Need help? Ask the community or hire an expert.
Go to Avira Answers
Target:KeyBank
Date discovered:15/10/2006

 General The goal is to get the following information:
     Bank account


Phishing method:
     Image with link

 Email Details From: operator-309076364305id@key.com
Subject: KeyBank: service message
Actual link: http://accounts.key.com.startsession.flex5.co.nz/info.asp
IP address: 219.254.228.105


The email is designed to avoid detection from Antispam and Antiphishing. The technique is:
     The Body of the email contains HTML content.



This screenshot is how the phishing email looks like:


 Page Details Visible URL: http://accounts.key.com.startsession.flex5.co.nz/info.asp/
Actual URL: http://accounts.key.com.startsession.flex5.co.nz/info.asp/
IP address: 219.254.228.105


The phishing page will look like the following:


Description inserted by Dominik Auerbach on Sunday, October 15, 2006

Back . . . .