Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1A232134622083965C2F3489994507684B387DF4FC9618B7086BC5E3F1FD2AA2A795F3F |
|
CONTENT
ssdeep
|
192:cQO0YOryHjbI1jetPCZw7yBNQ6VyNU4JQMdBCWvoacsLjwpcBlb5h1oQ46X8Yz+h:2OryZdiy3Bg6BR+FhoQ |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
d2a5528dad5aad52 |
|
VISUAL
aHash
|
e7e7e7fffffcfcfc |
|
VISUAL
dHash
|
4d4d4d000c000808 |
|
VISUAL
wHash
|
e0e0e680f3f0f0f0 |
|
VISUAL
colorHash
|
070000004c0 |
|
VISUAL
cropResistant
|
4d4d4d000c000808,455105f4b4a44145,c9c8b0b09088aa8e |
• Ameaça: Phishing
• Alvo: Clientes BT/EE/O2
• Método: Impersonação por meio de site falso
• Exfil: Desconhecido, provavelmente roubo de credenciais
• Indicadores: Hospedagem gratuita, logotipos da marca, URL suspeita.
• Risco: Alto
The attacker likely intends to steal user credentials by directing users to a fake login page. The 'Log In to View Your Bill' button will likely lead to a form requesting login information.
Pages with identical visual appearance (based on perceptual hash)
Found 7 other scans for this domain