Google phishing page with fake BG Vapes authorization detected

Then user will be redirected to the true Vapes.bg website: These three screenshots show a Google account phishing attack combined with a post‑phishing redirection to a Bulgarian vape shop page. The attacker uses a fake Google sign‑in flow to steal the victim’s email and password, then redirects to a legitimate‑looking online store to reduce suspicion. …

PayPal phishing page in French detected

These four screenshots show a multi‑step phishing campaign targeting French users, likely impersonating a payment service or online marketplace. The scam uses a fake “pending payment” lure to harvest the victim’s login credentials, full personal details, and credit card information. Threat Analysis: Fake Payment Pending Phishing – Credential, Personal & Card Data Harvesting This phishing …

Nets fake page in Danish detected

These two screenshots show a phishing campaign impersonating Nets, a major Danish payment service provider. The scam uses a fake “refund” pretext to trick victims into providing their email address, full name, phone number, and full credit/debit card details. Threat Analysis: Nets Refund Phishing – Card & Personal Data Harvesting This phishing campaign impersonates Nets, …

Netflix fake page detected

These four screenshots show a multi‑step Netflix phishing campaign designed to harvest full payment card details, personal information, and the SMS verification code (two‑factor authentication) needed to authorize fraudulent charges or take over an account. Threat Analysis: Netflix Phishing – Complete Card & 2FA Code Harvesting This phishing campaign impersonates Netflix’s subscription sign‑up process. The …

Microsoft phishing page in Spanish detected

This screenshot shows a phishing page impersonating Microsoft, targeting Spanish-speaking users. The page uses a “reactivate” pretext to pressure victims into entering their email address and password. Threat Analysis: Microsoft Phishing – Fake “Reactivate” Login Page This phishing campaign impersonates Microsoft (likely Outlook, Hotmail, or Office 365). The page claims the victim needs to “reactivate” …