Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T12CE3BD32C0423033A1AB56D5F860677926D3C22DDF0B08452BBCDB963FEBD967592A1D |
|
CONTENT
ssdeep
|
3072:egA76cUOugiUhoSWeBYVplVX/cn3x/hSCVuDdi5NvHao7LVq3u/19/JSA4LGZPI8:JA76cUOugiUhoSWeBYVplVX/cn3x/hSg |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
911155555d7d7d28 |
|
VISUAL
aHash
|
003c3cbc3c3c3c3c |
|
VISUAL
dHash
|
b0d8f06060606060 |
|
VISUAL
wHash
|
003d7cfc3c3c3c3c |
|
VISUAL
colorHash
|
07200008180 |
|
VISUAL
cropResistant
|
b0d8f06060606060 |
• Ameaça: Falsificação de identidade/Phishing
• Alvo: JCB (alvo potencial da tentativa de phishing)
• Método: Falsificação de domínio, engenharia social
• Exfil: Potencialmente o domínio alvo coletará credenciais.
• Indicadores: Incompatibilidade de domínio, conteúdo suspeito, texto em idioma japonês.
• Risco: Alto
The attackers are likely attempting to steal the user's credentials by leading them to a fake login page on the my.jcb.co.jp domain. They probably use a phishing technique.
The attacker uses the document title to trick the user.
Pages with identical visual appearance (based on perceptual hash)
Found 10 other scans for this domain