Can you spot all the red flags on this sears webpage?

Count the Phish: Sears Webpage

This webpage contains one or more red flags that makes it a phishing site. How many can you find in this phishing example? Click to enlarge.

Sears Phishing website example

 

Answer: There are 5 red flags in total. Let’s take a look.

  1. Examine the page URL. Here, the attacker has used what’s known as a ‘subdomain attack.’ The domain “searshome.com” is clearly not the real web domain of Sears. Attackers often try to take advantage of the fact that a lot of people wouldn’t be able to tell the difference between a domain and a subdomain.
  2. The second and most obvious red flag is the “mcafeesecurity.icu” pop-up. It clearly looks phishy and has no place on a reputable website like Sears.
  3. The attacker has inserted a fake login form directly onto the main homepage to steal your credentials.
  4. The other strange thing about the login form is that it says “Email (Gmail Only).” That is clearly phishy! Why would a company like Sears do something like that?!
  5. This last red flag is a bit tricky. If you notice the “Click here” hyperlink, it contains the actual sears.com link to lure you into thinking the link is trustworthy. But if were to click that link, the actual URL would go far past the end of the address bar and contain a malicious script that would execute once you click. The tipoff is the "data:text/html" text at the start of the URL. If you see something like that, avoid the URL completely, as this is a common phishing trick.

Click to enlarge.

Sears Phishing Website Red Flags Explained

ERMProtect's Weekly Newsletter

Get a curated briefing of the week's biggest cyber news every Friday.

Stop Phishing Attacks with ERMProtect's Security Awareness Training

Turn your employees into a human firewall with our innovative Security Awareness Training.

Our e-learning modules take the boring out of security training.

Intelligence and Insights

Digital Forensics Investigation

What Are the 5 Stages of a Digital Forensics Investigation?

In this article, we delve deeply into the five stages of a digital forensics investigation and provide tips on how to select the right digital forensics company …
Comprehensive Guide to Penetration Testing

A Comprehensive Guide to Penetration Testing – Types, Methods, Benefits and Best Practices

This penetration testing guide explains the different types of penetration testing, their benefits, and their purpose …
GDPR Compliance Checklist

GDPR Compliance Checklist: A Guide for U.S. Companies

This article provides a GDPR compliance checklist to guide U.S. companies through a gap analysis and underscores the importance of GDPR compliance …