Need help? Ask the community or hire an expert.
Go to Avira Answers
Target:Flagstar Bank
Date discovered:21/07/2007

 General The goal is to get the following information:
     Bank account
     Credit card
     Personal data


Phishing method:
     URL link

 Email Details From: info@FlagStar.com
Subject: PREVENTION OF FRAUD!

Visible link: http://mail.ncxh.gov.cn/www.flagstarbanking2.com/onlineserv/HB/index...
Actual link: http://mail.ncxh.gov.cn/www.flagstarbanking2.com/onlineserv/HB/index...
IP address: 220.175.137.195


The email is designed to avoid detection from Antispam and Antiphishing. The technique is:
     The Body of the email contains HTML content.



This screenshot is how the phishing email looks like:


 Page Details Visible URL: http://mail.ncxh.gov.cn/www.flagstarbanking2.com/onlineserv/HB/index...
Actual URL: http://mail.ncxh.gov.cn/www.flagstarbanking2.com/onlineserv/HB/index...
IP address: 220.175.137.195


The phishing page will look like the following:




Description inserted by Dominik Auerbach on Sunday, July 22, 2007

Back . . . .