Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1A232134622083965C2F3489994507684B387DF4FC9618B7086BC5E3F1FD2AA2A795F3F |
|
CONTENT
ssdeep
|
192:cQO0YOryHjbI1jetPCZw7yBNQ6VyNU4JQMdBCWvoacsLjwpcBlb5h1oQ46X8Yz+h:2OryZdiy3Bg6BR+FhoQ |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
d2a5528dad5aad52 |
|
VISUAL
aHash
|
e7e7e7fffffcfcfc |
|
VISUAL
dHash
|
4d4d4d000c000808 |
|
VISUAL
wHash
|
e0e0e680f3f0f0f0 |
|
VISUAL
colorHash
|
070000004c0 |
|
VISUAL
cropResistant
|
4d4d4d000c000808,455105f4b4a44145,c9c8b0b09088aa8e |
• Ameaça: Phishing
• Alvo: Usuários da EE (BT Broadband)
• Método: Personificação através de um site falso.
• Exfil: Desconhecido (provavelmente credenciais)
• Indicadores: Hospedagem gratuita, logotipo da marca e chamada para ação suspeita.
• Risco: Alto
The attacker aims to steal user credentials by creating a fake login page that mimics the legitimate EE/BT site. When users enter their credentials on the fake site, the attacker captures the information.
Redirecting the user to a malicious page that then can attempt to download malware onto the users device through social engineering methods.
Pages with identical visual appearance (based on perceptual hash)
Found 7 other scans for this domain