Banca Intesa phishing page detected

A phishing campaign targeting Banca Intesa Beograd customers uses fraudulent SMS and email messages to harvest login credentials and real-time SMS OTPs via a spoofed login page. This Man-in-the-Middle attack aims to steal credentials for the Banca Intesa Mobi app, with fake links often leading to lookalike domains rather than the official bancaintesa.rs site. This …

BAC Credomatic phishing page detected

A sophisticated phishing campaign targeting BAC Credomatic customers uses “Token Synchronization” to steal credentials and real-time OTP codes via fake banking portals, often distributed through Smishing or email. The attackers use high-fidelity clones of the bank’s portal to trick users into entering their username, password, and Código BAC, aiming to bypass multi-factor authentication for fraudulent …

La poste phishing page detected

A phishing campaign targeting La Poste customers in France uses “address confirmation” scams to harvest full credit card details and bypass 3D-Secure protections [1]. Attackers utilize SMS and emails prompting a small fee to lead victims to cloned sites, stealing credentials and real-time security codes. This phishing campaign targeting BAC Credomatic users in Central America …

Canada Post fake page detected

A Canada Post phishing campaign uses SMS and email, claiming an “incomplete address” to lure victims into paying a small fee on a fraudulent website. This scheme steals full name, address, and credit card details, including 3D-Secure codes, to facilitate larger fraudulent transactions. This Canada Post phishing campaign targets residents with fraudulent SMS/email alerts regarding …

Banco del Pacifico phishing page detected

This phishing campaign targeting Ecuador’s Banco del Pacífico uses a fake “Intermático Security Sync” page to steal online banking credentials, security challenge questions, and One-Time Passcodes (OTP). Scammers employ a “sync” pretext in emails or SMS, directing victims to a malicious website that mimics the legitimate site to bypass multi-factor authentication and gain full account …

Sabadell bank phishing page detected

A phishing campaign targeting Banco Sabadell users in Spain employs SMS and email, mimicking a security update to steal credentials and Digital Signature (Firma Digital) codes. The attack uses lookalike domains, such as sabadell-online-seguridad.net or acceso-bancosabadell.com, to redirect victims to a Man-in-the-Middle site designed to harvest login data and authorize fraudulent transfers in real-time. A …

Crédit Mutuel de Bretagne (CMB) bank phishing page detected

Crédit Mutuel de Bretagne (CMB) “Security Key” PhishingTarget: Customers of Crédit Mutuel de Bretagne (France / Brittany region)Threat Level: Critical (Real-time Account Takeover & “Clé Digitale” Hijacking)Phishing Method DescriptionThis attack targets users of the CMB Online Banking and the “CMB suivi de compte” mobile app. Scammers use a “Security Alert” pretext, sending out Smishing (SMS) …

Booking.com phishing page detected

Booking.com “Internal Messaging” PhishingTarget: Travelers and Hospitality Partners WorldwideThreat Level: Critical (Authorized Account Access & Financial Fraud)Phishing Method DescriptionThis is a Multi-Stage Attack that exploits a chain of trust. Unlike typical phishing, the fraudulent message arrives directly within the official Booking.com app or your reservation chat.Phase 1 (The Initial Breach): Attackers first compromise a hotel’s …

Raiffeisen bank phishing page detected

Raiffeisen Bank “Digital Security Update” PhishingTarget: Raiffeisen Bank Customers (Central and Eastern Europe)Threat Level: Critical (Raiffeisen Identity & Digital Token Theft)Phishing Method DescriptionThis attack targets users of the Raiffeisen Online Banking and the Digital ID apps. Scammers distribute urgent notifications via SMS (Smishing) or Email, claiming that “New Security Regulations” or a “System Maintenance” requires …

Bankinter phishing page in Portuguese revealed

Bankinter Portugal “Security Alert” PhishingTarget: Bankinter Customers in PortugalThreat Level: Critical (Real-time Account Takeover & SMS OTP Theft)Phishing Method DescriptionThis attack targets users of Bankinter Particulares (Online Banking). Scammers use a “Fraud Alert” pretext, sending out Smishing (SMS) messages claiming that an “unauthorized access” or “unusual purchase” has been detected. To “cancel” the transaction or …