![]() To see what would happen we placed the first URL in a web browser, equating to the email’s instructions for the target to click on the provided link to access the “fax document.” Doing so brought us to the phishing site shown below. The second and third URLs are identical, which we will discuss later. The raw phishing email showing the URLs, purporting to be a fax message that needs to be accessed. We see an email with the “initial” URLs in the example below:įigure 1. In addition, the site adapts its background page and logo depending on user input to trick its victims into giving away their email credentials. Recently, we encountered an interesting phishing webpage that caught our interest because it acts like a chameleon by changing and blending its color based on its environment.
0 Comments
Leave a Reply. |