Skip to main content

Phishing La Banque Postale - Lookyloo Capture (http://one.doesntexist.com/p/b2ba4)

Low
Published: Wed May 11 2022 (05/11/2022, 00:00:00 UTC)
Source: CIRCL OSINT Feed
Vendor/Project: tlp
Product: white

Description

Phishing La Banque Postale - Lookyloo Capture (http://one.doesntexist.com/p/b2ba4)

AI-Powered Analysis

AILast updated: 07/05/2025, 22:26:17 UTC

Technical Analysis

This threat concerns a phishing campaign targeting customers of La Banque Postale, a major French bank. The campaign is identified through a Lookyloo capture, which is a tool used to analyze web page structures and behaviors, indicating that the phishing site mimics the legitimate bank's website to deceive users. The phishing URL provided (http://one.doesntexist.com/p/b2ba4) suggests the use of a domain designed to appear legitimate or obscure its malicious intent. The campaign aims to steal sensitive information such as login credentials, personal identification, or financial data by tricking users into submitting their details on a fraudulent website. No specific affected software versions or vulnerabilities are noted, as this is a social engineering attack rather than a technical exploit. The severity is rated low by the source, reflecting the commonality of phishing but also the potential for harm if successful. No patches or technical mitigations are available since this is a user-targeted attack vector. Indicators of compromise are not provided, limiting direct detection capabilities. The campaign was publicly reported in May 2022 and is classified under OSINT and external analysis categories, indicating open-source intelligence gathering rather than an active exploit campaign. The absence of known exploits in the wild confirms this is a phishing threat relying on deception rather than software vulnerabilities.

Potential Impact

For European organizations, particularly those operating in France or serving French customers, this phishing campaign poses a risk of credential theft and subsequent unauthorized access to banking accounts. Successful phishing can lead to financial fraud, identity theft, and reputational damage to the targeted bank and its customers. While the direct impact on organizational infrastructure is limited, the indirect consequences include increased fraud investigations, customer trust erosion, and potential regulatory scrutiny under GDPR for failure to protect customer data. The campaign's low severity rating suggests limited sophistication, but phishing remains a prevalent threat vector that can facilitate more severe attacks such as account takeover or financial theft. Organizations with customer bases in France or those that integrate La Banque Postale services should be vigilant. The threat also underscores the importance of user awareness and robust anti-phishing defenses in the European financial sector.

Mitigation Recommendations

Mitigation should focus on user education and technical controls tailored to phishing threats. Specific recommendations include: 1) Conduct targeted phishing awareness training for customers and employees emphasizing recognition of fraudulent URLs and suspicious communications. 2) Deploy advanced email filtering solutions that use URL reputation and sandboxing to block phishing emails before reaching users. 3) Implement multi-factor authentication (MFA) for all customer and employee accounts to reduce the risk of credential misuse. 4) Use domain-based message authentication, reporting, and conformance (DMARC), SPF, and DKIM to prevent spoofing of legitimate bank domains. 5) Monitor for phishing domains impersonating La Banque Postale using threat intelligence feeds and take down requests to hosting providers. 6) Encourage customers to verify URLs and use official banking apps or websites rather than links in emails. 7) Collaborate with national cybersecurity agencies and CERTs to share intelligence and coordinate responses. These measures go beyond generic advice by focusing on the specific phishing vector and the targeted institution.

Affected Countries

Need more detailed analysis?Get Pro

Technical Details

Uuid
ff6b1c02-8c44-4646-9d3f-9a831b5ba006
Original Timestamp
1652441662

Indicators of Compromise

Link

ValueDescriptionCopy
linkhttps://lookyloo.circl.lu/tree/184f1ad3-27b1-4402-834b-fc0b579313cb
linkhttps://urlscan.io/result/ddce0ad0-1e2a-4c7d-ba74-12c0a33a72c8/
linkhttps://www.virustotal.com/gui/url/47f13043816a6cfbb2ab068795b6878b2ba8d68b2aa5957111b3d0e621fe9c87/detection
linkhttps://www.virustotal.com/gui/url/e59d879dcb5d59424d6926ddd0039a7951eb2d9ff86abcfe8c476e237f67bdfc/detection
linkhttps://www.virustotal.com/gui/url/93fec846863a31fa02a8ffc799a292675774cf33d43b897adc7615b4bbadb210/detection

File

ValueDescriptionCopy
filescreenshot_landing_page.png
fileb2ba4

Url

ValueDescriptionCopy
urlhttp://one.doesntexist.com/p/b2ba4
urlhttps://one.doesntexist.com/p/b2ba4
urlhttps://one.doesntexist.com/p/b2ba4/

Domain

ValueDescriptionCopy
domainone.doesntexist.com
domainone.doesntexist.com
domainone.doesntexist.com
domainone.doesntexist.com
domainone.doesntexist.com
domainone.doesntexist.com

Ip

ValueDescriptionCopy
ip23.94.183.62
ip23.94.183.62
ip23.94.183.62

Size in-bytes

ValueDescriptionCopy
size-in-bytes9290

Float

ValueDescriptionCopy
float5.1610648035932

Hash

ValueDescriptionCopy
hash98a92abab85921a86fa8f357f5c2c4e1
hash90bdc8691282c1ea1cdb75ef6c108e0e35ae8900
hash77f737ba3a583162386ef0dfb658552728c313fb03f6459778513e2b8a08ef02
hash2897386ef7fc4f647b79f2248092112dbfff2df33975a7cce442e3510fe0fb26c274717aae31878cb467eac39244f043c73d4ec4e907c5e6e11c9926eca8e2cb

Malware sample

ValueDescriptionCopy
malware-sampleb2ba4|98a92abab85921a86fa8f357f5c2c4e1

Mime type

ValueDescriptionCopy
mime-typetext/html

Ssdeep

ValueDescriptionCopy
ssdeep192:KezBXJCdzkNfNjzrL9t4SfjxOZxJZDI4Sm85SHZpBuk45X4NY47LYMgygKnKsj:Ke9JCONlj7PjrYZ/ZUj/54Z//uBqLZvz

Datetime

ValueDescriptionCopy
datetime2022-05-09T19:30:18+00:00
datetime2022-05-10T19:29:58+00:00
datetime2022-05-09T19:35:33+00:00
datetime2022-05-10T05:47:56+00:00
datetime2022-05-10T05:34:49+00:00
datetime2022-05-10T05:34:49+00:00

Threat ID: 68359c9b5d5f0974d01e99e6

Added to database: 5/27/2025, 11:06:03 AM

Last enriched: 7/5/2025, 10:26:17 PM

Last updated: 8/5/2025, 5:52:03 AM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats