www.mcafee.com
Open in
urlscan Pro
104.109.95.62
Public Scan
Submitted URL: http://links.readitquik.us/els/v2/8wqXh-vxX4Hv/UFdPQ1M3QjNmbGRKclNoV3FoY3J3cktVTU1UOUhJYkJHU2ltVnp3NVZEOEtnVGw5cDFkK0x5ZVgx...
Effective URL: https://www.mcafee.com/blogs/privacy-identity-protection/how-to-spot-fake-login-pages/
Submission: On September 19 via api from US — Scanned from DE
Effective URL: https://www.mcafee.com/blogs/privacy-identity-protection/how-to-spot-fake-login-pages/
Submission: On September 19 via api from US — Scanned from DE
Form analysis
5 forms found in the DOMhttps://mcafee.com/blogs/
<form class="form-inline my-2 my-lg-0" action="https://mcafee.com/blogs/">
<div class="input-group mb-3 search-div">
<div><input class="form-control search-inp" style="display: none;" autocomplete="off" name="s" type="text" placeholder="Type and hit enter..." aria-label="Recipient's username" aria-describedby="basic-addon2"></div>
<div class="input-group-append"><button class="sarch-btn" type="button"><span class="fa fa-search" title="Search"><span style="display: none;">.</span></span> </button></div>
</div>
</form>
https://mcafee.com/blogs/
<form class="form-inline my-2 my-lg-0" action="https://mcafee.com/blogs/">
<div class="input-group mb-3 search-div">
<div class="input-group-append"><button class="sarch-btn" type="button"><span class="fa fa-search" title="Search"><span style="display: none;">.</span></span> </button></div>
</div>
</form>
/blogs/
<form class="desktop-search-form" style="display: none;" action="/blogs/">
<div class="desktop-search-div"><input class="dsk-search" autocomplete="off" name="s" type="text" placeholder="Type and hit enter..."></div>
<div><span class="close_icon_desktop"> <img src="/wp-content/themes/securingtomorrow-brillio/img/new-icons/cross-grey-icon.svg" alt="close grey icon"> </span></div>
</form>
https://mcafee-uat.mcafee.com/blogs/
<form class="form-inline my-2 my-lg-0" action="https://mcafee-uat.mcafee.com/blogs/">
<div class="input-group mb-3 search-div">
<div class="input-group-append"><button class="sarch-btn" type="button"><span class="fa fa-search" title="Type and hit enter..." autocomplete="off"><span style="display: none;">.</span></span> </button>
</div>
</div>
</form>
/blogs/
<form action="/blogs/" class="desktop-search-form" style="display: none;">
<div class="desktop-search-div">
<input class="dsk-search" name="s" type="text" placeholder="Type and hit enter..." autocomplete="off">
</div>
<div><span class="close_icon_desktop">
<img src="/wp-content/themes/securingtomorrow-brillio/img/new-icons/cross-grey-icon.svg" alt="close grey icon">
</span>
</div>
</form>
Text Content
. . * Total Protection (current) * Antivirus * Identity * About .About Our Company Awards and Reviews About Us Executive TeamNewsroom Our Efforts Inclusion & Diversity Integrity & Ethics Public Policy McAfee Labs Threat Center Join Us Search Job OpeningsLife at McAfeeOur TeamsOur Locations * Support .Support Help Consumer SupportCommunityActivate your Retail Card Learn more about Security Free Antivirus TrialMalwareFirewall Safe BrowserVPN for PhonesParental Controls More Resources 2020 Mobile Threat Report Press Pause on Risky Downloads Most Dangerous Celebrity Searches Supporting You and Your Community Hackable? Podcast Safety Tips * Investors * Enterprise * Blog * Login * More × My Account Activate your retail card Safe Browser Gaming Antivirus TechMaster Concierge Identity Protection Service Free Downloads * More .More My Account Activate your retail card Safe Browser Gaming Antivirus TechMaster Concierge Identity Protection Service Free Downloads * . * Topics Internet Security Mobile Security Family Safety Privacy & Identity Protection Security News Tips & Tricks * At McAfee McAfee News Executive Perspectives McAfee Labs Life at McAfeeHackable? Podcast . English Simplified ChineseItalia日本語EspañolFrançaisGermanPortuguêsAll Language Blogs * Blog * Topics Internet Security Mobile Security Family Safety Privacy & Identity Protection Security News Tips & Tricks * At McAfee McAfee NewsExecutive Perspectives McAfee Labs Life at McAfeeHackable? Podcast * . * Simplified Chinese Italia 日本語 Español Français German Português All Language Blogs Blog Privacy & Identity Protection How to Spot Fake Login Pages HOW TO SPOT FAKE LOGIN PAGES Jean Treadwell Aug 26, 2021 6 MIN READ Have you ever come across a website that just didn’t look quite right? Perhaps the company logo looked slightly misshapen, or the font seemed off-brand. Odds are, you landed on a phony version of a legitimate corporation’s website—a tried and true tactic relied on by many cybercriminals. FAKE LOGIN PAGES EXPLAINED A fake login page is essentially a knock-off of a real login page used to trick people into entering their login credentials, which hackers can later use to break into online accounts. These websites mirror legitimate pages by using company logos, fonts, formatting, and overall templates. Depending on the attention to detail put in by the hackers behind the imposter website, it can be nearly impossible to distinguish from the real thing. Consequentially, fake login pages can be highly effective in their end goal: credential theft. How do these pages get in front of a consumer in the first place? Typically, scammers will target unsuspecting recipients with phishing emails spoofing a trusted brand. These emails may state that the user needs to reset their password or entice them with a deal that sounds too good to be true. If the consumer clicks on the link in the email, they will be directed to the fake login page and asked to enter their username and password. Once they submit their information, cybercriminals can use the consumer’s data to conduct credential stuffing attacks and hack their online profiles. This could lead to credit card fraud, data extraction, wire transfers, identity theft, and more. HOW FAKE LOGIN PAGES ARE AFFECTING CANADIANS Scammers have recently targeted Canadians with attacks leveraging fake login pages to harvest personal data. For example, criminals preyed on employees who were expecting COVID-19 relief grants in the form of the CERB (Canada Emergency Response Benefit). These funds were sent via an electronic transfer from Interac, a legitimate Canadian interbank network. However, a phishing campaign spoofing Interac’s e-transfer service circulated emails claiming that the Canada Revenue Agency (CRA) made a CERB deposit of $1,957.50 CAD. These emails directed recipients to a fake CRA login page, which then redirected to a phony Interac e-transfer site where users were asked to select their personal bank. From there, the recipient was asked to enter their username, card number, password, security questions and answers for their online banking profile, and other personally identifiable information—providing all the information a criminal would need to hack into the user’s bank account. WHY FAKE LOGIN PAGES ARE EFFECTIVE If you Google “fake login pages,” you will quickly find countless guides on how to create fake websites in seconds. Ethical concerns aside, this demonstrates just how common vector spoofed websites are for cyberattacks. While it has been easier to distinguish between real and fake login pages in the past, criminals are constantly updating their techniques to be more sophisticated, therefore making it more difficult for consumers to recognize their fraudulent schemes. One reason why fake login pages are so effective is due to inattentional blindness, or failure to notice something that is completely visible because of a lack of attention. One of the most famous studies on inattentional blindness is the “invisible gorilla test.” In this study, participants watched a video of people dressed in black and white shirts passing basketballs. Participants were asked to count the number of times the team in white passed the ball: Because participants were intently focused on counting the number of times the players in white passed the ball, more than 50% failed to notice the person in the gorilla costume walking through the game. If this is the first time you’ve seen this video, it’s likely that you didn’t notice the gorilla, the curtain changing color from red to gold, or the player in black leaving the game. Similarly, if you come across a well-forged login page and aren’t actively looking for signs of fraud, you could inherently miss a cybercriminal’s “invisible gorilla.” That’s why it’s crucial for even those with phishing training to practice caution when they come across a website asking them to take action or enter personal details. HOW TO STEER CLEAR OF FAKE LOGIN PAGES The most important defense against steering clear of fake login pages is knowing how to recognize them. Follow these tips to help you decipher between a legitimate and a fake website: 1. DON’T FALL FOR PHISHING Most fake login pages are circulated vis phishing messages. If you receive a suspicious message that asks for personal details, there are a few ways to determine if it was sent by a phisher aiming to steal your identity. Phishers often send messages with a tone of urgency, and they try to inspire extreme emotions such as excitement or fear. If an unsolicited email urges you to “act fast!” slow down and evaluate the situation. 2. LOOK FOR MISSPELLINGS OR GRAMMATICAL ERRORS Oftentimes, hackers will use a URL for their spoofed website that is just one character off from the legitimate site, such as using “www.rbcr0yalbank.com” versus “www.rbcroyalbank.com.” Before clicking on any website from an email asking you to act, hover over the link with your cursor. This will allow you to preview the URL and identify any suspicious misspellings or grammatical errors before navigating to a potentially dangerous website. 3. ENSURE THE WEBSITE IS SECURED WITH HTTPS HTTPS, or Hypertext Transfer Protocol Secure, is a protocol that encrypts your interaction with a website. Typically, websites that begin with HTTPS and feature a padlock in the top left corner are considered safer. However, cybercriminals have more recently developed malware toolkits that leverage HTTPS to hide malware from detection by various security defenses. If the website is secured with HTTPS, ensure that this isn’t the only way you’re analyzing the page for online safety. 4. ENABLE MULTI-FACTOR AUTHENTICATION Multi-factor authentication requires that users confirm a collection of things to verify their identity—usually something they have, and a factor unique to their physical being—such as a retina or fingerprint scan. This can prevent a cybercriminal from using credential-stuffing tactics (where they will use email and password combinations to hack into online profiles) to access your network or account if your login details were ever exposed during a data breach. 5. SIGN UP FOR AN IDENTITY THEFT ALERT SERVICE An identity theft alert service warns you about suspicious activity surrounding your personal information, allowing you to jump to action before irreparable damage is done. McAfee Total Protection not only keeps your devices safe from viruses but gives you the added peace of mind that your identity is secure, as well. Stay Updated Follow us to stay updated on all things McAfee and on top of the latest consumer and mobile security threats. Jean Treadwell Sr. Director of Business & Marketing Operations and Ontario Site Leader Jean Treadwell has held strategic, intelligence, finance and operational leadership roles. She has been in technology for over twenty years because of its societal relevance, and is passionate about the... MORE FROMPRIVACY & IDENTITY PROTECTION Previous HOW TO MAKE TELEHEALTH SAFER FOR A MORE CONVENIENT LIFE ONLINE Adoption of Telehealth services saw a significant rise during the pandemic. Breaches targeting health data rose in... Jul 10, 2021 | 3 MIN READ IDENTITY PROTECTION SERVICE: THE BEST SOLUTION TO A GROWING PROBLEM A look at how to keep your information secure online using the latest tips and a new... Jul 05, 2021 | 6 MIN READ 3 CANADIAN REAL ESTATE SCAMS YOU SHOULD KNOW ABOUT Scammers and identity thieves are taking advantage of unsuspecting homeowners. In some cases, thieves are selling homes... Jun 29, 2021 | 5 MIN READ 5 RANSOMWARE THREATS CANADIANS NEED TO KNOW More online users around the world are affected by ransomware due to ever-increasing online activity and the... Jun 28, 2021 | 7 MIN READ HOW FRAUDSTERS ARE FOOLING USERS WITH THIS PROOF OF VACCINATION PHISHING SCAM According to the Washington Post, pandemic-related email scams are on the rise, especially with the delta variant surging.... Sep 03, 2021 | 4 MIN READ T-MOBILE’S DATA BREACH EXPOSES THE PERSONAL DATA OF 40 MILLION T-Mobile, the popular US mobile phone service provider, recently confirmed a data breach affecting 7.8 million current customers and 40 million records from past... Aug 20, 2021 | 3 MIN READ CHIPOTLE’S MARKETING ACCOUNT HACKED: PROTECT YOURSELF FROM PHISHING LURES According to Bleeping Computer, Chipotle’s email vendor Mailgun was recently breached, which allowed hackers to take over... Aug 12, 2021 | 4 MIN READ 7 SAVVY WAYS SENIOR ADULTS CAN SAFEGUARD DIGITAL PRIVACY As a senior adult in a hyper-connected world, keeping your privacy safeguarded isn’t easy but it is... Aug 09, 2021 | 4 MIN READ 3 TIPS TO PROTECT YOURSELF FROM XLOADER MALWARE Originally written to infect Windows devices, XLoader is a widespread and inexpensive form of malware that cybercriminals are rewriting... Aug 03, 2021 | 3 MIN READ WHAT IS A VPN AND CAN IT HIDE MY IP ADDRESS? There's a lot of misinformation about Virtual Private Networks, what they do, and the security benefits they... Jul 27, 2021 | 6 MIN READ HOW TO SECURE YOUR SMART HOME: A STEP-BY-STEP GUIDE This article will take readers on a tour of a modern-day smart home, detailing common devices that could potentially be... Jul 22, 2021 | 9 MIN READ GUIDE: PROTECTING YOUR DIGITAL IDENTITY Protecting yourself from hackers and fraud means protecting your digital identity. And that can feel like a... Jul 15, 2021 | 7 MIN READ HOW TO MAKE TELEHEALTH SAFER FOR A MORE CONVENIENT LIFE ONLINE Adoption of Telehealth services saw a significant rise during the pandemic. Breaches targeting health data rose in... Jul 10, 2021 | 3 MIN READ IDENTITY PROTECTION SERVICE: THE BEST SOLUTION TO A GROWING PROBLEM A look at how to keep your information secure online using the latest tips and a new... Jul 05, 2021 | 6 MIN READ 3 CANADIAN REAL ESTATE SCAMS YOU SHOULD KNOW ABOUT Scammers and identity thieves are taking advantage of unsuspecting homeowners. In some cases, thieves are selling homes... Jun 29, 2021 | 5 MIN READ 5 RANSOMWARE THREATS CANADIANS NEED TO KNOW More online users around the world are affected by ransomware due to ever-increasing online activity and the... Jun 28, 2021 | 7 MIN READ HOW FRAUDSTERS ARE FOOLING USERS WITH THIS PROOF OF VACCINATION PHISHING SCAM According to the Washington Post, pandemic-related email scams are on the rise, especially with the delta variant surging.... Sep 03, 2021 | 4 MIN READ T-MOBILE’S DATA BREACH EXPOSES THE PERSONAL DATA OF 40 MILLION T-Mobile, the popular US mobile phone service provider, recently confirmed a data breach affecting 7.8 million current customers and 40 million records from past... Aug 20, 2021 | 3 MIN READ CHIPOTLE’S MARKETING ACCOUNT HACKED: PROTECT YOURSELF FROM PHISHING LURES According to Bleeping Computer, Chipotle’s email vendor Mailgun was recently breached, which allowed hackers to take over... Aug 12, 2021 | 4 MIN READ 7 SAVVY WAYS SENIOR ADULTS CAN SAFEGUARD DIGITAL PRIVACY As a senior adult in a hyper-connected world, keeping your privacy safeguarded isn’t easy but it is... Aug 09, 2021 | 4 MIN READ 3 TIPS TO PROTECT YOURSELF FROM XLOADER MALWARE Originally written to infect Windows devices, XLoader is a widespread and inexpensive form of malware that cybercriminals are rewriting... Aug 03, 2021 | 3 MIN READ WHAT IS A VPN AND CAN IT HIDE MY IP ADDRESS? There's a lot of misinformation about Virtual Private Networks, what they do, and the security benefits they... Jul 27, 2021 | 6 MIN READ HOW TO SECURE YOUR SMART HOME: A STEP-BY-STEP GUIDE This article will take readers on a tour of a modern-day smart home, detailing common devices that could potentially be... Jul 22, 2021 | 9 MIN READ GUIDE: PROTECTING YOUR DIGITAL IDENTITY Protecting yourself from hackers and fraud means protecting your digital identity. And that can feel like a... Jul 15, 2021 | 7 MIN READ HOW TO MAKE TELEHEALTH SAFER FOR A MORE CONVENIENT LIFE ONLINE Adoption of Telehealth services saw a significant rise during the pandemic. Breaches targeting health data rose in... Jul 10, 2021 | 3 MIN READ IDENTITY PROTECTION SERVICE: THE BEST SOLUTION TO A GROWING PROBLEM A look at how to keep your information secure online using the latest tips and a new... Jul 05, 2021 | 6 MIN READ 3 CANADIAN REAL ESTATE SCAMS YOU SHOULD KNOW ABOUT Scammers and identity thieves are taking advantage of unsuspecting homeowners. In some cases, thieves are selling homes... Jun 29, 2021 | 5 MIN READ 5 RANSOMWARE THREATS CANADIANS NEED TO KNOW More online users around the world are affected by ransomware due to ever-increasing online activity and the... Jun 28, 2021 | 7 MIN READ Next * 1 * 2 * 3 Back to top * * * * * Corporate Headquarters 6220 America Center Drive San Jose, CA 95002 USA PRODUCTS McAfee® Total Protection McAfee® Gamer Security McAfee® Identity Protection Service McAfee® Security Scan Plus McAfee® WebAdvisor McAfee® Techmaster Concierge McAfee® Virus Removal Service RESOURCES Antivirus Parental Controls Malware Firewall Blogs Activate Retail Card Threat Center McAfee Enterprise SUPPORT Consumer Support FAQs Renewals ABOUT About McAfee Careers Contact Us Newsroom Investors Privacy & Legal Terms System Requirements Sitemap United States / English Copyright © 2021 McAfee, LLC United States / English Copyright © 2021 McAfee, LLC ✓ Thanks for sharing! AddToAny More…