Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Phishing La Banque Postale - Lookyloo Capture (http://one.doesntexist.com/p/b2ba4)

0
Low
Published: Wed May 11 2022 (05/11/2022, 00:00:00 UTC)
Source: CIRCL OSINT Feed
Vendor/Project: tlp
Product: white

Description

This threat involves a phishing campaign targeting customers of La Banque Postale, a French bank. The campaign uses a Lookyloo capture of a phishing page hosted at a suspicious URL to deceive users into divulging sensitive information. Although classified as low severity, phishing remains a significant risk due to potential credential theft and fraud. There is no patch available, and no known exploits in the wild beyond the phishing attempt itself. The campaign primarily threatens confidentiality by harvesting user credentials. European organizations, especially in France, are at higher risk due to the targeted nature of the campaign. Mitigation requires user awareness, email filtering, and domain monitoring. Given the ease of exploitation and potential for financial fraud, the threat severity is assessed as medium. Defenders should focus on phishing detection, user education, and incident response readiness.

AI-Powered Analysis

AILast updated: 12/24/2025, 06:09:26 UTC

Technical Analysis

The reported threat is a phishing campaign targeting La Banque Postale customers, leveraging a Lookyloo capture of a phishing webpage hosted at a suspicious domain (http://one.doesntexist.com/p/b2ba4). Lookyloo is a tool used to visualize web page structures and can be abused by attackers to create convincing replicas of legitimate banking websites. This phishing attempt aims to trick users into entering sensitive information such as login credentials, personal identification, or banking details. The campaign is identified through OSINT sources and classified as low severity by the original report, but phishing inherently carries risks of credential compromise and subsequent fraudulent transactions. No software vulnerabilities or patches are involved, as this is a social engineering attack rather than a technical exploit. The absence of known exploits in the wild beyond the phishing site suggests it is an opportunistic campaign rather than a widespread automated attack. The threat primarily impacts confidentiality and potentially integrity if attackers use stolen credentials to manipulate accounts. The campaign’s targeting of a French bank indicates a regional focus, with potential spillover risk to other European countries with customers of the bank or similar institutions. The technical details include a unique identifier and timestamp but lack further exploit specifics. Overall, this is a classic phishing threat leveraging social engineering and deceptive web content to compromise user data.

Potential Impact

The primary impact of this phishing campaign is the compromise of user credentials and sensitive personal or financial information, which can lead to unauthorized access to bank accounts, fraudulent transactions, identity theft, and financial loss. For European organizations, especially financial institutions and their customers, this undermines trust and can result in regulatory scrutiny under GDPR for failure to protect customer data. The campaign’s focus on La Banque Postale suggests a high impact on French customers, but similar phishing tactics could be adapted to other banks across Europe. The low technical complexity of phishing means it can be widely distributed, potentially affecting a large number of users. The financial sector’s critical role in Europe’s economy and the high value of banking credentials amplify the threat’s significance. Additionally, successful phishing can serve as an initial access vector for more advanced attacks, including fraud and account takeover. The reputational damage to targeted banks and the increased operational costs for incident response and remediation also represent significant impacts.

Mitigation Recommendations

To mitigate this phishing threat, organizations should implement multi-layered defenses beyond generic advice: 1) Deploy advanced email filtering solutions with machine learning capabilities to detect and quarantine phishing emails targeting banking customers. 2) Conduct targeted user awareness campaigns focusing on recognizing phishing attempts specific to La Banque Postale and similar institutions, including training on verifying URLs and avoiding suspicious links. 3) Monitor and take down phishing domains and URLs rapidly by collaborating with hosting providers and law enforcement. 4) Implement strong multi-factor authentication (MFA) for online banking access to reduce the risk of compromised credentials being abused. 5) Use domain-based message authentication, reporting, and conformance (DMARC) policies to prevent email spoofing of the bank’s domain. 6) Continuously monitor for Lookyloo captures or similar tools being abused to replicate legitimate sites and proactively block such content. 7) Encourage customers to report suspected phishing attempts promptly and provide clear guidance on safe online banking practices. 8) Employ behavioral analytics on banking platforms to detect anomalous login patterns indicative of compromised credentials. These measures collectively reduce the likelihood and impact of phishing attacks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Uuid
ff6b1c02-8c44-4646-9d3f-9a831b5ba006
Original Timestamp
1652441662

Indicators of Compromise

Link

ValueDescriptionCopy
linkhttps://lookyloo.circl.lu/tree/184f1ad3-27b1-4402-834b-fc0b579313cb
linkhttps://urlscan.io/result/ddce0ad0-1e2a-4c7d-ba74-12c0a33a72c8/
linkhttps://www.virustotal.com/gui/url/47f13043816a6cfbb2ab068795b6878b2ba8d68b2aa5957111b3d0e621fe9c87/detection
linkhttps://www.virustotal.com/gui/url/e59d879dcb5d59424d6926ddd0039a7951eb2d9ff86abcfe8c476e237f67bdfc/detection
linkhttps://www.virustotal.com/gui/url/93fec846863a31fa02a8ffc799a292675774cf33d43b897adc7615b4bbadb210/detection

File

ValueDescriptionCopy
filescreenshot_landing_page.png
fileb2ba4

Url

ValueDescriptionCopy
urlhttp://one.doesntexist.com/p/b2ba4
urlhttps://one.doesntexist.com/p/b2ba4
urlhttps://one.doesntexist.com/p/b2ba4/

Domain

ValueDescriptionCopy
domainone.doesntexist.com
domainone.doesntexist.com
domainone.doesntexist.com
domainone.doesntexist.com
domainone.doesntexist.com
domainone.doesntexist.com

Ip

ValueDescriptionCopy
ip23.94.183.62
ip23.94.183.62
ip23.94.183.62

Size in-bytes

ValueDescriptionCopy
size-in-bytes9290

Float

ValueDescriptionCopy
float5.1610648035932

Hash

ValueDescriptionCopy
hash98a92abab85921a86fa8f357f5c2c4e1
hash90bdc8691282c1ea1cdb75ef6c108e0e35ae8900
hash77f737ba3a583162386ef0dfb658552728c313fb03f6459778513e2b8a08ef02
hash2897386ef7fc4f647b79f2248092112dbfff2df33975a7cce442e3510fe0fb26c274717aae31878cb467eac39244f043c73d4ec4e907c5e6e11c9926eca8e2cb

Malware sample

ValueDescriptionCopy
malware-sampleb2ba4|98a92abab85921a86fa8f357f5c2c4e1

Mime type

ValueDescriptionCopy
mime-typetext/html

Ssdeep

ValueDescriptionCopy
ssdeep192:KezBXJCdzkNfNjzrL9t4SfjxOZxJZDI4Sm85SHZpBuk45X4NY47LYMgygKnKsj:Ke9JCONlj7PjrYZ/ZUj/54Z//uBqLZvz

Datetime

ValueDescriptionCopy
datetime2022-05-09T19:30:18+00:00
datetime2022-05-10T19:29:58+00:00
datetime2022-05-09T19:35:33+00:00
datetime2022-05-10T05:47:56+00:00
datetime2022-05-10T05:34:49+00:00
datetime2022-05-10T05:34:49+00:00

Threat ID: 68359c9b5d5f0974d01e99e6

Added to database: 5/27/2025, 11:06:03 AM

Last enriched: 12/24/2025, 6:09:26 AM

Last updated: 2/5/2026, 8:23:52 PM

Views: 54

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats