TD Bank phishing page revealed

A sophisticated TD Bank phishing campaign targets Canadian and US customers using fraudulent SMS and emails to harvest EasyWeb credentials, security answers, and real-time OTP codes. The phishing kit, dubbed “EasyWeb Security Update,” utilizes a high-fidelity clone of the login portal to bypass multi-factor authentication, with scammers aiming for full account takeover via stolen security questions. Users are urged to avoid links in messages and to only access banking services by typing the official td.com URL.

This phishing campaign targets TD Bank customers in North America via fraudulent “EasyWeb Security Sync” alerts, aiming to steal credentials, 2FA codes, and security answers. The scam utilizes lookalike domains to steal sensitive information through a simulated security update process.

TD Bank “EasyWeb Account Alert” Phishing
Target: Customers of TD Bank (Canada and USA)
Threat Level: Critical (Full Identity & EasyWeb Access Hijacking)
Phishing Method Description
This attack targets users of the TD EasyWeb online banking portal. Scammers distribute urgent notifications via SMS (Smishing) or Email, claiming that “Your account has been temporarily disabled” or that “A new device has accessed your EasyWeb profile.” To “restore access,” the user is pressured to click a link.
The link leads to a high-fidelity clone of the TD EasyWeb login page. This multi-step phishing kit is designed to harvest:
Username / Access Card Number
Password
Security Challenge Questions & Answers: The fake site systematically asks for your secret questions (e.g., your first pet’s name, your mother’s maiden name).
Mobile Phone Number (for intercepting 2FA codes in real-time).

Red Flags to Watch For


Lookalike URL: The official domain is td.com or tdcanadatrust.com. Phishing sites use deceptive addresses like td-online-verification.net, secure-td-bank.com, easyweb-access-update.online, or free subdomains like tdbank.web.app.
Requesting Multiple Security Answers: TD Bank will never ask you to provide the answers to all your security questions on a single page or as a part of a “login update.”
Urgent & Alarming Tone: Phrases like “Immediate action required” or “Failure to verify will lead to permanent account closure” are classic social engineering tactics.

How to Protect Yourself


The “Manual Entry” Rule: Always access your bank by typing the address manually into your browser. Never use links from unexpected emails or text messages.
Use the TD App: Manage your accounts through the official TD Bank mobile app. Authentic security alerts will be delivered inside the secure app environment.
Never Share Security Answers: Treat your security question answers like secondary passwords. No bank will ask for them via an unsolicited link.
Verify by Phone: If you receive a suspicious alert, call the official TD customer service number (usually on the back of your card) to verify the status of your account.

Expert Security Tip:

The “Identity Restoration” Trap
The Method:
This case highlights a Complete Credential & Recovery Data Theft. Scammers are not just looking for your password; they are harvesting the recovery data (security questions) used to reset your password.
The Trap:
By providing your security answers, you are giving the hackers a permanent “backdoor” to your account. Even if you change your password later, they can use these stolen answers to impersonate you, call the bank’s support, or reset your credentials again.
How to Protect Yourself:
Questions are Passwords: Treat your security answers with the same level of secrecy as your main password. Never enter them on a page you reached via a link.
The Context Check: A real bank already knows your answers. If a site asks you to “update” or “confirm” them for no reason, it is 100% a scam.
Enable Two-Step Verification: Always use the strongest form of 2FA available (like the TD MySpend app or hardware tokens) to add an extra layer of defense.

Arvest bank phishing page detected

A high-fidelity Arvest Bank phishing campaign targets U.S. customers using SMS and email to steal credentials and intercept real-time MFA codes via fraudulent “sync” pages. Scammers use lookalike domains to trick users into providing login IDs, passwords, and security codes to bypass two-factor authentication, with official, manual access to arvest.com being the primary defense.

This phishing campaign targeting Arvest Bank customers uses fraudulent SMS or email alerts claiming account security issues to direct victims to a spoofed, high-fidelity login portal. Scammers utilize a real-time proxy attack to harvest usernames, passwords, Social Security Numbers, and multi-factor authentication (MFA) codes, allowing them to bypass security and seize full account control.

Arvest Bank “Account Verification” Phishing
Target: Customers of Arvest Bank (USA – Arkansas, Oklahoma, Missouri, Kansas)
Threat Level: Critical (Online Banking Access & Personal Data Theft)
Phishing Method Description
This attack targets users of Arvest Online Banking. Scammers use a “Service Interruption” or “Security Alert” pretext to create a sense of urgency. Victims typically receive a Phishing Email or SMS (Smishing) stating that their account has been “locked for security reasons” or that they must “validate their profile” to comply with new federal banking regulations.
The link in the message directs the victim to a high-fidelity clone of the official Arvest Bank login portal. This sophisticated phishing kit is designed to perform a multi-step harvesting process:
Initial Credentials: The site captures the Online Banking Login ID and Password.
Identity Verification: Once the login is “submitted,” the victim is redirected to a second form asking for highly sensitive data: Social Security Number (SSN), Date of Birth, and Mothers Maiden Name.
Real-Time 2FA Bypass: The fake site prompts for the Secure Access Code (MFA). The attacker intercepts this code in real-time to gain full control of the actual account.

Red Flags to Watch For


Domain Irregularities: The official Arvest Bank website is arvest.com. Phishing sites use deceptive lookalikes such as arvest-online-secure.net, verify-arvest.com, login-arvest-bank.org, or free subdomains like arvest.web.app.
Excessive Data Requests: Arvest Bank will never ask you to provide your full Social Security Number or all your security challenge answers in a single session just to “verify” your identity via a link.
Inconsistent Branding: Look for subtle differences in the logo resolution, font styles, or broken links in the footer (e.g., the “Privacy” or “Locations” buttons often do not work on fake sites).

How to Protect Yourself


The “Manual Entry” Rule: Always access your accounts by typing ://arvest.com manually into your browser. Never use links from unexpected emails or text messages.
Use the Arvest App: Manage your banking through the official Arvest Go mobile app. Real security notifications will be delivered inside the secure app environment.
Verify by Phone: If you receive a suspicious alert, call the official Arvest customer service at (866) 952-9523 before taking any action.

Expert Security Tip:

The “Data Over-Collection” Red Flag
The Method:
This Arvest Bank case is a prime example of Full Identity Harvesting. Scammers are not just looking for a one-time login; they are looking to steal your Full Identity (Fullz).
The Trap:
By asking for your SSN and Security Questions alongside your password, the hackers are building a comprehensive profile that allows them to bypass future security checks, open new credit lines in your name, and even take over your other financial accounts.
How to Protect Yourself:
The “Minimalist” Rule: A legitimate bank already knows your SSN and your security answers. They will never ask you to provide all of them at once in a bulk “update” form.
MFA Awareness: Treat every Secure Access Code as the “keys to the kingdom.” If you receive a code that you did not personally trigger by logging in via the official app/site, delete it immediately—it means a hacker is trying to get into your account right now.
Zero Trust for Links: If an email or text message contains a link to a sensitive login page, it is almost certainly a scam. Banks send notifications, not links.

Swedbank phishing page revealed

A sophisticated Man-in-the-Middle (MitM) phishing campaign targeting Swedbank customers across the Baltic and Nordic regions, utilizing fraudulent Smart-ID and BankID authentication requests to steal credentials in real-time [1]. Attackers deploy malicious clones of the Swedbank login portal to harvest Personal Identity Numbers, phone numbers, and PINs, using them instantly on the legitimate site to hijack sessions and authorize fraudulent transfers.

Swedbank “Security Synchronization” Phishing
Target: Customers of Swedbank (Sweden & Baltic States)
Threat Level: Critical (Smart-ID / BankID Interception)
Phishing Method Description
This attack targets the Digital Banking users of Swedbank. Scammers use a “Security Alert” or “Account Update” pretext, sending out Smishing (SMS) or Phishing Emails claiming that your “Personal Identification” is expiring or that “Unusual activity” requires a manual login to verify your identity.
The link leads to a pixel-perfect replica of the Swedbank login portal. This sophisticated phishing kit is specifically designed to harvest:
Personal Identity Number (Personnummer / Isikukood)
Security Method Selection (Smart-ID, BankID, or Mobile BankID)
Authentication Codes: The fake site triggers a real authentication request on the victim’s phone (Smart-ID or BankID app). The victim, thinking they are logging in, enters their PIN1 or PIN2 on their mobile device, which effectively signs a fraudulent transaction or authorizes a session for the attacker.

Red Flags to Watch For


Deceptive Domain: The official domain is swedbank.se (Sweden), swedbank.ee (Estonia), etc. Phishing sites use lookalikes such as swedbank-verifying.online, secure-swedbank-login.net, or free hosting subdomains like swedbank.web.app.
Unexpected App Prompts: If your Smart-ID or BankID app suddenly asks for a PIN when you didn’t manually type the official bank address into your browser, it is a 100% phishing attempt.
Links in Security Messages: Swedbank has a strict policy: they will never include clickable links in SMS messages regarding account security or login verification.

How to Protect Yourself


The “Manual Entry” Rule: Always access your bank by typing the official address manually (e.g., www.swedbank.se). Never click links in messages.
Check the App Context: Before entering your PIN in the Smart-ID/BankID app, check the control code (the 4-digit number). It must match the one shown on a website you personally accessed.
Never Confirm Unsolicited Requests: If an app prompt appears “out of the blue,” Cancel it immediately. It means someone has already entered your ID number on a fraudulent site.

Expert Security Tip:

The “Invisible Authorization” Trap
The Method:
This case highlights an Advanced Session Hijacking attack. Scammers are not just stealing a password; they are tricking you into using your Smart-ID or BankID to let them in.
The Trap:
When you enter your ID on the fake site, the hackers trigger a legitimate login request to the real bank. You then receive a notification on your phone. If you enter your PIN, you are not “verifying your identity” on the fake site—you are signing a digital signature that hands over full control of your real bank account to the attacker in seconds.
How to Protect Yourself:
Control Codes are Key: Always verify that the Control Code on the website matches the one in your app. If you are on a phishing site, the codes might match (because the hacker is mirroring the real bank), but the context is wrong.
The “Initiator” Rule: Only enter your PIN if YOU were the one who initiated the login process via a trusted browser or the official app.
Zero Trust for Links: Swedbank and other Baltic/Nordic banks will never send you a link to “Log in” or “Update” your security credentials via SMS or email.

Banco Bradesco phishing page detected

A sophisticated Banco Bradesco phishing campaign targeting Brazilian users through fake “security re-registration” messages to steal account credentials and security tokens in real time. This critical-level threat employs lookalike domains and smishing to intercept Agency/Account numbers, PINs, CPF numbers, and mobile token codes for full account takeover.

метода фишинга на основе скриншота? Чтобы люди были осведомлены, предупреждены, и не попались на обман.

A high-severity phishing campaign targeting Banco Bradesco customers in Brazil uses fraudulent “Security Key Update” alerts to steal login credentials and security tokens (Chave de Segurança) in real-time, enabling account takeovers. Attackers distribute malicious links via SMS or WhatsApp, leading to phishing sites that clone the official Bradesco portal to harvest Agência, Conta, and Token Digital codes. Users should avoid clicking links, verify URLs, and only manage accounts through the official Bradesco app, as the bank never requests security tokens for profile updates.

This Banco Bradesco phishing case highlights a sophisticated Man-in-the-Middle (MitM) attack designed to intercept security tokens in real-time, bypassing multi-factor authentication for full account hijacking. The attack uses SMS/email lures directing users to a fake portal, demanding a 6-digit ‘Chave de Segurança’ to authorize fraudulent PIX transfers immediately.
Expert Security Tip: Real-time token hijacking often involves scammers using stolen credentials to log into the legitimate banking site while the user is on the fake site, using the provided token to approve unauthorized actions. Never provide security token codes on websites reached through external links; treat any prompt for a token during login as an active phishing attempt.

La Poste phishing page revealed

A phishing campaign targeting La Poste customers in France uses SMS and email to solicit small shipping fees, ultimately stealing personal information, credit card details, and 3D-Secure codes to authorize fraudulent transactions. The attack leverages professional-looking clone sites and a “low-friction” micro-payment hook to steal high-value amounts despite requesting only a minor fee. Users are advised to track packages only through the official La Poste app or website and to carefully verify 3D-Secure SMS messages.

This phishing campaign targets French residents by using fake SMS or email notifications regarding a “redelivery fee” of a parcel, leading to a fraudulent clone of the La Poste website to steal credit card details and personal information. The attackers leverage a low-cost, 1.99€ “micro-payment” pretext to bypass suspicion and harvest 3D-Secure codes to execute unauthorized, larger transactions.
To avoid this threat, verify deliveries only through the official La Poste app, check for non-official sender numbers, and inspect URLs for suspicious domain names.

SFR phishing page revealed

A phishing campaign targeting French telecommunications provider SFR uses fraudulent emails and SMS to trick customers into entering personal and credit card details on fake “Espace Client” login pages. The attack, designed to harvest banking credentials and 3D-secure codes through fake payment or refund notices, highlights a growing utility billing scam tactic.

SFR “Refund / Unpaid Invoice” Phishing
Target: SFR (Société Française du Radiotéléphone) customers in France
Threat Level: High (Credit Card Skimming & Account Takeover)
Phishing Method Description
This attack targets users of the French telecommunications provider SFR. Scammers send out Phishing Emails or SMS (Smishing) using two common pretexts:
The Refund Bait: Claiming the user has overpaid their bill and is entitled to a refund (e.g., 50.00€).
The Payment Failure: Claiming a recent monthly payment failed and services will be suspended unless a small “regularization fee” is paid immediately.
The link leads to a high-fidelity clone of the SFR “Espace Client” portal. This phishing kit is designed to harvest:
Login ID and Password (to access the user’s contract and personal data).
Full Credit/Debit Card Details (Card Number, Expiry, and CVV).
Personal Information (Name, Address, and Date of Birth).
3D-Secure SMS Codes: The fake site intercepts the security code in real-time, allowing the attacker to authorize a much larger fraudulent purchase instead of a “refund” or a small fee.

Red Flags to Watch For


Deceptive URL: The official domain is sfr.fr. Phishing sites use lookalikes such as mon-espace-sfr-reglement.com, remboursement-sfr.net, or free hosting subdomains like sfr-client.web.app.
Refund via Credit Card: Legitimate companies like SFR refund overpayments by crediting your next bill or via bank transfer (IBAN). They never ask for your CVV code to “send” you money.
Urgent and Alarming Language: Phrases like “Action requise immédiatement” or “Suspension de ligne” are used to induce panic.

Expert Security Tip:

The “Reverse Payment” Illusion
The Method:
This case highlights the “Refund-to-Skimming” tactic. Scammers exploit the psychological “reward” of receiving a refund to lower the victim’s guard.
The Trap:
By asking you to “enter your card details to receive a refund,” the scammers are actually setting up a payment gateway on their end. When you provide your card info and the subsequent SMS code, you aren’t receiving 50€—you are authorizing a payment of potentially hundreds or thousands of euros to the attacker’s account.
How to Protect Yourself:
Refunds go to IBAN: In France, utility and telecom refunds are almost always processed via the bank account (RIB/IBAN) already linked to your contract. If a site asks for your CVV (the 3 digits on the back) to “give” you money, it is always a scam.
Check the “Espace Client” Directly: Never click a link in an email. Go to www.sfr.fr manually or open the “SFR & Moi” app. if there is a real issue or refund, it will be visible there.
Verify the Sender: Official SFR emails come from @sfr.fr or @sfr.com. Be wary of addresses like [email protected] or other generic domains.

Banca Intesa phishing page detected

A phishing campaign targeting Banca Intesa Beograd customers uses fraudulent SMS and email messages to harvest login credentials and real-time SMS OTPs via a spoofed login page. This Man-in-the-Middle attack aims to steal credentials for the Banca Intesa Mobi app, with fake links often leading to lookalike domains rather than the official bancaintesa.rs site.

This phishing case targets Intesa Sanpaolo customers, employing smishing/phishing techniques to steal “MyKey” login credentials and real-time security codes to authorize fraudulent transactions. Scammers utilize realistic fake portals and phishing kits to bypass 2FA by acting as a middleman, prompting users to enter legitimate O-Key SMS/app codes directly into the malicious site.
Expert Security Tip: Always manually enter the bank’s URL, and never input O-Key SMS codes on a website, as the attacker is likely proxying your credentials to a live, official banking session.

BAC Credomatic phishing page detected

A sophisticated phishing campaign targeting BAC Credomatic customers uses “Token Synchronization” to steal credentials and real-time OTP codes via fake banking portals, often distributed through Smishing or email. The attackers use high-fidelity clones of the bank’s portal to trick users into entering their username, password, and Código BAC, aiming to bypass multi-factor authentication for fraudulent transactions. To avoid this, users are advised to never follow links in security messages and only enter tokens when initiating transactions within the official app.

This case highlights a critical phishing threat targeting BAC Credomatic users, employing a “Digital Security Update” pretext to steal credentials, credit card details, and real-time Banca Móvil/Código BAC security codes. Scammers act as a “middleman,” utilizing intercepted OTP codes immediately to authorize fraudulent transfers or register new devices to the victim’s account. To protect against this, never enter security tokens to verify or unblock an account, and always use the official app rather than clicking links in alerts.

La poste phishing page detected

A phishing campaign targeting La Poste customers in France uses “address confirmation” scams to harvest full credit card details and bypass 3D-Secure protections [1]. Attackers utilize SMS and emails prompting a small fee to lead victims to cloned sites, stealing credentials and real-time security codes.

This phishing campaign targeting BAC Credomatic users in Central America employs SMS and email threats to force victims to a fake “Banca en Línea” portal. The attack, which impersonates “Codigo BAC” synchronization, is designed for real-time hijacking of user credentials and 2FA tokens to perform unauthorized transactions.
Key Defense Information

  • Method: Scammers act as a middleman to steal username, password, and the 6-digit security token (Codigo BAC) in real-time.
  • Warning Signs: Urgent language threatening account suspension and links to deceptive, non-official domains (e.g., sucursal-bac-seguridad.com).
  • Protection: Always manually type ://baccredomatic.com in the browser and never enter your security token on sites reached via links [1].

This BAC Credomatic phishing case demonstrates a real-time proxy attack where attackers act as a middleman to intercept 6-digit Codigo BAC security tokens in real time. By tricking users into entering this token, scammers authorize fraudulent transactions or register new devices immediately, highlighting that two-factor authentication can be bypassed if the user provides the code directly to the threat actor.

Canada Post fake page detected

A Canada Post phishing campaign uses SMS and email, claiming an “incomplete address” to lure victims into paying a small fee on a fraudulent website. This scheme steals full name, address, and credit card details, including 3D-Secure codes, to facilitate larger fraudulent transactions.

This Canada Post phishing campaign targets residents with fraudulent SMS/email alerts regarding package delivery failures, directing them to a fake portal to steal personal information and credit card data. The scam utilizes a “micro-payment” tactic to harvest card details and 3D-secure codes for high-value transactions, disguised as a small re-delivery fee. To protect against this threat, users should inspect the URL for legitimacy, ignore requests for payment via text, and verify tracking numbers on the official Canada Post site.

Canada Post “Address Verification” Phishing
Target: Residents of Canada and International Shippers
Threat Level: High (Credit Card Skimming & Identity Theft)
Phishing Method Description
This attack leverages Logistics Impersonation, specifically targeting users expecting or sending packages through Canada Post. Victims receive a “Smishing” (SMS) or Phishing Email stating that a package is held at a warehouse due to an “incomplete address” or a “small unpaid shipping fee” (usually under $3 CAD).
The link leads to a high-fidelity clone of the Canada Post tracking page. To “re-route” the package, the victim is prompted to enter:
Full Name and Delivery Address (to build a profile for identity theft).
Phone Number.
Full Credit/Debit Card Details (Number, Expiration Date, and CVV).
3D-Secure SMS Codes: The fake site captures the verification code in real-time, allowing the attacker to authorize a much larger fraudulent purchase disguised as a small shipping fee.

Red Flags to Watch For


Deceptive Domain: The official Canada Post domain is canadapost-postescanada.ca. Phishing sites use lookalikes such as canadapost-redirection.com, postes-canada-verify.net, or free subdomains like canadapost-package.web.app.
Insecure Links in SMS: Canada Post has stated they will never send unsolicited text messages with clickable links asking for personal or financial information.
Unusual Payment Requests: A legitimate postal service will not hold a package for a $1.95 or $2.50 fee via a text message link. These “micro-payments” are a psychological trick to make the victim feel the risk is low.

Expert Security Tip:

The “Micro-Payment” Trap
The Method:
This case highlights a common Financial Skimming tactic known as the “Micro-Payment” hook. Scammers ask for a negligible amount (e.g., $1.50 – $3.00) to lower your critical thinking.
The Trap:
When you enter your card details for a $2.00 fee, you aren’t just losing two dollars. You are handing over your full credit card credentials to a criminal database. Furthermore, the SMS code you receive from your bank is often not for the $2.00 fee, but for a much larger “invisible” transaction the attacker is processing in the background (such as a $1,000 gift card purchase or a high-end electronics order).
How to Protect Yourself:
Verify via Official App: If you have a tracking number, enter it manually into the official Canada Post app or website. Do not use the link in the message.
The CVV Rule: No shipping company needs your CVV code (the 3 digits on the back) to “confirm an address.” Requests for card security codes are a definitive sign of fraud.
Check the Currency: Phishing sites sometimes forget to localize. If a “Canada Post” page asks for payment in Euros (€) or US Dollars ($), it is 100% a scam.