Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T13193B8B29251243320BFB1D5F1297709A2D3D74EC68287D1F2F8A36B1ED6CA1F817856 |
|
CONTENT
ssdeep
|
1536:OYMXWnSras7uOQHor8BPmzzXXMd6MiucCOK:BMXWds7uOTkmzzXXMd6M1cCOK |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
a41363933cccecd3 |
|
VISUAL
aHash
|
0000e3dbffffffc3 |
|
VISUAL
dHash
|
c8c8ae3638002606 |
|
VISUAL
wHash
|
000042c3dfffdfc3 |
|
VISUAL
colorHash
|
072000082c0 |
|
VISUAL
cropResistant
|
c8c8ae3638002606 |
• Ameaça: Kit de phishing para roubo de credenciais
• Alvo: Usuários do Roblox internacionalmente
• Método: Formulário falso que rouba credenciais de usuário
• Exfil: Possível exfiltração de dados via JavaScript ofuscado
• Indicadores: Domínio incorreto, TLD de país, JS ofuscado
• Risco: ALTO - Roubo imediato de credenciais
The phishing page presents a fake Roblox login form with 'Email' and 'Password' fields. Submitted credentials are intercepted in real-time and exfiltrated to an attacker-controlled server for immediate account takeover.
Additional forms or fields may be dynamically loaded to capture sensitive personal information, such as payment details or security questions, for further exploitation or identity theft.
Large obfuscated JavaScript file containing credential harvesting and data exfiltration logic.
Here's a generic ASCII art attack flow diagram for the phishing attack:
```
┌──────────────────────────────────────────────────────────┐
│ 1. INITIAL CONTACT │
│ - Victim receives phishing link (email/message) │
│ - Directed to fake Roblox login page │
└────────────────────┬─────────────────────────────────────┘
│
▼
┌──────────────────────────────────────────────────────────┐
│ 2. FAKE LOGIN PAGE │
│ - Mimics legitimate Roblox interface │
│ - Presents credential input form │
└────────────────────┬─────────────────────────────────────┘
│
▼
┌──────────────────────────────────────────────────────────┐
│ 3. CREDENTIAL SUBMISSION │
│ - Victim enters username/password │
│ - Form appears to process login │
└────────────────────┬─────────────────────────────────────┘
│
▼
┌──────────────────────────────────────────────────────────┐
│ 4. DATA EXFILTRATION │
│ - Credentials sent via HTTP POST │
│ - Data received by attacker-controlled server │
└──────────────────────────────────────────────────────────┘
```
Here's a generic ASCII art attack flow diagram for the phishing attack:
```
┌──────────────────────────────────────────────────────────┐
│ 1. INITIAL CONTACT │
│ - Victim receives phishing link (email/message) │
│ - Directed to fake Roblox login page │
└────────────────────┬─────────────────────────────────────┘
│
▼
┌──────────────────────────────────────────────────────────┐
│ 2. FAKE LOGIN PAGE │
│ - Mimics legitimate Roblox interface │
│ - Presents credential input form │
└────────────────────┬─────────────────────────────────────┘
│
▼
┌──────────────────────────────────────────────────────────┐
│ 3. CREDENTIAL SUBMISSION │
│ - Victim enters username/password │
│ - Form appears to process login │
└────────────────────┬─────────────────────────────────────┘
│
▼
┌──────────────────────────────────────────────────────────┐
│ 4. DATA EXFILTRATION │
│ - Credentials sent via HTTP POST │
│ - Data received by attacker-controlled server │
└──────────────────────────────────────────────────────────┘
```
Pages with identical visual appearance (based on perceptual hash)
Found 10 other scans for this domain