Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T19981737795A8E815D320C3F86DA5229CE247918FC6C0D99776D2802E23FCA1D442BE65 |
|
CONTENT
ssdeep
|
96:tXv4a9TPSw/eARlHAttADAfAR11luuKo74ATON1r:9l9TPSwmsstE8XGON1r |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
ec68669793999991 |
|
VISUAL
aHash
|
e18191d9ffff8fff |
|
VISUAL
dHash
|
e32733b34436562c |
|
VISUAL
wHash
|
010101d1ff9f83ff |
|
VISUAL
colorHash
|
07038000000 |
|
VISUAL
cropResistant
|
e32733b34436562c |
• Ameaça: Phishing
• Alvo: Usuários KuCoin
• Método: Personificação através de um site semelhante hospedado em hospedagem gratuita.
• Exfil: Potencialmente roubo de credenciais (e-mail/telefone e senha)
• Indicadores: Hospedagem gratuita, logotipo da marca, formulários
• Risco: Alto
The attacker is attempting to steal user's KuCoin account credentials by creating a fake login page that mimics the legitimate website's design. Users are tricked into entering their information into the malicious form.
The attacker may use various social engineering techniques to direct users to the fake site. This could include phishing emails, social media posts, or search engine optimization.
Pages with identical visual appearance (based on perceptual hash)
Found 1 other scan for this domain