EN ES PT
Back to Stats
50 Risk Score

Medium Risk

Threat Level: ALTO • Impersonating: Microsoft
  • • Threat: Credential harvesting phishing kit
  • • Target: Microsoft users globally
  • • Method: Fake login form stealing email/phone/Skype and password
  • • Exfil: Unknown, likely sent to attacker's server
  • • Indicators: Domain mismatch, mimicked login form, no official URL
  • • Risk: HIGH - Immediate credential theft

⚠ Risk Factors

  • Brand impersonation of Microsoft on non-official domain
  • Contains 1 credential harvesting form(s)
  • Credential harvesting indicators detected

Visual Capture

Screenshot of securityawareness.cc

Detection Info

https://securityawareness.cc/landing/form/90273d17-767e-41c3-b80c-6ac125add670
Detected Brand
Microsoft
Country
International
Confidence
95%
HTTP Status
200
Report ID
ae38efa7-025…
Analyzed
2026-01-10 01:51

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T17641A81CD2010346E357EE90F962FBD666140BC0C7134A7C6AB9927AB1CE17553723CD
CONTENT ssdeep
48:n0i0Hls5hwhjO7c2ZgV0jxJF0jIPcU85D4c5hkj0:nfjhh7xg6jxJqjJTt4g5

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
9cc97326cc99d98c
VISUAL aHash
0000181818180000
VISUAL dHash
6171333232327c78
VISUAL wHash
1818181c1f1f1fff
VISUAL colorHash
070000001c0
VISUAL cropResistant
6171333232327c78

Code Analysis

Risk Score 50/100
Threat Level ALTO
⚠️ Phishing Confirmed
🎣 Credential Harvester

🔬 Threat Analysis Report

• Threat: Credential harvesting phishing kit
• Target: Microsoft users globally
• Method: Fake login form stealing email/phone/Skype and password
• Exfil: Unknown, likely sent to attacker's server
• Indicators: Domain mismatch, mimicked login form, no official URL
• Risk: HIGH - Immediate credential theft