Bank Negara Malaysia & Google Credential Harvesting revealed

Below is an analysis of the phishing campaign based on the three screenshots. The attack impersonates Bank Negara Malaysia (the central bank) and then Google, using a fake login flow to steal credentials for both. Threat Analysis: Multi‑Step Phishing – Bank Negara Malaysia & Google Credential Harvesting This campaign targets users in Malaysia and Indonesia …

Google Maps fake page revealed

A phishing campaign impersonating Google Maps tricks users into entering credentials on fake pages to steal full Google Account access. These attacks leverage fraudulent “Location Update” alerts, often capturing 2FA codes in real-time to bypass security measures. Target: Global Google Account UsersThreat Level: Critical (Full Google Account & Gmail Hijacking)Phishing Method DescriptionThis attack uses a …

Google Meet phishing page detected

This phishing campaign abuses legitimate Windows device management (MDM) features, masquerading as a fake Google Meet update to gain full, remote control over a victim’s computer. Instead of stealing credentials, the attack tricks users into enrolling their devices into an attacker-controlled system, allowing for malicious software installation and remote file access. Target: Corporate Employees, Job …

Google phishing page with fake BG Vapes authorization detected

Then user will be redirected to the true Vapes.bg website: These three screenshots show a Google account phishing attack combined with a post‑phishing redirection to a Bulgarian vape shop page. The attacker uses a fake Google sign‑in flow to steal the victim’s email and password, then redirects to a legitimate‑looking online store to reduce suspicion. …

Gmail phishing page detected

This screenshot shows a phishing page impersonating Google / Gmail, targeting users who read Arabic and French (likely in North Africa or the Middle East). The page asks for email/phone and password to steal login credentials. Threat Analysis: Google/Gmail Phishing – Credential Harvesting How it works:The victim receives a phishing email, SMS, or message claiming …