Need help? Ask the community or hire an expert.
Go to Avira Answers
Target:Barclays Bank
Date discovered:14/12/2006

 General The goal is to get the following information:
    • Bank account


Phishing method:
    • URL link

 Email Details From: service@barclays.co.uk
Subject: Barclays Urgent Notice

Visible link: https://ibank.barclays.co.uk/olb/t/VerifyIdentity.do
Actual link: http://hotcafe.org/.redirect.php
IP address: 81.57.244.28


The email is designed to avoid detection from Antispam and Antiphishing. The technique is:
    • The Body of the email contains HTML content.



This screenshot is how the phishing email looks like:


 Page Details Visible URL: http://zentnervineyard.com/.ibank.barclays.co.uk/olb/p/LoginMember.do/
Actual URL: http://zentnervineyard.com/.ibank.barclays.co.uk/olb/p/LoginMember.do/
IP address: 67.15.196.121


The phishing page will look like the following:




Description inserted by Dominik Auerbach on Friday, December 15, 2006
Description updated by Dominik Auerbach on Friday, December 15, 2006

Back . . . .