PayPal phishing page in French detected


These four screenshots show a multi‑step phishing campaign targeting French users, likely impersonating a payment service or online marketplace. The scam uses a fake “pending payment” lure to harvest the victim’s login credentials, full personal details, and credit card information.


Threat Analysis: Fake Payment Pending Phishing – Credential, Personal & Card Data Harvesting

This phishing campaign is built on a simple but effective pretext: the victim is told that a payment is waiting for them. To “receive” the money, they must log in and then “confirm” their identity by providing personal and card details. The pages are hosted on a free website builder (WIX), a common indicator of throwaway phishing sites.

How it works:
The victim receives an email, SMS, or message claiming that a payment is pending and they need to log in to claim it.

Step 1 – Fake Login Page (First Screenshot)
A minimal page asks for an email address and password. No branding is shown, but the promise of a payment makes victims believe they are logging into a legitimate service.

Step 2 – Fake Payment Confirmation Page (Second Screenshot)
After submitting credentials, the victim sees a page stating that the payment has been approved by the bank and they must “confirm” to receive it. This creates a false sense of progress.

Step 3 – Personal & Card Number Page (Third Screenshot)
The victim is asked to “confirm their account” by providing:

  • First name & last name
  • Home address
  • Phone number
  • Full credit/debit card number

Step 4 – Expiration & CVV Page (Fourth Screenshot)
The final page asks for the expiration date and cryptogram (CVV) . With the card number from Step 3, the attacker now has all information needed to make online purchases or clone the card.

The goal:
The attacker aims to:

  • Steal the victim’s email and password (likely for a specific platform or general reuse)
  • Obtain full identity and contact information
  • Capture complete credit card details (number, expiration, CVV) for fraud

Red flags to watch for:

  • Suspicious URL: All pages are hosted on a free WIX subdomain (visible in the browser address bar). Legitimate payment services use their own domains.
  • “WIX.com” banner: The blue “Ce site a été conçu sur la plateforme WIX.com” banner appears on every page, a clear sign this is not a professional or legitimate service.
  • Illogical flow: A platform that already has your login credentials would not ask for your full card details and CVV to “release” a payment.
  • No branding: No company name or logo is shown. The victim is left guessing which service they are logging into.
  • Multiple requests for sensitive data: Asking for full name, address, phone, card number, expiration, and CVV in one flow is a classic carding/phishing pattern.

What to do if you encounter this:

  • Do not enter any information on pages hosted on free website builders (WIX, Weebly, etc.) unless you are absolutely certain they are legitimate (which they almost never are for banking/payment services).
  • If you have already entered your email and password, change that password immediately, especially if you reuse it elsewhere.
  • If you entered card details, contact your bank immediately to block the card and dispute any unauthorized charges.
  • Report the phishing page to the legitimate company being impersonated (if identifiable) and to the platform hosting the site (WIX has a reporting mechanism for phishing).

Why this scam is effective:
The promise of “money waiting” exploits eagerness and urgency. The multi‑step flow makes the process seem thorough and official. The use of a familiar free website builder can actually lower suspicion for users who associate WIX with small legitimate businesses, but in this case it is being abused for fraud.

Protective measures:

  • Never log in to a service via a link sent in an unsolicited message. Type the official URL directly.
  • Check the address bar carefully. Legitimate payment services do not use free hosting platforms like WIX.
  • Never enter your full card number, expiration, and CVV on a page that claims to be “verifying” or “releasing” funds. This is a standard card‑harvesting tactic.
  • Use a password manager – it will not autofill on fake domains.
  • Enable two‑factor authentication on your email and financial accounts.

Leave a comment

Your email address will not be published. Required fields are marked *