A phishing campaign targeting MidFirst Bank customers utilizes a “Security Update” pretext, employing SMS or email to prompt users to sync accounts on a fraudulent website. This high-level threat harvests login credentials and real-time One-Time Passcodes (OTP) via a clone of the official MidFirst login page, enabling immediate account takeover. MidFirst Bank “Personal Banking Security” …
Author Archives: Anti-phishing
iCloud phishing page detected
A critical iCloud phishing campaign that uses fraudulent “Find My” and “Storage Full” notifications to steal Apple ID credentials and bypass 2FA. Attackers use pixel-perfect fake login pages to capture credentials in real-time, allowing them to unlock stolen devices and gain full access to personal data. iCloud “Find My iPhone” & Account Security PhishingTarget: Apple …
Sparkasse phishing page revealed
This phishing case targets Sparkasse customers in Germany using a sophisticated “PushTAN/S-ID-Check” scam. Attackers utilize smishing and email to direct users to fraudulent, pixel-perfect sites, harvesting credentials and using Man-in-the-Middle techniques to trick users into authorizing fraudulent device registration through the official app. Protection involves disregarding links, using only the official app, and carefully verifying …
Interac phishing page detected
An Interac phishing campaign, often targeting Canadian bank customers, uses a sophisticated gateway to impersonate the instant money transfer system and harvest banking credentials, security questions, and OTP codes. Victims are lured via SMS or email to fake portals that perfectly clone major financial institutions to facilitate account takeovers. This phishing campaign targeting Canadian bank …
TD Bank phishing page revealed
A sophisticated TD Bank phishing campaign targets Canadian and US customers using fraudulent SMS and emails to harvest EasyWeb credentials, security answers, and real-time OTP codes. The phishing kit, dubbed “EasyWeb Security Update,” utilizes a high-fidelity clone of the login portal to bypass multi-factor authentication, with scammers aiming for full account takeover via stolen security …
Arvest bank phishing page detected
A high-fidelity Arvest Bank phishing campaign targets U.S. customers using SMS and email to steal credentials and intercept real-time MFA codes via fraudulent “sync” pages. Scammers use lookalike domains to trick users into providing login IDs, passwords, and security codes to bypass two-factor authentication, with official, manual access to arvest.com being the primary defense. This …
Swedbank phishing page revealed
A sophisticated Man-in-the-Middle (MitM) phishing campaign targeting Swedbank customers across the Baltic and Nordic regions, utilizing fraudulent Smart-ID and BankID authentication requests to steal credentials in real-time [1]. Attackers deploy malicious clones of the Swedbank login portal to harvest Personal Identity Numbers, phone numbers, and PINs, using them instantly on the legitimate site to hijack …
Banco Bradesco phishing page detected
A sophisticated Banco Bradesco phishing campaign targeting Brazilian users through fake “security re-registration” messages to steal account credentials and security tokens in real time. This critical-level threat employs lookalike domains and smishing to intercept Agency/Account numbers, PINs, CPF numbers, and mobile token codes for full account takeover. метода фишинга на основе скриншота? Чтобы люди были …
La Poste phishing page revealed
A phishing campaign targeting La Poste customers in France uses SMS and email to solicit small shipping fees, ultimately stealing personal information, credit card details, and 3D-Secure codes to authorize fraudulent transactions. The attack leverages professional-looking clone sites and a “low-friction” micro-payment hook to steal high-value amounts despite requesting only a minor fee. Users are …
SFR phishing page revealed
A phishing campaign targeting French telecommunications provider SFR uses fraudulent emails and SMS to trick customers into entering personal and credit card details on fake “Espace Client” login pages. The attack, designed to harvest banking credentials and 3D-secure codes through fake payment or refund notices, highlights a growing utility billing scam tactic. SFR “Refund / …
