EN ES PT
Back to Stats
50 Risk Score

Medium Risk

Threat Level: ALTO • Impersonating: Microsoft
  • • Threat: Credential harvesting phishing kit
  • • Target: Microsoft users globally
  • • Method: Fake login form stealing email/phone/Skype and password
  • • Exfil: Unknown, but likely sent to attacker's server
  • • Indicators: Domain mismatch, unrelated domain name, phishing form
  • • Risk: HIGH - Immediate credential theft

⚠ Risk Factors

  • Brand impersonation of Microsoft on non-official domain
  • Contains 1 credential harvesting form(s)
  • Credential harvesting indicators detected

Visual Capture

Screenshot of securityawareness.cc

Detection Info

https://securityawareness.cc/landing/form/90273d17-767e-41c3-b80c-6ac125add670/
Detected Brand
Microsoft
Country
International
Confidence
95%
HTTP Status
200
Report ID
316dec80-6de…
Analyzed
2026-01-10 01:51

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T17641A81CD2010346E357EE90F962FBD666140BC0C7134A7C6AB9927AB1CE17553723CD
CONTENT ssdeep
48:n0i0Hls5hwhjO7c2ZgV0jxJF0jIPcU85D4c5hkj0:nfjhh7xg6jxJqjJTt4g5

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
9cc97326cc99d98c
VISUAL aHash
0000181818180000
VISUAL dHash
6171333232327c78
VISUAL wHash
1818181c1f1f1fff
VISUAL colorHash
070000001c0
VISUAL cropResistant
6171333232327c78

Code Analysis

Risk Score 50/100
Threat Level ALTO
⚠️ Phishing Confirmed
🎣 Credential Harvester

🔬 Threat Analysis Report

• Threat: Credential harvesting phishing kit
• Target: Microsoft users globally
• Method: Fake login form stealing email/phone/Skype and password
• Exfil: Unknown, but likely sent to attacker's server
• Indicators: Domain mismatch, unrelated domain name, phishing form
• Risk: HIGH - Immediate credential theft