Phishing La Banque Postale - Lookyloo Capture (http://one.doesntexist.com/p/b2ba4)
Phishing La Banque Postale - Lookyloo Capture (http://one.doesntexist.com/p/b2ba4)
AI Analysis
Technical Summary
This threat concerns a phishing campaign targeting customers of La Banque Postale, a major French bank. The campaign is identified through a Lookyloo capture, which is a tool used to analyze web page structures and behaviors, indicating that the phishing site mimics the legitimate bank's website to deceive users. The phishing URL provided (http://one.doesntexist.com/p/b2ba4) suggests the use of a domain designed to appear legitimate or obscure its malicious intent. The campaign aims to steal sensitive information such as login credentials, personal identification, or financial data by tricking users into submitting their details on a fraudulent website. No specific affected software versions or vulnerabilities are noted, as this is a social engineering attack rather than a technical exploit. The severity is rated low by the source, reflecting the commonality of phishing but also the potential for harm if successful. No patches or technical mitigations are available since this is a user-targeted attack vector. Indicators of compromise are not provided, limiting direct detection capabilities. The campaign was publicly reported in May 2022 and is classified under OSINT and external analysis categories, indicating open-source intelligence gathering rather than an active exploit campaign. The absence of known exploits in the wild confirms this is a phishing threat relying on deception rather than software vulnerabilities.
Potential Impact
For European organizations, particularly those operating in France or serving French customers, this phishing campaign poses a risk of credential theft and subsequent unauthorized access to banking accounts. Successful phishing can lead to financial fraud, identity theft, and reputational damage to the targeted bank and its customers. While the direct impact on organizational infrastructure is limited, the indirect consequences include increased fraud investigations, customer trust erosion, and potential regulatory scrutiny under GDPR for failure to protect customer data. The campaign's low severity rating suggests limited sophistication, but phishing remains a prevalent threat vector that can facilitate more severe attacks such as account takeover or financial theft. Organizations with customer bases in France or those that integrate La Banque Postale services should be vigilant. The threat also underscores the importance of user awareness and robust anti-phishing defenses in the European financial sector.
Mitigation Recommendations
Mitigation should focus on user education and technical controls tailored to phishing threats. Specific recommendations include: 1) Conduct targeted phishing awareness training for customers and employees emphasizing recognition of fraudulent URLs and suspicious communications. 2) Deploy advanced email filtering solutions that use URL reputation and sandboxing to block phishing emails before reaching users. 3) Implement multi-factor authentication (MFA) for all customer and employee accounts to reduce the risk of credential misuse. 4) Use domain-based message authentication, reporting, and conformance (DMARC), SPF, and DKIM to prevent spoofing of legitimate bank domains. 5) Monitor for phishing domains impersonating La Banque Postale using threat intelligence feeds and take down requests to hosting providers. 6) Encourage customers to verify URLs and use official banking apps or websites rather than links in emails. 7) Collaborate with national cybersecurity agencies and CERTs to share intelligence and coordinate responses. These measures go beyond generic advice by focusing on the specific phishing vector and the targeted institution.
Affected Countries
France, Belgium, Luxembourg
Indicators of Compromise
- link: https://lookyloo.circl.lu/tree/184f1ad3-27b1-4402-834b-fc0b579313cb
- file: screenshot_landing_page.png
- link: https://urlscan.io/result/ddce0ad0-1e2a-4c7d-ba74-12c0a33a72c8/
- url: http://one.doesntexist.com/p/b2ba4
- domain: one.doesntexist.com
- domain: one.doesntexist.com
- ip: 23.94.183.62
- url: https://one.doesntexist.com/p/b2ba4
- domain: one.doesntexist.com
- domain: one.doesntexist.com
- ip: 23.94.183.62
- url: https://one.doesntexist.com/p/b2ba4/
- domain: one.doesntexist.com
- domain: one.doesntexist.com
- ip: 23.94.183.62
- file: b2ba4
- size-in-bytes: 9290
- float: 5.1610648035932
- hash: 98a92abab85921a86fa8f357f5c2c4e1
- hash: 90bdc8691282c1ea1cdb75ef6c108e0e35ae8900
- hash: 77f737ba3a583162386ef0dfb658552728c313fb03f6459778513e2b8a08ef02
- hash: 2897386ef7fc4f647b79f2248092112dbfff2df33975a7cce442e3510fe0fb26c274717aae31878cb467eac39244f043c73d4ec4e907c5e6e11c9926eca8e2cb
- malware-sample: b2ba4|98a92abab85921a86fa8f357f5c2c4e1
- mime-type: text/html
- ssdeep: 192:KezBXJCdzkNfNjzrL9t4SfjxOZxJZDI4Sm85SHZpBuk45X4NY47LYMgygKnKsj:Ke9JCONlj7PjrYZ/ZUj/54Z//uBqLZvz
- datetime: 2022-05-09T19:30:18+00:00
- datetime: 2022-05-10T19:29:58+00:00
- link: https://www.virustotal.com/gui/url/47f13043816a6cfbb2ab068795b6878b2ba8d68b2aa5957111b3d0e621fe9c87/detection
- datetime: 2022-05-09T19:35:33+00:00
- datetime: 2022-05-10T05:47:56+00:00
- link: https://www.virustotal.com/gui/url/e59d879dcb5d59424d6926ddd0039a7951eb2d9ff86abcfe8c476e237f67bdfc/detection
- datetime: 2022-05-10T05:34:49+00:00
- datetime: 2022-05-10T05:34:49+00:00
- link: https://www.virustotal.com/gui/url/93fec846863a31fa02a8ffc799a292675774cf33d43b897adc7615b4bbadb210/detection
Phishing La Banque Postale - Lookyloo Capture (http://one.doesntexist.com/p/b2ba4)
Description
Phishing La Banque Postale - Lookyloo Capture (http://one.doesntexist.com/p/b2ba4)
AI-Powered Analysis
Technical Analysis
This threat concerns a phishing campaign targeting customers of La Banque Postale, a major French bank. The campaign is identified through a Lookyloo capture, which is a tool used to analyze web page structures and behaviors, indicating that the phishing site mimics the legitimate bank's website to deceive users. The phishing URL provided (http://one.doesntexist.com/p/b2ba4) suggests the use of a domain designed to appear legitimate or obscure its malicious intent. The campaign aims to steal sensitive information such as login credentials, personal identification, or financial data by tricking users into submitting their details on a fraudulent website. No specific affected software versions or vulnerabilities are noted, as this is a social engineering attack rather than a technical exploit. The severity is rated low by the source, reflecting the commonality of phishing but also the potential for harm if successful. No patches or technical mitigations are available since this is a user-targeted attack vector. Indicators of compromise are not provided, limiting direct detection capabilities. The campaign was publicly reported in May 2022 and is classified under OSINT and external analysis categories, indicating open-source intelligence gathering rather than an active exploit campaign. The absence of known exploits in the wild confirms this is a phishing threat relying on deception rather than software vulnerabilities.
Potential Impact
For European organizations, particularly those operating in France or serving French customers, this phishing campaign poses a risk of credential theft and subsequent unauthorized access to banking accounts. Successful phishing can lead to financial fraud, identity theft, and reputational damage to the targeted bank and its customers. While the direct impact on organizational infrastructure is limited, the indirect consequences include increased fraud investigations, customer trust erosion, and potential regulatory scrutiny under GDPR for failure to protect customer data. The campaign's low severity rating suggests limited sophistication, but phishing remains a prevalent threat vector that can facilitate more severe attacks such as account takeover or financial theft. Organizations with customer bases in France or those that integrate La Banque Postale services should be vigilant. The threat also underscores the importance of user awareness and robust anti-phishing defenses in the European financial sector.
Mitigation Recommendations
Mitigation should focus on user education and technical controls tailored to phishing threats. Specific recommendations include: 1) Conduct targeted phishing awareness training for customers and employees emphasizing recognition of fraudulent URLs and suspicious communications. 2) Deploy advanced email filtering solutions that use URL reputation and sandboxing to block phishing emails before reaching users. 3) Implement multi-factor authentication (MFA) for all customer and employee accounts to reduce the risk of credential misuse. 4) Use domain-based message authentication, reporting, and conformance (DMARC), SPF, and DKIM to prevent spoofing of legitimate bank domains. 5) Monitor for phishing domains impersonating La Banque Postale using threat intelligence feeds and take down requests to hosting providers. 6) Encourage customers to verify URLs and use official banking apps or websites rather than links in emails. 7) Collaborate with national cybersecurity agencies and CERTs to share intelligence and coordinate responses. These measures go beyond generic advice by focusing on the specific phishing vector and the targeted institution.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Uuid
- ff6b1c02-8c44-4646-9d3f-9a831b5ba006
- Original Timestamp
- 1652441662
Indicators of Compromise
Link
Value | Description | Copy |
---|---|---|
linkhttps://lookyloo.circl.lu/tree/184f1ad3-27b1-4402-834b-fc0b579313cb | — | |
linkhttps://urlscan.io/result/ddce0ad0-1e2a-4c7d-ba74-12c0a33a72c8/ | — | |
linkhttps://www.virustotal.com/gui/url/47f13043816a6cfbb2ab068795b6878b2ba8d68b2aa5957111b3d0e621fe9c87/detection | — | |
linkhttps://www.virustotal.com/gui/url/e59d879dcb5d59424d6926ddd0039a7951eb2d9ff86abcfe8c476e237f67bdfc/detection | — | |
linkhttps://www.virustotal.com/gui/url/93fec846863a31fa02a8ffc799a292675774cf33d43b897adc7615b4bbadb210/detection | — |
File
Value | Description | Copy |
---|---|---|
filescreenshot_landing_page.png | — | |
fileb2ba4 | — |
Url
Value | Description | Copy |
---|---|---|
urlhttp://one.doesntexist.com/p/b2ba4 | — | |
urlhttps://one.doesntexist.com/p/b2ba4 | — | |
urlhttps://one.doesntexist.com/p/b2ba4/ | — |
Domain
Value | Description | Copy |
---|---|---|
domainone.doesntexist.com | — | |
domainone.doesntexist.com | — | |
domainone.doesntexist.com | — | |
domainone.doesntexist.com | — | |
domainone.doesntexist.com | — | |
domainone.doesntexist.com | — |
Ip
Value | Description | Copy |
---|---|---|
ip23.94.183.62 | — | |
ip23.94.183.62 | — | |
ip23.94.183.62 | — |
Size in-bytes
Value | Description | Copy |
---|---|---|
size-in-bytes9290 | — |
Float
Value | Description | Copy |
---|---|---|
float5.1610648035932 | — |
Hash
Value | Description | Copy |
---|---|---|
hash98a92abab85921a86fa8f357f5c2c4e1 | — | |
hash90bdc8691282c1ea1cdb75ef6c108e0e35ae8900 | — | |
hash77f737ba3a583162386ef0dfb658552728c313fb03f6459778513e2b8a08ef02 | — | |
hash2897386ef7fc4f647b79f2248092112dbfff2df33975a7cce442e3510fe0fb26c274717aae31878cb467eac39244f043c73d4ec4e907c5e6e11c9926eca8e2cb | — |
Malware sample
Value | Description | Copy |
---|---|---|
malware-sampleb2ba4|98a92abab85921a86fa8f357f5c2c4e1 | — |
Mime type
Value | Description | Copy |
---|---|---|
mime-typetext/html | — |
Ssdeep
Value | Description | Copy |
---|---|---|
ssdeep192:KezBXJCdzkNfNjzrL9t4SfjxOZxJZDI4Sm85SHZpBuk45X4NY47LYMgygKnKsj:Ke9JCONlj7PjrYZ/ZUj/54Z//uBqLZvz | — |
Datetime
Value | Description | Copy |
---|---|---|
datetime2022-05-09T19:30:18+00:00 | — | |
datetime2022-05-10T19:29:58+00:00 | — | |
datetime2022-05-09T19:35:33+00:00 | — | |
datetime2022-05-10T05:47:56+00:00 | — | |
datetime2022-05-10T05:34:49+00:00 | — | |
datetime2022-05-10T05:34:49+00:00 | — |
Threat ID: 68359c9b5d5f0974d01e99e6
Added to database: 5/27/2025, 11:06:03 AM
Last enriched: 7/5/2025, 10:26:17 PM
Last updated: 8/5/2025, 5:52:03 AM
Views: 16
Related Threats
Actions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.