EN ES PT
Back to Stats
90 Risk Score

High Risk

Threat Level: ALTO • Impersonating: DPD
  • • Threat: Package delivery scam attempting to gather information.
  • • Target: DPD customers.
  • • Method: Phishing page using DPD branding to trick users into believing their package delivery is delayed or has issues, prompting them to take action (likely to provide personal or financial information).
  • • Exfil: Unknown, likely a custom API to a malicious server controlled by the attackers.
  • • Indicators: IP address as domain, brand impersonation of DPD, potentially urgent language ('package returned to the warehouse').
  • • Risk: HIGH - Could lead to credential theft or financial loss if users interact with the page.

⚠ Risk Factors

  • Brand impersonation of DPD on non-official domain
  • Contains 4 credential harvesting form(s)
  • Credential harvesting indicators detected
  • Banking fraud indicators detected

Visual Capture

Screenshot of 69-164-193-72.cprapid.com

Detection Info

https://69-164-193-72.cprapid.com/de/update.php
Detected Brand
DPD
Country
International
Confidence
100%
HTTP Status
200
Report ID
aa380d0f-0e7…
Analyzed
2025-12-30 13:08

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T154B2027094B5B63F009F7391A7386709A3D39783CB520BE567F8936D4B8AE84DC23169
CONTENT ssdeep
192:bixLoxwz77qKHv/ySchJrVUmZGkozXTCReWyRMOsUFf9kIT/JO:mx8xw7pvKpJrVUIGkW+TxFUH/JO

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
bcc3c33c83693cc3
VISUAL aHash
ffffffc3df8181ff
VISUAL dHash
39000027292b1342
VISUAL wHash
8fffff8181818189
VISUAL colorHash
07000000007
VISUAL cropResistant
39000027292b1342,0000db6464649b24

Code Analysis

Risk Score 90/100
Threat Level ALTO
⚠️ Phishing Confirmed
🎣 Credential Harvester 🎣 Banking

🔬 Threat Analysis Report

• Threat: Package delivery scam attempting to gather information.
• Target: DPD customers.
• Method: Phishing page using DPD branding to trick users into believing their package delivery is delayed or has issues, prompting them to take action (likely to provide personal or financial information).
• Exfil: Unknown, likely a custom API to a malicious server controlled by the attackers.
• Indicators: IP address as domain, brand impersonation of DPD, potentially urgent language ('package returned to the warehouse').
• Risk: HIGH - Could lead to credential theft or financial loss if users interact with the page.

🔐 Credential Harvesting Forms

🔒 Obfuscation Detected

  • atob
  • eval
  • fromCharCode
  • unescape