
Landbank phishing page detected



Threat Analysis: Bancolombia Phishing – Fake “Sucursal Virtual Personas” Login Page
This phishing campaign impersonates Bancolombia, a major Colombian bank with millions of customers. The page mimics the bank’s online banking portal (Sucursal Virtual Personas) to steal customers’ Usuario (username) and Clave (password) .
How it works:
The victim receives a phishing email, SMS, or other message claiming a security alert, account issue, or the need to verify their information. The message includes a link to this fake Bancolombia login page. When the victim enters their Usuario and Clave and clicks “Continuar” (Continue), the credentials are captured and sent to the attacker.
The goal:
The attacker aims to steal the victim’s Bancolombia online banking credentials. With these, they can log into the victim’s real bank account, view balances, transfer funds, and commit fraud.
Red flags to watch for:
bancolombia.com or any official Bancolombia domain. Legitimate Bancolombia online banking is accessed through the bank’s official website. Always check the address bar.What to do if you encounter this:
bancolombia.com directly into your browser or by using the official Bancolombia app (such as “Bancolombia Personas”).Why this scam is effective:
Bancolombia has a massive customer base in Colombia, and “Sucursal Virtual Personas” is its standard online banking portal. The page uses the bank’s logo and familiar layout. The inclusion of a static date and time is an attempt to mimic the real site, but the fact that it does not update (or is hardcoded) is a subtle red flag that careful users might notice.
Protective measures:
bancolombia.com domains, not on phishing sites.bancolombia.com. Look for misspellings, extra words, or unusual top-level domains.
Threat Analysis: Bantrab Phishing – Fake Login Page Stealing Client Credentials
This phishing campaign impersonates Bantrab (Banco de los Trabajadores) , a prominent bank in Guatemala. The page mimics the bank’s login interface to steal customers’ Cliente (client ID) and Usuario (username) . This information is typically used as the first step in accessing online banking, after which the victim would be asked for a password on a subsequent page (likely part of a multi-step phishing flow).
How it works:
The victim receives a phishing email, SMS, or other message claiming a security alert, account issue, or the need to verify their information. The message includes a link to this fake Bantrab login page. When the victim enters their Cliente and Usuario and clicks “Ingresar” (Login), the credentials are captured and sent to the attacker.
The goal:
The attacker aims to steal the victim’s Bantrab online banking credentials. With these (and likely a password captured on a follow-up page), they can log into the victim’s real bank account, view balances, transfer funds, and commit fraud.
Red flags to watch for:
bantrab.com.gt or any official Bantrab domain. Legitimate Bantrab online banking is accessed through the bank’s official website. Always check the address bar.What to do if you encounter this:
bantrab.com.gt directly into your browser or by using the official Bantrab mobile app.Why this scam is effective:
Bantrab is a well-known bank in Guatemala, and its online banking portal is familiar to many customers. The page uses the bank’s logo and a simple, clean design that resembles the real login screen. The inclusion of a security warning (even though it’s ironically being violated) can actually reassure some users who see it and think, “This must be legitimate because they’re warning me about security.” The typo “BENVENIDO” is a subtle red flag that careful users might notice.
Protective measures:
bantrab.com.gt domains, not on phishing sites.bantrab.com.gt. Look for misspellings, extra words, or unusual top-level domains.
Threat Analysis: Av Villas Phishing – Fake “Banca Virtual” Login Page
This phishing campaign impersonates Av Villas (Avvillas) , a prominent Colombian bank. The page mimics the bank’s “Banca Virtual” (Virtual Banking) login interface to steal customers’ document number (typically “Cédula de Ciudadanía” – national ID) and password.
How it works:
The victim receives a phishing email, SMS, or other message claiming a security alert, account issue, or the need to verify their information. The message includes a link to this fake Av Villas login page. When the victim selects their document type (pre-selected as “Cédula de Ciudadanía”), enters their document number and password, and clicks “INGRESAR” (Login), the credentials are captured and sent to the attacker.
The goal:
The attacker aims to steal the victim’s Av Villas online banking credentials. With these, they can log into the victim’s real bank account, view balances, transfer funds, and commit fraud.
Red flags to watch for:
avvillas.com.co or any official Av Villas domain. Legitimate Av Villas online banking is accessed through the bank’s official website. Always check the address bar.What to do if you encounter this:
avvillas.com.co directly into your browser or by using the official Av Villas mobile app.Why this scam is effective:
Av Villas is a well-established bank in Colombia, and “Banca Virtual” is its standard online banking portal. The page uses the bank’s logo and a clean, simple design that resembles the real login screen. The use of “Cédula de Ciudadanía” (the common national ID in Colombia) as the document type is accurate and familiar to local users. The emoji, while a slight red flag, may not be noticed by victims who are focused on entering their credentials.
Protective measures:
avvillas.com.co domains, not on phishing sites.avvillas.com.co. Look for misspellings, extra words, or unusual top-level domains.

Then user will be redirected to the truth Scotiabank’s Website:

Threat Analysis: Scotiabank Phishing – Multi-Step Credential & Email Harvesting with Real Bank Redirection
This sophisticated phishing campaign impersonates Scotiabank, targeting Spanish-speaking customers (likely in Latin America). The attack uses a multi-page flow to capture the victim’s bank login credentials (document number and password) and email account credentials. After capturing this information, the victim is redirected to the real Scotiabank website, making the attack harder to detect.
How it works:
The victim receives a phishing email, SMS, or other message claiming a security alert, account issue, or the need to verify their information. The message includes a link to the first phishing page.
Step 1 – Fake Bank Login Page (First Screenshot)
The first page asks for:
This page captures the victim’s primary banking credentials.
Step 2 – Fake Email Credentials Page (Second Screenshot)
The second page asks for:
This step captures the victim’s email account credentials, which can be used to intercept bank communications, reset passwords, and maintain persistent access.
Step 3 – Redirect to Genuine Scotiabank Dashboard (Third Screenshot)
After the victim submits their email credentials, they are redirected to the real Scotiabank online banking dashboard. The victim sees their actual accounts and balances, believing their login was successful and that nothing suspicious occurred. In reality, the attacker has already captured the credentials on the preceding fake pages.
The goal:
The attacker aims to:
With email access, the attacker can intercept password reset emails, delete fraud alerts, and maintain long-term access. The redirection to the real bank site reduces the likelihood that the victim will immediately realize they have been scammed, giving the attacker more time to exploit the stolen credentials.
Red flags to watch for:
What to do if you encounter this:
Why this scam is particularly dangerous:
This is a sophisticated phishing technique that combines credential theft with a redirection to the legitimate site. Victims often assume that because they ended up on the real bank website after logging in, the first pages must have been legitimate. The email credential harvesting gives attackers persistent access to the victim’s communications, enabling them to intercept fraud alerts and maintain control even if the victim later changes their bank password.
Protective measures:
scotiabank.com.mx for Mexico, scotiabank.com.pe for Peru, scotiabank.cl for Chile). Look for misspellings, extra words, or unusual top-level domains.




Threat Analysis: Global Bank Phishing – Fake “Token” Verification & 2FA Code Harvesting
This phishing campaign impersonates Global Bank, a financial institution operating in Panama and other Central American countries. The scam is designed to capture the victim’s dynamic password (token) —the one-time two-factor authentication (2FA) code used to authorize transactions and logins. This code is the final layer of security; by stealing it, attackers can bypass the bank’s primary defenses.
How it works:
The victim receives a phishing email, SMS, or other message claiming a security alert, account issue, or the need to verify their information. The message includes a link to the first phishing page. The attack likely occurs after the victim has already entered their primary credentials (username and password) on a previous phishing page (not shown in these screenshots).
Step 1 – Fake Global Bank Landing/Information Page
The first and second screenshots show pages with Global Bank branding, navigation menus, and footer content copied from the legitimate bank website. These pages serve as a “lobby” or informational area, likely intended to make the phishing site appear legitimate before the victim proceeds to the token entry page.
Step 2 – Fake Loading Page
The third screenshot shows a fake loading page with a countdown timer (“0:27”). This page is designed to create a sense of legitimate processing while the attacker prepares to capture the token code.
Step 3 – Fake Token Validation Page
The fourth screenshot shows a page asking for the victim’s dynamic password (token) —the one-time 2FA code. This is the critical security code used to authorize access or transactions.
Step 4 – Fake Error Page (Token Invalido)
The fifth screenshot shows a fake error page stating that the token entered was invalid. This page is designed to trick the victim into entering the token again, either because they made a typo or because the attacker needs more time to use the first code. The error message creates urgency and encourages the victim to re-enter the code.
The goal:
The attacker aims to:
With the primary credentials (captured on an earlier page) and the token, the attacker can gain full access to the victim’s bank account.
Red flags to watch for:
What to do if you encounter this:
Why this scam is particularly dangerous:
This attack targets the two-factor authentication (2FA) code—often the last line of defense for online banking accounts. By capturing both the primary credentials (on earlier pages) and the token (on these pages), the attacker can bypass security measures and gain full account access. The fake error page is a sophisticated touch: if the first token expires or is used by the attacker, the victim may enter a second one, giving the attacker even more access.
Protective measures:

Threat Analysis: Crédit Agricole Phishing – Fake “SecuriPass” Security Update Scam
This phishing campaign impersonates Crédit Agricole, one of the largest banking groups in France. The page claims that security updates have been made and urges the victim to click a link to “reinforce” their SecuriPass (the bank’s real security feature). The page outlines a multi-step process involving SMS and email codes, followed by card reactivation—all designed to lead the victim through a series of phishing pages that capture sensitive information.
How it works:
The victim receives a phishing email (or lands on this page via a link in a message) claiming to be from Crédit Agricole. The page:
When the victim clicks the link (likely embedded in the text), they are taken to a fake Crédit Agricole login page or a series of pages designed to capture their credentials, SMS codes, email codes, and card details.
The goal:
The attacker aims to:
With this combination of information, the attacker can gain full access to the victim’s bank account, authorize transactions, and potentially compromise the victim’s email account as well.
Red flags to watch for:
credit-agricole.fr or any official Crédit Agricole domain. Legitimate bank communications are hosted on official domains. Always check the address bar.What to do if you encounter this:
credit-agricole.fr directly into your browser or by using the official Crédit Agricole mobile app.[email protected] or using their official reporting channel).Why this scam is effective:
Crédit Agricole has millions of online banking customers in France. The mention of SecuriPass—a real security feature—makes the page seem credible. The multi-step instructions (SMS code, email code, card reactivation) make the process appear thorough and “official.” The threat of a banking restriction creates urgency, encouraging victims to act quickly without scrutinizing the URL or the legitimacy of the message.
Protective measures:
@credit-agricole.fr or specific subdomains—not from generic or misspelled addresses.


Threat Analysis: Banco BPM Phishing – Multi-Step Credential, Phone Number & OTP Harvesting
This phishing campaign impersonates Banco BPM, one of Italy’s largest banking groups. The scam uses a multi-page flow to capture the victim’s online banking credentials, phone number, and OTP (one-time password) —the two-factor authentication code. By harvesting all three, attackers can bypass security measures and gain full access to the victim’s account.
How it works:
The victim receives a phishing email, SMS, or other message claiming a security alert, account issue, or the need to verify their information. The message includes a link to the first phishing page.
Step 1 – Fake Credentials Page (First Screenshot)
The first page asks for:
This page captures the victim’s primary online banking credentials.
Step 2 – Fake Phone Number Page (Second Screenshot)
The second page asks for:
This step is designed to capture the victim’s phone number, which is likely used to send the OTP (two-factor authentication code) via SMS. By providing the phone number, the victim enables the attacker to later request and intercept the OTP.
Step 3 – Fake OTP Page (Third Screenshot)
The third page asks for:
This is the two-factor authentication code sent to the victim’s phone. When the victim enters this code, the attacker captures it and uses it to complete the login on the real Banco BPM site.
The goal:
The attacker aims to:
With all three pieces of information, the attacker can log into the victim’s real bank account and authorize fraudulent transactions.
Red flags to watch for:
bancobpm.it or any official Banco BPM domain. Legitimate Banco BPM online banking is accessed through the bank’s official website. Always check the address bar.What to do if you encounter this:
bancobpm.it directly into your browser or by using the official Banco BPM mobile app.Why this scam is effective:
Banco BPM has millions of customers in Italy. The multi-step flow closely mimics legitimate banking processes where users are sometimes asked for a user ID, password, and then an OTP. The inclusion of real bank content (COVID-19 information, YouBusiness Web features) adds to the illusion of legitimacy. The separate phone number page is a clever tactic: it allows the attacker to collect the victim’s number, which can be used to trigger the real OTP from the bank while the victim waits on the fake page.
Protective measures:
bancobpm.it domains, not on phishing sites.bancobpm.it. Look for misspellings, extra words, or unusual top-level domains.
Threat Analysis: HDFC Bank Phishing – Fake NetBanking Login Page
This phishing campaign impersonates HDFC Bank, a major Indian financial institution. The page mimics the bank’s NetBanking login interface to steal customers’ Customer ID/User ID and Password/IPIN (Internet Personal Identification Number).
How it works:
The victim receives a phishing email, SMS, or other message claiming a security alert, account issue, or the need to verify their information. The message includes a link to this fake HDFC Bank login page. When the victim enters their Customer ID/User ID and Password/IPIN and clicks “LOGIN,” the credentials are captured and sent to the attacker.
The goal:
The attacker aims to steal the victim’s HDFC Bank online banking credentials. With these, they can log into the victim’s real bank account, view balances, transfer funds, and commit fraud.
Red flags to watch for:
hdfcbank.com or any official HDFC Bank domain. Legitimate HDFC NetBanking is accessed through the bank’s official website. Always check the address bar.What to do if you encounter this:
hdfcbank.com directly into your browser or by using the official HDFC Bank mobile app.[email protected] or using their official reporting channels).Why this scam is effective:
HDFC Bank has tens of millions of NetBanking users in India. The page uses the bank’s logo and a clean, simple design that resembles the real login screen. The request for “Customer ID/User ID” and “Password/IPIN” matches the terminology used by the bank. Many customers are accustomed to logging in through various portals and may not immediately notice that the URL is incorrect.
Protective measures:
hdfcbank.com domains, not on phishing sites.hdfcbank.com. Look for misspellings, extra words, or unusual top-level domains.
Threat Analysis: La Banque Postale Phishing – Fake “Certicode Plus” Security Update Scam
This phishing campaign impersonates La Banque Postale, a major French bank. The message claims that regulatory changes require the victim to accept new conditions and “activate” their Certicode Plus—a legitimate security feature used by the bank for transaction verification. The threat of card suspension is used to pressure the victim into clicking a malicious link.
How it works:
The victim receives this message (likely by email) claiming to be from La Banque Postale. The message:
When the victim clicks the link, they are taken to a phishing page designed to capture their banking credentials, personal information, or Certicode Plus verification codes.
The goal:
The attacker aims to:
With this information, the attacker can access the victim’s bank account, make unauthorized purchases, and commit fraud.
Red flags to watch for:
What to do if you encounter this:
labanquepostale.fr directly into your browser or by using the official mobile app.[email protected] or using their official reporting channel).Why this scam is effective:
La Banque Postale has millions of customers in France. Certicode Plus is a real security feature used by the bank for transaction verification, so references to it are familiar and appear legitimate. The threat of card suspension creates urgency, prompting victims to click the link without carefully checking its destination. The message’s design and language closely mimic official bank communications.
Protective measures:
@labanquepostale.fr or specific subdomains—not from generic or misspelled addresses.