New preparation for Credit Agricole phishing revealed

An analysis of a phishing campaign targeting Crédit Agricole customers reveals attackers preparing fraudulent infrastructure to intercept “SécuriPass” multi-factor authentication. The pre-emptive case study shows attackers setting up fake login pages designed to harvest account numbers and PINs to bypass security measures. The report highlights crucial indicators of compromise, including suspicious non-official domains and unsolicited “urgent” security alerts.

Security Notice: This scam layout was intercepted, verified, and locked down firsthand by the Antiphishing.biz security team during our standard URL vetting operations. To protect the public, the hostile origin link has been fully defanged within our infrastructure. We document and analyze these live visual patterns to help security researchers and users detect replica fraud techniques before financial damage occurs.

Actual screenshot of "New preparation for Credit Agricole phishing revealed" phishing interface captured during link moderation on our platform.
Figure 1: Live screenshot of the active phishing operation isolated on our infrastructure.

Screenshot #1 (Identifiant): This page captures the 11-digit account number, validating the victim’s customer status in real-time.

Actual screenshot 2 of "New preparation for Credit Agricole phishing revealed" phishing interface captured during link moderation on our platform.
Figure 2: Live screenshot of the active phishing operation isolated on our infrastructure.

Screenshot #2 (Code Personnel): A fake virtual keypad captures password digits via keylogging, mimicking bank security.

Actual screenshot 3 of "New preparation for Credit Agricole phishing revealed" phishing interface captured during link moderation on our platform.
Figure 3: Live screenshot of the active phishing operation isolated on our infrastructure.
Actual screenshot 4 of "New preparation for Credit Agricole phishing revealed" phishing interface captured during link moderation on our platform.
Figure 4: Live screenshot of the active phishing operation isolated on our infrastructure.
Actual screenshot 5 of "New preparation for Credit Agricole phishing revealed" phishing interface captured during link moderation on our platform.
Figure 5: Live screenshot of the active phishing operation isolated on our infrastructure.
Actual screenshot 6 of "New preparation for Credit Agricole phishing revealed" phishing interface captured during link moderation on our platform.
Figure 6: Live screenshot of the active phishing operation isolated on our infrastructure.

Screenshot #3 (Processing Screen): The “wait” screen allows attackers time to use stolen credentials for unauthorized access on the real banking site.

A “staging” phishing attack against Crédit Agricole, allowing for early detection of infrastructure designed to capture account IDs and 6-digit codes via a cloned virtual keypad and real-time interception. The phishing campaign utilizes a fake login screen (“Identifiant”) and a deceptive loading screen to log credentials and facilitate a Man-in-the-Middle attack.


Protection Measures:

  • Verify that the URL is exactly www.credit-agricole.fr.
  • Never log in via links in emails or SMS.
  • Reject unexpected SécuriPass notifications.
  • Use the official “Ma Banque” mobile app.

Leave a comment

Your email address will not be published. Required fields are marked *