Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Data Breach
  • A Bank SMS Text Phish Attempt
  • Data Breach
  • Malware

A Bank SMS Text Phish Attempt

4 years ago Andrew Swoboda
A Bank SMS Text Phish Attempt

Phishing attempts over text messages are becoming more prevalent. I received an SMS text message that contained a phishing attempt for a Canadian Bank. The message implied that I have received a new notification with this bank and I should visit the provided link. I usually do not click on any links, but I decided to see what would happen when I navigated to the page. 

TD – Phish Text:

The Fake TD Login Page

The fake login page looks very similar to the one that is displayed when you load the real TD web site. The text on the bottom of the fake login page was an exact copy from the real TD login page. The main difference was that the fake site was not functional and only offered the fake login form. If you tried to request any other page, the browser would report an issue with the fake web site. This seemed like an attempt to keep potential victims trapped on the current page. I hope that would have raised a red flag for potential victims.

Fake TD Login:

Real TD Login:

The Scam

This scam is similar to previous bank scams in that it just captures all the input that is passed into the provided fields. Once all the required data is captured the fake web site redirects victims to the real TD login page. This allows any victim the ability to log into their bank account.

This part captures the bank card/access card and the password.

The next part of the phish was to get a customer to send their verification code to them. This is so the scammer could just log into the account without requesting a pin or bypassing the code.

This part ensures that the scammer gets the correct card number. This might also give the scammer enough information to make a purchase.

Here you can see how victims would get redirected to the real TD login page.

The Certificate

The browser should catch any site with an improper certificate, but this site had a valid certificate that was signed by Let’s Encrypt. I reported that a malicious web site was using the certificate to Let’s Encrypt. However, they refused to revoke the certificate because they do not monitor content of web sites. This feels very unfortunate given that they start that blog post by saying, “our mission is to help build a safer and more secure Web.”

The Server is Hosting Other Banking Scams

While investigating the server, I noticed that this server was host other Canadian Bank scams. The server also hosts fake login pages for BMO, TD, National Bank, and PC Financial.

Here you can see the directory listing for other scams.

A BMO Scam:

TD Scam:

National Bank Scam:

PC Financial Scam:

Reporting the Scam

These fake pages looked like they were going to trick several people into disclosing their private banking information. I decided to report the scam to two of the Canadian Banks. These banks have phishing emails that they use to collect information related to phishing attacks. I reported the phishing text message to [email protected] and [email protected].  

This malicious web site is now being reported as being deceptive.

The post ” A Bank SMS Text Phish Attempt” appeared first on TripWire

Source:TripWire – Andrew Swoboda

Tags: Encryption, Finance, Phishing, TripWire

Continue Reading

Previous What Are the Key Challenges for Cybersecurity Professionals Going into 2022?
Next Apache Log4j Vulnerability — Log4Shell — Widely Under Active Attack

More Stories

  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

The First 90 Seconds: How Early Decisions Shape Incident Response Investigations

2 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers

4 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware

Eclipse Foundation Mandates Pre-Publish Security Checks for Open VSX Extensions

6 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalog

6 hours ago [email protected] (The Hacker News)
  • Data Breach

[Webinar] The Smarter SOC Blueprint: Learn What to Build, Buy, and Automate

22 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Hackers Exploit Metro4Shell RCE Flaw in React Native CLI npm Package

22 hours ago [email protected] (The Hacker News)

Recent Posts

  • The First 90 Seconds: How Early Decisions Shape Incident Response Investigations
  • Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers
  • Eclipse Foundation Mandates Pre-Publish Security Checks for Open VSX Extensions
  • CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalog
  • http://thehackernews.com/2026/02/docker-fixes-critical-ask-gordon-ai.html

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT