: Kit de phishing para roubo de credenciais
• Alvo: Usuários do imToken internacionalmente
• Método: Formulário falso que rouba credenciais de usuário
• Exfil: Dados enviados para URL de ação de formulário externo
• Indicadores: Domínio suspeito, JavaScript ofuscado, marca não coincidente
• Risco: ALTO - Roubo imediato de credenciais
The phishing site mimics imToken's interface to trick users into entering their wallet credentials. The Credential Harvester kit captures input in real-time and transmits it to the attacker's server, enabling immediate unauthorized access to the victim's cryptocurrency wallet.
The OTP Stealer kit may intercept one-time passwords or 2FA codes sent to the victim's device, bypassing additional security layers to authorize fraudulent transactions.
Obfuscated JavaScript file containing credential harvesting and OTP interception logic.
Here's a generic ASCII art attack flow diagram for the phishing attack:
```
┌──────────────────────────────────────────────────────────┐
│ 1. INITIAL ACCESS │
│ - Victim directed to fake crypto wallet page │
└────────────────────┬─────────────────────────────────────┘
│
▼
┌──────────────────────────────────────────────────────────┐
│ 2. FAKE INTERFACE DISPLAY │
│ - Spoofed wallet login form presented │
└────────────────────┬─────────────────────────────────────┘
│
▼
┌──────────────────────────────────────────────────────────┐
│ 3. CREDENTIAL CAPTURE │
│ - User enters wallet credentials │
│ - Form collects sensitive information │
└────────────────────┬─────────────────────────────────────┘
│
▼
┌──────────────────────────────────────────────────────────┐
│ 4. DATA TRANSMISSION │
│ - Stolen credentials sent via HTTP POST │
│ - Single endpoint receives harvested data │
└──────────────────────────────────────────────────────────┘
```
Here's a generic ASCII art attack flow diagram for the phishing attack:
```
┌──────────────────────────────────────────────────────────┐
│ 1. INITIAL ACCESS │
│ - Victim directed to fake crypto wallet page │
└────────────────────┬─────────────────────────────────────┘
│
▼
┌──────────────────────────────────────────────────────────┐
│ 2. FAKE INTERFACE DISPLAY │
│ - Spoofed wallet login form presented │
└────────────────────┬─────────────────────────────────────┘
│
▼
┌──────────────────────────────────────────────────────────┐
│ 3. CREDENTIAL CAPTURE │
│ - User enters wallet credentials │
│ - Form collects sensitive information │
└────────────────────┬─────────────────────────────────────┘
│
▼
┌──────────────────────────────────────────────────────────┐
│ 4. DATA TRANSMISSION │
│ - Stolen credentials sent via HTTP POST │
│ - Single endpoint receives harvested data │
└──────────────────────────────────────────────────────────┘
```
Pages with identical visual appearance (based on perceptual hash)