Detailed analysis of captured phishing page
No screenshot available
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1AF2138749210C816018353857FB12645B3818346EA271E4426F7876D1EF5E87CC1E465 |
|
CONTENT
ssdeep
|
24:nfCLBADenvFZoZJjiMfpRgl7Xo3hOvW0qwa:ngBIenvEZViMfEt4L1 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
f81ffa150af007f0 |
|
VISUAL
aHash
|
c0c000000000c0c1 |
|
VISUAL
dHash
|
2000400000609015 |
|
VISUAL
wHash
|
f0f0f0f03030f0f1 |
|
VISUAL
colorHash
|
38000000e00 |
|
VISUAL
cropResistant
|
aaa298cdcd8ca2aa,2000400000609015 |
• Threat: Phishing attack targeting Ledger users
• Target: Users of Ledger cryptocurrency wallets
• Method: Displaying a fake Ledger landing page on free hosting to deceive users.
• Exfil: Unknown, but likely aimed at stealing credentials or private keys.
• Indicators: Free hosting on vercel.app, mismatched domain, brand impersonation
• Risk: HIGH - Potential compromise of cryptocurrency wallets
Pages with identical visual appearance (based on perceptual hash)
Found 6 other scans for this domain