Need help? Ask the community or hire an expert.
Go to Avira Answers
Target:Flagstar Bank
Date discovered:30/06/2007

 General The goal is to get the following information:
    • Bank account
    • Credit card
    • Personal data


Phishing method:
    • URL link

 Email Details From: aw-confirm@flagstar.com
Subject: Security Measures

Visible link: https://www.flagstar.com/log_into.cfm
Actual link: http://sinkum.es.kr/zeroboard/flagstar/
IP address: 211.182.237.130


The email is designed to avoid detection from Antispam and Antiphishing. The technique is:
    • The Body of the email contains HTML content.



This screenshot is how the phishing email looks like:


 Page Details Visible URL: http://sinkum.es.kr/zeroboard/flagstar/
Actual URL: http://sinkum.es.kr/zeroboard/flagstar/
IP address: 211.182.237.130


The phishing page will look like the following:



Description inserted by Dominik Auerbach on Saturday, June 30, 2007

Back . . . .