Need help? Ask the community or hire an expert.
Go to Avira Answers
Target:Flagstar Bank
Date discovered:03/08/2006

 General The goal is to get the following information:
     Bank account
     Credit card
     Personal data


Phishing method:
     URL link

 Email Details From: service@flagstar.com
Subject: In attention of all Flagstar Bank customers,

Visible link: http://www.flagstar.com/banking/Signon.html
Actual link: http://201.34.35.160/login/FlagStar-Online-Update/index.html
IP address: 201.34.35.160


The email is designed to avoid detection from Antispam and Antiphishing. The technique is:
     The Body of the email contains HTML content.



This screenshot is how the phishing email looks like:


 Page Details Visible URL: http://201.34.35.160/login/FlagStar-Online-Update/index.html
Actual URL: http://201.34.35.160/login/FlagStar-Online-Update/index.html
IP address: 201.34.35.160


The phishing page will look like the following:





Description inserted by Dominik Auerbach on Thursday, August 3, 2006
Description updated by Dominik Auerbach on Thursday, August 3, 2006

Back . . . .