NiCKEL phishing page detected


Threat Analysis: Nickel Phishing – Fake “Sponsorship” Offer Stealing Card Details

This phishing campaign impersonates Nickel, a French neobank (a subsidiary of BNP Paribas). The scam uses a fake “parrainage” (referral/sponsorship) offer to lure victims into providing their personal information and full card details under the guise of participating in a rewards program.

How it works:
The victim encounters this page via a phishing email, SMS, social media post, or other message promoting a lucrative “sponsorship” offer from Nickel. The page claims to offer a reward for referring a friend. To participate, the victim is asked to enter:

  • First name and last name
  • Email address
  • Cardholder name
  • Full card number
  • Expiration date (MM/YY)

The goal:
The attacker aims to:

  • Steal the victim’s full card details (card number, cardholder name, expiration date)
  • Obtain the victim’s email address and full name for identity theft or further attacks

With the card details, the attacker can make unauthorized online purchases, create cloned cards, or sell the information on criminal marketplaces.

Red flags to watch for:

  • Suspicious URL: The page is hosted on a domain that is not nickel.eu or any official Nickel domain. The presence of “WIX.com” website builder branding at the top indicates this is a cheap, quickly created phishing page, not an official bank site.
  • Request for full card details for a sponsorship program: A legitimate referral program would never require the participant’s full card number and expiration date. This is a clear indicator of a phishing attempt.
  • Too good to be true offer: Fake “sponsorship” or “referral” offers are commonly used to trick victims into providing personal information under the promise of easy rewards.
  • Missing security features: The page lacks any of the security indicators expected on a legitimate banking site (SSL certificate details, official domain, padlock icon in the address bar).
  • Unprofessional design: The page is extremely simple and lacks the full branding, navigation, and legal information that would appear on the legitimate Nickel website.
  • No account login required: A legitimate referral program would require the user to log into their existing Nickel account—not enter card details directly on a promotional page.

What to do if you encounter this:

  • Do not enter your name, email address, card number, expiration date, or any other personal information on this page.
  • If you are a Nickel customer, always access official promotions and your account by typing nickel.eu directly into your browser or by using the official Nickel mobile app.
  • If you have already entered your card details, contact Nickel immediately through their official customer service hotline to block your card and dispute any unauthorized transactions.
  • Report the phishing page to Nickel’s fraud department.

Why this scam is effective:
Nickel accounts are often used by individuals who appreciate the simplicity and accessibility of the service. “Parrainage” (referral) programs are common in French banking and often offer real rewards, so users may be familiar with the concept. The promise of an easy reward can prompt users to enter information without carefully scrutinizing the URL or the legitimacy of the page. The request for card details may not raise immediate suspicion if the victim believes it’s required to “verify” their account for the reward.

Protective measures:

  • Always type the official bank URL directly into your browser—never click links in emails or messages claiming to offer rewards or promotions.
  • Never enter your full card number, expiration date, or CVV in response to a promotional offer. Legitimate banks do not require this information for referral programs.
  • Be suspicious of any unsolicited message that offers easy rewards in exchange for personal information.
  • Check the URL carefully: Legitimate Nickel domains end with nickel.eu. Look for misspellings, extra words, or unusual top-level domains. Also be wary of pages hosted on free website builders like WIX, Weebly, or similar platforms.
  • If in doubt, contact Nickel directly using a phone number from your bank statement or the official website—never use contact information provided in the suspicious message.

Naranja X phishing page detected


Threat Analysis: Naranja X Phishing – Fake Login Page Stealing Email and Password

This phishing campaign impersonates Naranja X, a popular digital financial platform in Argentina that offers credit cards, loans, and digital accounts. The page mimics the platform’s login interface to steal customers’ email address and password.

How it works:
The victim receives a phishing email, SMS, or other message claiming a security alert, account issue, or the need to verify their information. The message includes a link to this fake Naranja X login page. When the victim enters their email and password and clicks “Iniciar sesión” (Log in), the credentials are captured and sent to the attacker.

The goal:
The attacker aims to steal the victim’s Naranja X account credentials. With these, they can:

  • Log into the victim’s Naranja X account
  • Access linked credit cards and financial services
  • Make unauthorized purchases or transfers
  • Obtain personal information for identity theft

Red flags to watch for:

  • Suspicious URL: The page is hosted on a domain that is not naranjax.com.ar or any official Naranja X domain. Legitimate Naranja X online access is through the bank’s official website or mobile app. Always check the address bar.
  • Unsolicited login request: Naranja X does not send emails or messages with links requiring customers to log in to resolve account issues. Customers should always access their accounts by typing the official URL directly or using the official app.
  • Minimal design: While the page includes the Naranja X logo, it lacks the full branding, navigation menus, security notices, and personalized elements present on the legitimate login page.
  • Missing security features: Legitimate Naranja X login pages typically include additional security elements such as a virtual keyboard, CAPTCHA, or multi-factor authentication prompts. This page has only a basic form.
  • Generic form: The page asks only for email and password without any account-specific personalization or security verification.

What to do if you encounter this:

  • Do not enter your email, password, or any other personal information on this page.
  • If you are a Naranja X customer, always access your account by typing naranjax.com.ar directly into your browser or by using the official Naranja X mobile app.
  • If you have already entered your credentials, contact Naranja X immediately through their official customer service hotline to secure your account and change your password.
  • Report the phishing page to Naranja X’s fraud department.

Why this scam is effective:
Naranja X has millions of users in Argentina, and its digital-first approach means many customers are accustomed to logging in via email and password. The page uses the brand’s recognizable logo and simple, clean design. The straightforward login form mirrors the actual Naranja X interface, making it easy for a distracted user to enter credentials without checking the URL.

Protective measures:

  • Bookmark the official Naranja X login page and use that bookmark to access your account—never click links in emails or messages.
  • Use a password manager: It will autofill only on legitimate naranjax.com.ar domains, not on phishing sites.
  • Enable two-factor authentication (2FA) on your Naranja X account if available, to add an extra layer of protection.
  • Be suspicious of any unsolicited message that creates urgency and asks you to log in to your account.
  • Check the URL carefully: Legitimate Naranja X domains end with naranjax.com.ar. Look for misspellings, extra words, or unusual top-level domains.
  • If in doubt, contact Naranja X directly using a phone number from your bank statement or the official website—never use contact information provided in a suspicious message.

Daviplata phishing page detected


Threat Analysis: Daviplata Phishing – Credential & SMS Code Harvesting

This phishing campaign impersonates Daviplata, a widely used digital wallet and mobile payment platform in Colombia, operated by Davivienda Bank. The scam uses a multi-page flow to capture the victim’s document number, Daviplata password, and the SMS verification code—the three elements needed to access the account and authorize transactions.

How it works:
The victim receives a phishing email, SMS, or other message claiming a security alert, account issue, or the need to verify their information. The message includes a link to the first phishing page.

Step 1 – Fake Login Page (First Screenshot)
The first page asks for:

  • Número de documento (Document number – typically the Colombian national ID, “cédula”)
  • Clave Daviplata (Daviplata password)

This page captures the victim’s primary account credentials.

Step 2 – Fake Waiting/Loading Page (Second Screenshot)
The second page displays a fake loading message with a countdown timer (23 seconds), claiming that a code is being sent to the victim’s phone. This page serves two purposes:

  • It creates a sense of legitimate processing
  • It buys time for the attacker to use the stolen credentials to log into the real Daviplata platform and trigger an SMS code to the victim’s phone

Step 3 – Fake SMS Code Page (Third Screenshot)
The third page asks for the SMS verification code sent to the victim’s mobile phone. When the victim enters this code, the attacker captures it and uses it to complete the login on the real Daviplata platform.

The goal:
The attacker aims to:

  • Steal the victim’s Daviplata credentials (document number and password)
  • Capture the SMS verification code (2FA) in real time
  • Gain full access to the victim’s Daviplata account to transfer funds, make payments, and commit fraud

Red flags to watch for:

  • Suspicious URL: The pages are hosted on domains that are not daviplata.com or any official Davivienda/Daviplata domain. Legitimate Daviplata access is through the official mobile app or website. Always check the address bar.
  • Unsolicited login request: Daviplata does not send emails or messages with links requiring customers to log in to resolve account issues. Customers should always access their accounts by opening the official app or typing the official URL directly.
  • Fake loading page with countdown: Legitimate banking apps and platforms do not display artificial countdown timers during login. This is a classic phishing tactic to buy time for the attacker to use stolen credentials on the real site.
  • Multi-step design with SMS code request: After entering credentials, the victim is asked for an SMS code. This mirrors the real 2FA flow, making it convincing, but the pages are fake.
  • Minimal design: The pages lack the full branding, security notices, and personalized elements present on the legitimate Daviplata interface.

What to do if you encounter this:

  • Do not enter your document number, password, or SMS verification code on these pages.
  • If you are a Daviplata user, always access your account by opening the official Daviplata mobile app or by typing the official website URL directly into your browser.
  • If you have already entered your credentials but not the SMS code, change your Daviplata password immediately and contact Davivienda’s customer service to secure your account.
  • If you have entered the SMS code as well, the attacker may have already accessed your account. Contact Davivienda’s fraud department immediately to block your account and reverse any unauthorized transactions.
  • Report the phishing pages to Davivienda’s fraud team.

Why this scam is particularly dangerous:
This is a real-time account takeover phishing kit. The attacker uses the stolen document number and password immediately to log into the real Daviplata platform and trigger an SMS code. The fake loading page buys time for this process. When the victim enters the SMS code on the phishing page, the attacker uses it to complete the login—often within seconds. Daviplata is a popular digital wallet in Colombia, and many users keep significant balances or link their accounts to bank cards, making successful attacks financially damaging.

Protective measures:

  • Always access Daviplata through the official mobile app or by typing the official website URL directly—never click links in emails or messages.
  • Use a password manager: It will autofill only on legitimate domains, not on phishing sites.
  • Never enter your SMS verification code on a page you reached via a link. Legitimate platforms only ask for 2FA codes after you have initiated a login on their official app or website.
  • Be suspicious of any unsolicited message that creates urgency and asks you to log in to your account.
  • Check the URL carefully: Legitimate Daviplata domains are associated with daviplata.com and davivienda.com. Look for misspellings, extra words, or unusual top-level domains.
  • If in doubt, contact Davivienda directly using a phone number from your bank statement or the official website—never use contact information provided in a suspicious message.

AOL phishing page detected


Threat Analysis: AOL Phishing – Fake Login Page Stealing Email Credentials

This phishing campaign impersonates AOL (America Online) , an email and online service provider. The page is designed to steal victims’ username, email address, or mobile number and password used to access AOL accounts.

How it works:
The victim receives a phishing email, SMS, or other message claiming a security alert, account issue, or the need to verify their information. The message includes a link to this fake AOL login page. When the victim enters their username/email/mobile and password and clicks “Sign in,” the credentials are captured and sent to the attacker.

The goal:
The attacker aims to steal AOL account credentials. With these, they can:

  • Access the victim’s email account
  • Search for sensitive information (banking, personal documents, password reset emails)
  • Use the compromised email to reset passwords for other accounts (social media, banking, etc.)
  • Send further phishing messages to the victim’s contacts

Red flags to watch for:

  • Suspicious URL: The page is hosted on a domain that is not aol.com or any official AOL domain. The presence of “WIX.com” website builder branding at the top indicates this is a quickly created phishing page, not a legitimate AOL site.
  • Unsolicited login request: AOL does not send emails or messages with links requiring users to log in to resolve account issues. Users should always access AOL by typing the official URL directly.
  • Generic design: While the page uses the AOL logo, it lacks the full navigation, security notices, and personalized elements present on the legitimate AOL login page.
  • “Let’s Chat” button: The presence of a “Let’s Chat” button is unusual for the AOL login page and suggests the page was assembled from a template.
  • Missing security features: Legitimate AOL login pages include SSL certificates and proper domain verification. This page lacks those indicators.
  • WIX.com branding: The “designed with WIX.com” notice is a strong indicator that this page is not an official AOL page. Official AOL is not built on a free website builder.

What to do if you encounter this:

  • Do not enter your username, email, mobile number, or password on this page.
  • If you are an AOL user, always access your account by typing aol.com directly into your browser or by using the official AOL mobile app.
  • If you have already entered your credentials, change your AOL password immediately. If you use the same password for other accounts, change those as well.
  • Enable two-factor authentication (2FA) on your AOL account if available.
  • Report the phishing page to AOL’s abuse team.

Why this scam is effective:
AOL still has millions of users, particularly among those who have used the service for many years. The simple, clean design of the page resembles AOL’s actual login interface. The “Stay signed in” and “Forgot username?” options are familiar elements that add to the illusion of legitimacy. The inclusion of social login options (“G” for Google, “yahoo?”) is unusual for AOL but may confuse some users into thinking the page is legitimate.

Protective measures:

  • Bookmark the official AOL login page and use that bookmark to access your account—never click links in emails or messages.
  • Use a password manager: It will autofill only on legitimate aol.com domains, not on phishing sites.
  • Enable two-factor authentication (2FA) on your email account to add an extra layer of protection.
  • Be suspicious of any unsolicited message that creates urgency and asks you to log in to your email or other account.
  • Check the URL carefully: Legitimate AOL domains end with aol.com. Look for misspellings, extra words, or unusual top-level domains. Also be wary of pages hosted on free website builders like WIX, Weebly, or similar platforms.
  • If in doubt, contact AOL support directly through the official website—never use contact information provided in a suspicious message.

Bancolombia phishing page revealed


Threat Analysis: Generic Banking Phishing – Credential & SMS Code Harvesting

This phishing campaign impersonates a financial institution (likely a bank or digital wallet in Latin America, based on the Spanish language and the “reactivar” – reactivate – pretext). The scam uses a multi-page flow to capture the victim’s username, password, and SMS verification code (two-factor authentication), enabling full account takeover.

How it works:
The victim receives a phishing email, SMS, or other message claiming that their account has been deactivated or requires verification to “reactivate” it. The message includes a link to the first phishing page.

Step 1 – Fake Credentials Page (First Screenshot)
The first page asks for:

  • Usuario (username)
  • Clave (password)

This page captures the victim’s primary account credentials. The pretext of “reactivating” the account creates urgency.

Step 2 – Fake Waiting/Loading Page (Second Screenshot)
The second page displays a fake loading message with a countdown timer (24 seconds), claiming that the victim’s information is being verified. This page serves two purposes:

  • It creates a sense of legitimate processing
  • It buys time for the attacker to use the stolen credentials to log into the real bank/platform and trigger an SMS code to the victim’s phone

Step 3 – Fake SMS Code Page (Third Screenshot)
The third page asks for the SMS verification code sent to the victim’s mobile phone. When the victim enters this code, the attacker captures it and uses it to complete the login on the real platform.

The goal:
The attacker aims to:

  • Steal the victim’s account credentials (username and password)
  • Capture the SMS verification code (2FA) in real time
  • Gain full access to the victim’s account to transfer funds, make payments, or commit fraud

Red flags to watch for:

  • Suspicious URL: The pages are hosted on domains that are not the official domain of the legitimate financial institution. Always check the address bar before entering credentials.
  • Unsolicited “reactivation” request: Legitimate banks do not send emails or messages with links requiring customers to log in to “reactivate” accounts.
  • Fake loading page with countdown: Legitimate banking sites do not display artificial countdown timers during login. This is a classic phishing tactic to buy time for the attacker.
  • Multi-step design with SMS code request: After entering credentials, the victim is asked for an SMS code. While this mirrors the real 2FA flow, the pages themselves are fake.
  • Generic branding: The pages lack the specific logos, security notices, and personalized elements that would appear on a legitimate bank’s login interface.
  • “Reactivate” pretext: The claim that the account needs to be reactivated is a common fear-based tactic to pressure victims into acting without thinking.

What to do if you encounter this:

  • Do not enter your username, password, or SMS verification code on these pages.
  • If you are a customer of any financial institution, always access your account by typing the official website URL directly into your browser or by using the official mobile app.
  • If you have already entered your credentials but not the SMS code, contact your bank immediately to change your password and secure your account.
  • If you have entered the SMS code as well, the attacker may have already accessed your account. Contact your bank’s fraud department immediately.
  • Report the phishing pages to the legitimate institution being impersonated.

Why this scam is particularly dangerous:
This is a real-time account takeover phishing kit. The attacker uses the stolen username and password immediately to log into the real platform and trigger an SMS code. The fake loading page buys time for this process. When the victim enters the SMS code on the phishing page, the attacker uses it to complete the login—often within seconds. The “reactivation” pretext is effective because it creates urgency and implies that the account is at risk if no action is taken.

Protective measures:

  • Never click links in unsolicited messages claiming your account needs to be reactivated or verified. Instead, type the official website URL directly into your browser.
  • Use a password manager: It will autofill only on legitimate domains, not on phishing sites.
  • Never enter your SMS verification code on a page you reached via a link. Legitimate banks only ask for 2FA codes after you have initiated a login on their official site.
  • Be suspicious of any unsolicited message that creates urgency and asks you to log in to your account.
  • Check the URL carefully: Look for misspellings, extra words, or unusual top-level domains.
  • If in doubt, contact your bank directly using a phone number from your bank statement or the official website—never use contact information provided in a suspicious message.

Citizens Bank phishing page detected

Then visitor will be redirected to the official website of Citizens Bank.


Threat Analysis: Citizens Bank Phishing – Full Identity & Financial Data Harvesting

This phishing campaign impersonates Citizens Bank, a prominent bank in the United States. The scam uses a multi-page flow to capture:

  • Online banking credentials (User ID and Password)
  • Full personal identification information (full name, SSN, address, date of birth, phone number)
  • Full card details (cardholder name, card number, expiration date, CVV)

This combination of data enables attackers to commit identity theft, open fraudulent accounts, and drain victims’ financial accounts.

How it works:
The victim receives a phishing email, SMS, or other message claiming a security alert, account issue, or the need to verify their information. The message includes a link to the first phishing page.

Step 1 – Fake Online Banking Login Page (First Screenshot)
The first page mimics Citizens Bank’s online banking login interface, asking for:

  • Online User ID
  • Password

This page captures the victim’s primary banking credentials.

Step 2 – Intermediate Page(s) (Screenshots 2 and 3 – failed to load)
While the second and third screenshots are not available, the pattern suggests they may have been fake loading/waiting pages or additional information requests, designed to make the process appear legitimate and to buy time for the attacker.

Step 3 – Fake “Verify Your Banking Information” – Personal Details Page (Fourth Screenshot)
The fourth page asks for:

  • Full name
  • Social Security Number (SSN)
  • Address, state, city, zip code
  • Date of birth
  • Phone number

This information is used for identity theft and to answer security questions for account takeover.

Step 4 – Fake “Verify Your Banking Information” – Card Details Page (Fifth Screenshot)
The fifth page asks for:

  • Cardholder name
  • Full card number
  • Expiration date
  • Card Security Code (CVV)

This captures the victim’s credit or debit card details for fraudulent purchases.

The goal:
The attacker aims to:

  • Gain full access to the victim’s Citizens Bank online banking account
  • Steal the victim’s identity (SSN, DOB, address, phone) to open new accounts, apply for loans, or commit tax fraud
  • Use the captured card details for unauthorized purchases or to create cloned cards

Red flags to watch for:

  • Suspicious URL: The pages are hosted on domains that are not citizensbank.com or any official Citizens Bank domain. Legitimate Citizens Bank online banking is accessed through the bank’s official website. Always check the address bar.
  • Unsolicited login request: Citizens Bank does not send emails or messages with links requiring customers to log in and then provide extensive personal and card information.
  • Excessive data requests: A legitimate bank would never ask for SSN, full card details, and CVV in a single “verification” flow after login. This combination is a clear indicator of a phishing and identity theft operation.
  • Inconsistent page flow: After entering online banking credentials, the victim is taken to pages asking for personal and card details—something that never happens on the real bank site.
  • Copied content: The pages include help sections, navigation menus, and footer content copied from the legitimate Citizens Bank website. Attackers use such content to appear credible, but its presence does not make the pages legitimate.
  • No personalization or security indicators: Legitimate banking portals display account-specific information, security images, or other personalized elements. These pages lack such features.

What to do if you encounter this:

  • Do not enter any information on these pages—neither banking credentials, nor personal details, nor card details.
  • If you are a Citizens Bank customer, always access online banking by typing citizensbank.com directly into your browser or by using the official mobile app.
  • If you have already entered your banking credentials, contact Citizens Bank immediately to change your password and secure your account.
  • If you have entered your SSN, card details, or other personal information, contact your bank’s fraud department, the major credit bureaus (Equifax, Experian, TransUnion) to place a fraud alert or credit freeze, and file a report with the FTC (IdentityTheft.gov) and local authorities.
  • Report the phishing pages to Citizens Bank’s fraud team.

Why this scam is particularly dangerous:
This is a comprehensive identity theft phishing kit. It does not just target banking credentials—it aims to collect enough information for the attacker to impersonate the victim fully. With the victim’s SSN, date of birth, address, and card details, the attacker can:

  • Drain the victim’s bank account
  • Open new credit cards or loans in the victim’s name
  • File fraudulent tax returns to steal refunds
  • Take over other accounts using the stolen personal information

Protective measures:

  • Bookmark the official Citizens Bank login page and use that bookmark to access online banking—never click links in emails or messages.
  • Use a password manager: It will autofill only on legitimate citizensbank.com domains, not on phishing sites.
  • Never provide your SSN, full card details, or CVV on a page you reached via a link. Legitimate banks already have this information on file and will not ask for it in an unauthenticated flow.
  • Enable two-factor authentication (2FA) on your bank account to add an extra layer of protection.
  • Be suspicious of any unsolicited message that creates urgency and asks you to log in and then provide extensive personal information.
  • Check the URL carefully: Legitimate Citizens Bank domains end with citizensbank.com. Look for misspellings, extra words, or unusual top-level domains.
  • If in doubt, contact Citizens Bank directly using a phone number from your bank statement or the official website—never use contact information provided in a suspicious message.

Bank of America pishing pages in Spanish detected


Threat Analysis: Bank of America Phishing – Email Credential & Card Data Harvesting

This phishing campaign impersonates Bank of America, targeting Spanish-speaking customers. The scam uses a multi-page flow to capture:

  • The victim’s email address and email password
  • Full credit/debit card details (card number, expiration date, security code)

By compromising both the email account and the payment card, attackers can gain persistent access to sensitive communications and conduct unauthorized transactions.

How it works:
The victim receives a phishing email, SMS, or other message in Spanish claiming a security alert, account verification issue, or the need to confirm their identity. The message includes a link to the first phishing page.

Step 1 – Simple Entry Page (First Screenshot)
A minimal page with Bank of America branding and a call to “verify your online account.” This likely leads to the next step.

Step 2 – Fake Identity Verification – Email & Email Password Page (Third Screenshot)
This page asks for:

  • Correo electrónico (Email address)
  • Clave del correo (Email password)
  • Aim o Pin (likely “ATM PIN” – a banking PIN)

The page includes a fake Bank of America dashboard preview (with a greeting “Hello, Jane”) to appear legitimate. This step captures the victim’s email credentials and banking PIN.

Step 3 – Fake Identity Verification – Card Details Page (Fourth Screenshot)
This page asks for:

  • Card number
  • Expiration date
  • Security code (CVV)

It claims these details are needed to “verify identity” for security purposes.

The goal:
The attacker aims to:

  • Steal the victim’s email account credentials to intercept bank communications, reset passwords, and maintain long-term access
  • Obtain the victim’s debit/credit card details for unauthorized purchases, cloning, or selling on criminal marketplaces
  • Gather a banking PIN for ATM or transaction authorization

Red flags to watch for:

  • Suspicious URL: The pages are hosted on domains that are not bankofamerica.com. Legitimate Bank of America online services are accessed through the official website.
  • Request for email password: A legitimate bank never asks for your email account password. This is a clear indicator of a phishing attack designed to take over your email.
  • Multiple sensitive data requests in one flow: Asking for email credentials, banking PIN, and full card details in sequence is not part of any legitimate bank verification process.
  • Fake dashboard elements: The page includes a mock-up of a Bank of America dashboard (“Hello, Jane”) with reward points and account numbers. This is copied from the real site but appears out of context on a verification page.
  • Outdated copyright: The footer shows “© 2021” (the screenshots are from late 2022), a common oversight in phishing pages.
  • Mixed languages: The page uses Spanish for instructions but includes English text in the fake dashboard, which may indicate copied content.
  • Unsolicited “identity verification” request: Bank of America does not send emails or messages with links requiring customers to enter email credentials and card details to verify identity.

What to do if you encounter this:

  • Do not enter your email address, email password, banking PIN, or card details on these pages.
  • If you are a Bank of America customer, always access online banking by typing bankofamerica.com directly into your browser or using the official app.
  • If you have already entered your email credentials, change your email password immediately and enable two-factor authentication. Check for any unauthorized forwarding rules.
  • If you have entered card details, contact Bank of America immediately to block your card and dispute any unauthorized transactions.
  • Report the phishing pages to Bank of America’s fraud department (e.g., [email protected]).

Why this scam is particularly dangerous:
This phishing kit targets two critical assets simultaneously: email account access and payment card details. With email access, the attacker can intercept password reset links, delete fraud alerts, and take over other accounts. With card details, they can make fraudulent purchases. The combination of Spanish language and Bank of America branding is designed to reach a large Spanish-speaking customer base in the United States.

Protective measures:

  • Bookmark the official Bank of America login page and use that bookmark to access online banking—never click links in emails or messages.
  • Use a password manager: It will autofill only on legitimate bankofamerica.com domains.
  • Never provide your email password on any banking site. Legitimate banks never ask for it.
  • Enable two-factor authentication (2FA) on both your email and bank accounts, preferably using an authenticator app rather than SMS.
  • Be suspicious of any unsolicited message that creates urgency and asks you to “verify” your identity by providing extensive personal information.
  • Check the URL carefully: Legitimate Bank of America domains end with bankofamerica.com. Look for misspellings, extra words, or unusual top-level domains.
  • If in doubt, contact Bank of America directly using a phone number from your bank statement or the official website—never use contact information provided in a suspicious message.

Massachusetts Unemployment Insurance phishing page detected




Threat Analysis: Massachusetts Unemployment Insurance Phishing – SSN & Account Takeover Scam

This phishing campaign impersonates the Massachusetts Unemployment Insurance (UI) Online Application portal, used by the state’s Department of Unemployment Assistance (DUA). The scam targets unemployment claimants, aiming to steal their Social Security Number (SSN), password, and email verification code—the credentials needed to access benefit accounts and redirect payments.

How it works:
The victim receives a phishing email, SMS, or other message claiming an issue with their unemployment claim, an overpayment waiver, or the need to verify their account. The message includes a link to the first phishing page.

Step 1 – Fake Login / SSN Entry Page (First Screenshot)
This page mimics the Massachusetts UI Online Application interface. It asks for:

  • Social Security Number (SSN)
  • Password

The page includes a lengthy “WARNING” notice copied from official government websites, stating that unauthorized access is monitored and may be subject to criminal penalties. This warning is intended to make the page appear legitimate. A checkbox is used to acknowledge the terms.

Step 2 – Fake Account Verification Page (Second Screenshot)
After submitting the SSN and password, the victim is taken to a second page that claims a verification code has been sent to their email. The victim is asked to either click a link in the email or enter the verification code directly on the page.

The goal:
The attacker aims to:

  • Steal the victim’s SSN and the password they use for the unemployment portal
  • Capture the email verification code (2FA) to complete the login on the real DUA site
  • Gain full access to the victim’s unemployment benefits account to redirect payments, change banking information, or commit identity theft

Red flags to watch for:

  • Suspicious URL: The pages are hosted on a domain that is not mass.gov or any official Massachusetts state government domain. The presence of “WIX.com” website builder branding at the top is a strong indicator that this is not an official government site.
  • SSN and password on the same page: Legitimate Massachusetts UI login uses a different flow (often a username or email with password, not SSN directly on the login page). Asking for SSN and password together in this manner is unusual and a red flag.
  • Copied government warnings: The warning notice about unauthorized access is copied from real government websites, but it is being used out of context on a fake page. The inclusion of such text does not make the page legitimate.
  • Unsolicited verification request: The state DUA does not send emails or messages with links requiring claimants to log in and then verify via a code entered on a third‑party site.
  • WIX.com branding: Official government websites are not built on free website builders like WIX. The visible “designed with WIX.com” text is a clear sign of a fraudulent page.
  • Generic design: The pages lack the full branding, security seals, and personalized account details that would appear on a legitimate state UI portal after login.

What to do if you encounter this:

  • Do not enter your SSN, password, or any verification code on these pages.
  • If you are a Massachusetts unemployment claimant, always access the UI Online system by typing mass.gov directly into your browser and navigating to the DUA section, or by using the official mobile app. Never click links in unsolicited emails or messages.
  • If you have already entered your SSN and password, contact the Massachusetts DUA immediately to secure your account, change your password, and report the incident. Also monitor your credit and consider placing a fraud alert on your SSN.
  • Report the phishing page to the Massachusetts DUA and to the appropriate authorities (such as the FBI’s IC3).

Why this scam is particularly dangerous:
Unemployment benefit accounts are high‑value targets for fraudsters. By stealing SSNs and passwords, attackers can redirect benefit payments to their own bank accounts or use the stolen identities to file fraudulent claims. The addition of a “verification code” step is designed to bypass any two‑factor authentication (2FA) that the real system may use, giving the attacker full control.

Protective measures:

  • Always access government benefits portals by typing the official URL directly (e.g., mass.gov) – never click links in emails or messages.
  • Use a password manager: It will autofill only on legitimate domains, not on phishing sites.
  • Never enter your SSN and password on a page that appears to be a login form unless you are 100% sure of the URL. Legitimate state portals often use separate steps for identity verification.
  • Enable two‑factor authentication (2FA) on your unemployment account if available.
  • Be suspicious of any unsolicited message that creates urgency and asks you to log in to your benefits account, especially if it involves SSN or verification codes.
  • Check the URL carefully: Official Massachusetts government domains end with mass.gov. Look for misspellings, extra words, or unusual top‑level domains. Also watch for free website builder URLs (e.g., wixsite.com, weebly.com).
  • If in doubt, contact the Massachusetts DUA directly using a phone number from the official website—never use contact information provided in a suspicious message.

Credit Agricole Bank phishing page detected



Threat Analysis: Crédit Agricole Phishing – Multi‑Stage SécuriPass & Credential Theft

This phishing campaign impersonates Crédit Agricole. The scam uses a long, multi‑page flow to capture:

  • The victim’s online banking identifier and personal code (password)
  • The victim’s SMS verification code (2FA)
  • An email verification code (second 2FA channel)

By harvesting both the SMS and email codes, attackers can bypass multiple security layers and gain full account access.

How it works:
The victim receives a phishing email claiming they have not activated SécuriPass (a real security feature) and must update their contact details.

Step 1 – Fake Security Alert Email (First Screenshot)
A convincing email impersonating Crédit Agricole. It claims SécuriPass is not activated and urges the victim to click a link to verify their phone and email details. A threat is implied by referencing “article 30” (contract modification), adding false legitimacy.

Step 2 – Fake Bank Homepage (Second Screenshot)
After clicking the link, the victim lands on a page that mimics the Crédit Agricole public website. It includes navigation menus, app download links, and a prominent “MON ESPACE” (My Space) button. This page is designed to look like the official bank portal before login.

Step 3 – Fake Login Page (Third Screenshot)
Clicking “MON ESPACE” leads to a fake login page asking for:

  • Identifiant (11‑digit identifier)
  • Code personnel (6‑digit personal code/password)

This captures the victim’s primary credentials.

Step 4 – Fake “First Connection” SMS Code Page (Fourth Screenshot)
The victim is told it is their first visit and asked to enter a 6‑digit code sent by SMS. This is a classic 2FA capture step. The attacker, having the credentials from Step 3, likely triggers the real SMS code on the legitimate site.

Step 5 – Fake SécuriPass Activation – Two‑Code Page (Fifth Screenshot)
The final page presents a “SécuriPass activation in two steps”:

  • First, an SMS code (another 6‑digit code)
  • Second, a 6‑digit email code

The page instructs the victim not to close the window and to enter both codes. This captures both SMS and email‑based authentication codes, giving the attacker persistent access.

The goal:
The attacker aims to:

  • Steal the victim’s Crédit Agricole credentials (identifier + personal code)
  • Capture SMS 2FA codes
  • Capture email verification codes
  • Gain full access to the victim’s bank account and email account, enabling fund transfers and identity theft

Red flags to watch for:

  • Suspicious URL: All pages are hosted on domains that are not credit-agricole.fr. Legitimate Crédit Agricole services are accessed through the official domain.
  • Multi‑page flow with redundant code requests: Asking for an SMS code twice, and then also an email code, is highly unusual. Legitimate SécuriPass activation is a one‑time process within the app or after login, not a multi‑code web flow.
  • Inconsistent messaging: The victim is told they have an existing account (step 3), then treated as a “first‑time” user (step 4), and then asked to activate SécuriPass (step 5). This is illogical and a sign of a phishing kit stitching together different templates.
  • Copied legitimate content: The pages contain real Crédit Agricole branding, menus, and legal text copied from the genuine site. Attackers use this to appear legitimate.
  • Request for email code: No legitimate bank asks for an email verification code in addition to SMS codes during a simple login or activation flow. This is designed to compromise the email account.
  • Unsolicited activation request: Crédit Agricole does not send emails with links to “activate SécuriPass” by entering credentials and multiple codes.

What to do if you encounter this:

  • Do not enter any identifiers, personal codes, SMS codes, or email codes on these pages.
  • If you are a Crédit Agricole customer, always access online banking by typing credit-agricole.fr directly into your browser or using the official mobile app.
  • If you have already entered credentials but not the later codes, contact Crédit Agricole immediately to change your password.
  • If you have entered SMS or email codes, assume your account is compromised. Contact Crédit Agricole’s fraud department immediately and also secure your email account (change password, check for forwarding rules).
  • Report the phishing pages to Crédit Agricole ([email protected]).

Why this scam is particularly dangerous:
This is a full account takeover kit that harvests both authentication factors and the victim’s email credentials. By asking for two separate SMS codes, the attacker can maintain a logged‑in session while also capturing a second code for a later transaction. The request for an email code suggests the attacker is also aiming to compromise the victim’s email account, which is often the “master key” for resetting passwords across other services.

Protective measures:

  • Bookmark the official Crédit Agricole login page and use that bookmark to access your account—never click links in emails.
  • Use a password manager: It will autofill only on legitimate credit-agricole.fr domains.
  • Never enter an SMS or email code on a page you reached via a link. Legitimate banks only ask for 2FA codes after you initiate a login on their official site.
  • Activate SécuriPass through the official mobile app, not via web links.
  • Be suspicious of any message that creates urgency and asks you to “activate” security features through a link.
  • Check the URL carefully: Legitimate Crédit Agricole domains end with credit-agricole.fr. Look for misspellings or unusual top‑level domains.
  • If in doubt, contact Crédit Agricole directly using a phone number from your bank statement or the official website—never use contact information from a suspicious message.

BAC Credomatic phishing page detected


Threat Analysis: BAC Credomatic Phishing – Fake “Banca en Línea” Login Page

This phishing campaign impersonates BAC Credomatic, one of the largest banks in Central America. The page mimics the bank’s “Banca en Línea” (Online Banking) login interface to steal customers’ username and password. It also includes a “Usar Token” option, suggesting the attacker may attempt to capture two‑factor authentication codes in a subsequent step.

How it works:
The victim receives a phishing email, SMS, or other message claiming a security alert, account issue, or the need to verify their information. The message includes a link to this fake BAC Credomatic login page. When the victim enters their Usuario and Contraseña and clicks the login button (likely labeled “Ingresar” or similar), the credentials are captured and sent to the attacker.

The goal:
The attacker aims to steal the victim’s BAC Credomatic online banking credentials. With these, they can log into the victim’s real bank account, view balances, transfer funds, pay bills, and commit fraud.

Red flags to watch for:

  • Suspicious URL: The page is hosted on a domain that is not baccredomatic.com or any official BAC domain. Legitimate BAC online banking is accessed through the bank’s official website. Always check the address bar.
  • Unsolicited login request: BAC Credomatic does not send emails or messages with links requiring customers to log in to resolve account issues. Customers should always access online banking by typing the official URL directly or using the official mobile app.
  • Typographical errors: The page contains a typo: “Recorzar Usuario” instead of “Recordar Usuario”. Official bank interfaces do not contain such errors.
  • Unusual or out-of-place text: The page includes a promotion about auto loans (“Listo para estrenar auto?”) and credit cards that may appear plausible but can be copied from the real website. The presence of such content does not make the page legitimate.
  • No personalization or security image: Legitimate BAC login pages often display a security image or personalized greeting. This page lacks those features.
  • “Usar Token” option: While the real bank uses tokens for two‑factor authentication, the inclusion of this option on a fake page is intended to make the flow appear authentic. However, the page itself is not the genuine login portal.

What to do if you encounter this:

  • Do not enter your username, password, or any other personal information on this page.
  • If you are a BAC Credomatic customer, always access online banking by typing the official BAC website URL for your country directly into your browser (e.g., baccredomatic.com) or by using the official BAC mobile app.
  • If you have already entered your credentials, contact BAC Credomatic immediately through their official customer service hotline to secure your account and change your password.
  • Report the phishing page to BAC Credomatic’s fraud department.

Why this scam is effective:
BAC Credomatic has millions of customers across Central America. The page uses the bank’s logo, familiar branding, and a layout that resembles the real login page. The inclusion of product promotions and a token option adds to the illusion of legitimacy. The typo “Recorzar” is a subtle red flag that careful users might notice.

Protective measures:

  • Bookmark the official BAC Credomatic login page for your country and use that bookmark to access online banking—never click links in emails or messages.
  • Use a password manager: It will autofill only on legitimate baccredomatic.com domains, not on phishing sites.
  • Enable two‑factor authentication (token or mobile app) on your BAC account if available, to add an extra layer of protection.
  • Be suspicious of any unsolicited message that creates urgency and asks you to log in to your bank account.
  • Check the URL carefully: Legitimate BAC domains end with baccredomatic.com or country‑specific subdomains (e.g., bac.gt for Guatemala). Look for misspellings, extra words, or unusual top‑level domains.
  • If in doubt, contact BAC Credomatic directly using a phone number from your bank statement or the official website—never use contact information provided in a suspicious message.