Count the Phish: Sears Webpage
This webpage contains one or more red flags that makes it a phishing site. How many can you find in this phishing example? Click to enlarge.
Answer: There are 5 red flags in total. Let’s take a look.
- Examine the page URL. Here, the attacker has used what’s known as a ‘subdomain attack.’ The domain “searshome.com” is clearly not the real web domain of Sears. Attackers often try to take advantage of the fact that a lot of people wouldn’t be able to tell the difference between a domain and a subdomain.
- The second and most obvious red flag is the “mcafeesecurity.icu” pop-up. It clearly looks phishy and has no place on a reputable website like Sears.
- The attacker has inserted a fake login form directly onto the main homepage to steal your credentials.
- The other strange thing about the login form is that it says “Email (Gmail Only).” That is clearly phishy! Why would a company like Sears do something like that?!
- This last red flag is a bit tricky. If you notice the “Click here” hyperlink, it contains the actual sears.com link to lure you into thinking the link is trustworthy. But if were to click that link, the actual URL would go far past the end of the address bar and contain a malicious script that would execute once you click. The tipoff is the "data:text/html" text at the start of the URL. If you see something like that, avoid the URL completely, as this is a common phishing trick.
Click to enlarge.
Get a curated briefing of the week's biggest cyber news every Friday.
Turn your employees into a human firewall with our innovative Security Awareness Training.
Our e-learning modules take the boring out of security training.
Intelligence and Insights
What Are the 5 Stages of a Digital Forensics Investigation?
In this article, we delve deeply into the five stages of a digital forensics investigation and provide tips on how to select the right digital forensics company …
A Comprehensive Guide to Penetration Testing – Types, Methods, Benefits and Best Practices
This penetration testing guide explains the different types of penetration testing, their benefits, and their purpose …
GDPR Compliance Checklist: A Guide for U.S. Companies
This article provides a GDPR compliance checklist to guide U.S. companies through a gap analysis and underscores the importance of GDPR compliance …