Need help? Ask the community or hire an expert.
Go to Avira Answers
Target:Flagstar Bank
Date discovered:30/06/2007

 General The goal is to get the following information:
     Bank account
     Credit card
     Personal data


Phishing method:
     URL link

 Email Details From: aw-confirm@flagstar.com
Subject: Security Measures

Visible link: https://www.flagstar.com/log_into.cfm
Actual link: http://sinkum.es.kr/zeroboard/flagstar/
IP address: 211.182.237.130


The email is designed to avoid detection from Antispam and Antiphishing. The technique is:
     The Body of the email contains HTML content.



This screenshot is how the phishing email looks like:


 Page Details Visible URL: http://sinkum.es.kr/zeroboard/flagstar/
Actual URL: http://sinkum.es.kr/zeroboard/flagstar/
IP address: 211.182.237.130


The phishing page will look like the following:



Description inserted by Dominik Auerbach on Saturday, June 30, 2007

Back . . . .