www.mcafee.com Open in urlscan Pro
104.109.95.62  Public Scan

Submitted URL: http://links.readitquik.us/els/v2/8wqXh-vxX4Hv/UFdPQ1M3QjNmbGRKclNoV3FoY3J3cktVTU1UOUhJYkJHU2ltVnp3NVZEOEtnVGw5cDFkK0x5ZVgx...
Effective URL: https://www.mcafee.com/blogs/privacy-identity-protection/how-to-spot-fake-login-pages/
Submission: On September 19 via api from US — Scanned from DE

Form analysis 5 forms found in the DOM

https://mcafee.com/blogs/

<form class="form-inline my-2 my-lg-0" action="https://mcafee.com/blogs/">
  <div class="input-group mb-3 search-div">
    <div><input class="form-control search-inp" style="display: none;" autocomplete="off" name="s" type="text" placeholder="Type and hit enter..." aria-label="Recipient's username" aria-describedby="basic-addon2"></div>
    <div class="input-group-append"><button class="sarch-btn" type="button"><span class="fa fa-search" title="Search"><span style="display: none;">.</span></span> </button></div>
  </div>
</form>

https://mcafee.com/blogs/

<form class="form-inline my-2 my-lg-0" action="https://mcafee.com/blogs/">
  <div class="input-group mb-3 search-div">
    <div class="input-group-append"><button class="sarch-btn" type="button"><span class="fa fa-search" title="Search"><span style="display: none;">.</span></span> </button></div>
  </div>
</form>

/blogs/

<form class="desktop-search-form" style="display: none;" action="/blogs/">
  <div class="desktop-search-div"><input class="dsk-search" autocomplete="off" name="s" type="text" placeholder="Type and hit enter..."></div>
  <div><span class="close_icon_desktop"> <img src="/wp-content/themes/securingtomorrow-brillio/img/new-icons/cross-grey-icon.svg" alt="close grey icon"> </span></div>
</form>

https://mcafee-uat.mcafee.com/blogs/

<form class="form-inline my-2 my-lg-0" action="https://mcafee-uat.mcafee.com/blogs/">
  <div class="input-group mb-3 search-div">
    <div class="input-group-append"><button class="sarch-btn" type="button"><span class="fa fa-search" title="Type and hit enter..." autocomplete="off"><span style="display: none;">.</span></span> </button>
    </div>
  </div>
</form>

/blogs/

<form action="/blogs/" class="desktop-search-form" style="display: none;">
  <div class="desktop-search-div">
    <input class="dsk-search" name="s" type="text" placeholder="Type and hit enter..." autocomplete="off">
  </div>
  <div><span class="close_icon_desktop">
      <img src="/wp-content/themes/securingtomorrow-brillio/img/new-icons/cross-grey-icon.svg" alt="close grey icon">
    </span>
  </div>
</form>

Text Content

.

.


 * Total Protection (current)
 * Antivirus
 * Identity
 * About
   
   .About
   
   Our Company
   
   
   
   Awards and Reviews About Us Executive TeamNewsroom
   
   
   
   Our Efforts
   
   
   
   Inclusion & Diversity Integrity & Ethics Public Policy McAfee Labs Threat
   Center
   
   
   
   Join Us
   
   
   
   Search Job OpeningsLife at McAfeeOur TeamsOur Locations

 * Support
   
   .Support
   
   Help
   
   
   
   Consumer SupportCommunityActivate your Retail Card
   
   
   
   Learn more about Security
   
   
   
   Free Antivirus TrialMalwareFirewall Safe BrowserVPN for PhonesParental
   Controls
   
   
   
   More Resources
   
   
   
   2020 Mobile Threat Report Press Pause on Risky Downloads Most Dangerous
   Celebrity Searches Supporting You and Your Community Hackable? Podcast Safety
   Tips

 * Investors
 * Enterprise

 * Blog
 * Login
 * More
   × My Account Activate your retail card Safe Browser Gaming Antivirus
   TechMaster Concierge Identity Protection Service Free Downloads
 * More
   
   .More
   
   My Account Activate your retail card Safe Browser Gaming Antivirus TechMaster
   Concierge Identity Protection Service Free Downloads

 * .
 * Topics
   Internet Security Mobile Security Family Safety Privacy & Identity Protection
   Security News Tips & Tricks
 * At McAfee
   McAfee News Executive Perspectives McAfee Labs Life at McAfeeHackable?
   Podcast

.
English
Simplified ChineseItalia日本語EspañolFrançaisGermanPortuguêsAll Language Blogs

   
 * Blog
 * Topics
   Internet Security Mobile Security Family Safety Privacy & Identity Protection
   Security News Tips & Tricks
   
 * At McAfee
   McAfee NewsExecutive Perspectives McAfee Labs Life at McAfeeHackable? Podcast

 * .
 * Simplified Chinese Italia 日本語 Español Français German Português All Language
   Blogs



Blog Privacy & Identity Protection How to Spot Fake Login Pages 


HOW TO SPOT FAKE LOGIN PAGES 



Jean Treadwell

Aug 26, 2021

6 MIN READ

Have you ever come across a website that just didn’t look quite right? Perhaps
the company logo looked slightly misshapen, or the font seemed off-brand. Odds
are, you landed on a phony version of a legitimate corporation’s
website—a tried and true tactic relied on by many cybercriminals.  


FAKE LOGIN PAGES EXPLAINED  

A fake login page is essentially a knock-off of a real login page used to trick
people into entering their login credentials, which hackers can later use to
break into online accounts. These websites mirror legitimate pages by using
company logos, fonts, formatting, and overall templates. Depending on the
attention to detail put in by the hackers behind the imposter website, it can be
nearly impossible to distinguish from the real thing. Consequentially, fake
login pages can be highly effective in their end goal: credential theft.  

How do these pages get in front of a consumer in the first place? Typically,
scammers will target unsuspecting recipients with phishing emails spoofing a
trusted brand. These emails may state that the user needs to reset their
password or entice them with a deal that sounds too good to be true. If the
consumer clicks on the link in the email, they will be directed to the fake
login page and asked to enter their username and password. Once they submit
their information, cybercriminals can use the consumer’s data to conduct
credential stuffing attacks and hack their online profiles. This could lead
to credit card fraud, data extraction, wire transfers, identity theft, and
more. 


HOW FAKE LOGIN PAGES ARE AFFECTING CANADIANS 

Scammers have recently targeted Canadians with attacks leveraging fake login
pages to harvest personal data. For example, criminals preyed on employees
who were expecting COVID-19 relief grants in the form of the CERB (Canada
Emergency Response Benefit). These funds were sent via an electronic transfer
from Interac, a legitimate Canadian interbank network. However, a phishing
campaign spoofing Interac’s e-transfer service circulated emails claiming that
the Canada Revenue Agency (CRA) made a CERB deposit of $1,957.50 CAD.  

These emails directed recipients to a fake CRA login page, which then redirected
to a phony Interac e-transfer site where users were asked to select their
personal bank. From there, the recipient was asked to enter their username, card
number, password, security questions and answers for their online
banking profile, and other personally identifiable information—providing all the
information a criminal would need to hack into the user’s bank account.  


WHY FAKE LOGIN PAGES ARE EFFECTIVE  

If you Google “fake login pages,” you will quickly find countless guides on how
to create fake websites in seconds. Ethical concerns aside, this demonstrates
just how common vector spoofed websites are for cyberattacks. While it has been
easier to distinguish between real and fake login pages in the past, criminals
are constantly updating their techniques to be more sophisticated, therefore
making it more difficult for consumers to recognize their fraudulent schemes.  

One reason why fake login pages are so effective is due to inattentional
blindness, or failure to notice something that is completely visible because of
a lack of attention. One of the most famous studies on inattentional blindness
is the “invisible gorilla test.” In this study, participants watched a video of
people dressed in black and white shirts passing basketballs. Participants were
asked to count the number of times the team in white passed the ball: 



Because participants were intently focused on counting the number of times the
players in white passed the ball, more than 50% failed to notice the person in
the gorilla costume walking through the game. If this is the first time you’ve
seen this video, it’s likely that you didn’t notice the gorilla, the curtain
changing color from red to gold, or the player in black leaving the
game. Similarly, if you come across a well-forged login page and aren’t actively
looking for signs of fraud, you could inherently miss a cybercriminal’s
“invisible gorilla.” That’s why it’s crucial for even those with phishing
training to practice caution when they come across a website asking them to take
action or enter personal details.  


HOW TO STEER CLEAR OF FAKE LOGIN PAGES  

The most important defense against steering clear of fake login pages is knowing
how to recognize them. Follow these tips to help you decipher between a
legitimate and a fake website:  

1. DON’T FALL FOR PHISHING  

Most fake login pages are circulated vis phishing messages. If you receive a
suspicious message that asks for personal details, there are a few ways to
determine if it was sent by a phisher aiming to steal your identity. Phishers
often send messages with a tone of urgency, and they try to inspire extreme
emotions such as excitement or fear. If an unsolicited email urges you to “act
fast!” slow down and evaluate the situation. 

2. LOOK FOR MISSPELLINGS OR GRAMMATICAL ERRORS  

Oftentimes, hackers will use a URL for their spoofed website that is just one
character off from the legitimate site, such as using “www.rbcr0yalbank.com”
versus “www.rbcroyalbank.com.” Before clicking on any website from an email
asking you to act, hover over the link with your cursor. This will allow you to
preview the URL and identify any suspicious misspellings or grammatical errors
before navigating to a potentially dangerous website. 

3. ENSURE THE WEBSITE IS SECURED WITH HTTPS 

HTTPS, or Hypertext Transfer Protocol Secure, is a protocol that encrypts your
interaction with a website. Typically, websites that begin with HTTPS and
feature a padlock in the top left corner are considered safer. However,
cybercriminals have more recently developed malware toolkits
that leverage HTTPS to hide malware from detection by various security defenses.
If the website is secured with HTTPS, ensure that this isn’t the only way you’re
analyzing the page for online safety.  

4. ENABLE MULTI-FACTOR AUTHENTICATION  

Multi-factor authentication requires that users confirm a collection of things
to verify their identity—usually something they have, and a factor unique to
their physical being—such as a retina or fingerprint scan. This can prevent a
cybercriminal from using credential-stuffing tactics (where they will use email
and password combinations to hack into online profiles) to access your network
or account if your login details were ever exposed during a data breach.  

5. SIGN UP FOR AN IDENTITY THEFT ALERT SERVICE 

An identity theft alert service warns you about suspicious activity surrounding
your personal information, allowing you to jump to action before irreparable
damage is done. McAfee Total Protection not only keeps your devices safe from
viruses but gives you the added peace of mind that your identity is secure, as
well.  




Stay Updated

Follow us to stay updated on all things McAfee and on top of the latest consumer
and mobile security threats.


Jean Treadwell Sr. Director of Business & Marketing Operations and Ontario Site
Leader

Jean Treadwell has held strategic, intelligence, finance and operational
leadership roles. She has been in technology for over twenty years because of
its societal relevance, and is passionate about the...


MORE FROMPRIVACY & IDENTITY PROTECTION

Previous

HOW TO MAKE TELEHEALTH SAFER FOR A MORE CONVENIENT LIFE ONLINE

Adoption of Telehealth services saw a significant rise during the pandemic.
Breaches targeting health data rose in...

Jul 10, 2021   |   3 MIN READ

IDENTITY PROTECTION SERVICE: THE BEST SOLUTION TO A GROWING PROBLEM

A look at how to keep your information secure online using the latest tips and a
new...

Jul 05, 2021   |   6 MIN READ

3 CANADIAN REAL ESTATE SCAMS YOU SHOULD KNOW ABOUT

Scammers and identity thieves are taking advantage of unsuspecting homeowners.
In some cases, thieves are selling homes...

Jun 29, 2021   |   5 MIN READ

5 RANSOMWARE THREATS CANADIANS NEED TO KNOW

More online users around the world are affected by ransomware due to
ever-increasing online activity and the...

Jun 28, 2021   |   7 MIN READ

HOW FRAUDSTERS ARE FOOLING USERS WITH THIS PROOF OF VACCINATION PHISHING SCAM

According to the Washington Post, pandemic-related email scams are on the rise,
especially with the delta variant surging....

Sep 03, 2021   |   4 MIN READ

T-MOBILE’S DATA BREACH EXPOSES THE PERSONAL DATA OF 40 MILLION

T-Mobile, the popular US mobile phone service provider, recently confirmed a
data breach affecting 7.8 million current customers and 40 million records from
past...

Aug 20, 2021   |   3 MIN READ

CHIPOTLE’S MARKETING ACCOUNT HACKED: PROTECT YOURSELF FROM PHISHING LURES

According to Bleeping Computer, Chipotle’s email vendor Mailgun was recently
breached, which allowed hackers to take over...

Aug 12, 2021   |   4 MIN READ

7 SAVVY WAYS SENIOR ADULTS CAN SAFEGUARD DIGITAL PRIVACY

As a senior adult in a hyper-connected world, keeping your privacy safeguarded
isn’t easy but it is...

Aug 09, 2021   |   4 MIN READ

3 TIPS TO PROTECT YOURSELF FROM XLOADER MALWARE

Originally written to infect Windows devices, XLoader is a widespread and
inexpensive form of malware that cybercriminals are rewriting...

Aug 03, 2021   |   3 MIN READ

WHAT IS A VPN AND CAN IT HIDE MY IP ADDRESS?

There's a lot of misinformation about Virtual Private Networks, what they do,
and the security benefits they...

Jul 27, 2021   |   6 MIN READ

HOW TO SECURE YOUR SMART HOME: A STEP-BY-STEP GUIDE

This article will take readers on a tour of a modern-day smart home, detailing
common devices that could potentially be...

Jul 22, 2021   |   9 MIN READ

GUIDE: PROTECTING YOUR DIGITAL IDENTITY

Protecting yourself from hackers and fraud means protecting your digital
identity. And that can feel like a...

Jul 15, 2021   |   7 MIN READ

HOW TO MAKE TELEHEALTH SAFER FOR A MORE CONVENIENT LIFE ONLINE

Adoption of Telehealth services saw a significant rise during the pandemic.
Breaches targeting health data rose in...

Jul 10, 2021   |   3 MIN READ

IDENTITY PROTECTION SERVICE: THE BEST SOLUTION TO A GROWING PROBLEM

A look at how to keep your information secure online using the latest tips and a
new...

Jul 05, 2021   |   6 MIN READ

3 CANADIAN REAL ESTATE SCAMS YOU SHOULD KNOW ABOUT

Scammers and identity thieves are taking advantage of unsuspecting homeowners.
In some cases, thieves are selling homes...

Jun 29, 2021   |   5 MIN READ

5 RANSOMWARE THREATS CANADIANS NEED TO KNOW

More online users around the world are affected by ransomware due to
ever-increasing online activity and the...

Jun 28, 2021   |   7 MIN READ

HOW FRAUDSTERS ARE FOOLING USERS WITH THIS PROOF OF VACCINATION PHISHING SCAM

According to the Washington Post, pandemic-related email scams are on the rise,
especially with the delta variant surging....

Sep 03, 2021   |   4 MIN READ

T-MOBILE’S DATA BREACH EXPOSES THE PERSONAL DATA OF 40 MILLION

T-Mobile, the popular US mobile phone service provider, recently confirmed a
data breach affecting 7.8 million current customers and 40 million records from
past...

Aug 20, 2021   |   3 MIN READ

CHIPOTLE’S MARKETING ACCOUNT HACKED: PROTECT YOURSELF FROM PHISHING LURES

According to Bleeping Computer, Chipotle’s email vendor Mailgun was recently
breached, which allowed hackers to take over...

Aug 12, 2021   |   4 MIN READ

7 SAVVY WAYS SENIOR ADULTS CAN SAFEGUARD DIGITAL PRIVACY

As a senior adult in a hyper-connected world, keeping your privacy safeguarded
isn’t easy but it is...

Aug 09, 2021   |   4 MIN READ

3 TIPS TO PROTECT YOURSELF FROM XLOADER MALWARE

Originally written to infect Windows devices, XLoader is a widespread and
inexpensive form of malware that cybercriminals are rewriting...

Aug 03, 2021   |   3 MIN READ

WHAT IS A VPN AND CAN IT HIDE MY IP ADDRESS?

There's a lot of misinformation about Virtual Private Networks, what they do,
and the security benefits they...

Jul 27, 2021   |   6 MIN READ

HOW TO SECURE YOUR SMART HOME: A STEP-BY-STEP GUIDE

This article will take readers on a tour of a modern-day smart home, detailing
common devices that could potentially be...

Jul 22, 2021   |   9 MIN READ

GUIDE: PROTECTING YOUR DIGITAL IDENTITY

Protecting yourself from hackers and fraud means protecting your digital
identity. And that can feel like a...

Jul 15, 2021   |   7 MIN READ

HOW TO MAKE TELEHEALTH SAFER FOR A MORE CONVENIENT LIFE ONLINE

Adoption of Telehealth services saw a significant rise during the pandemic.
Breaches targeting health data rose in...

Jul 10, 2021   |   3 MIN READ

IDENTITY PROTECTION SERVICE: THE BEST SOLUTION TO A GROWING PROBLEM

A look at how to keep your information secure online using the latest tips and a
new...

Jul 05, 2021   |   6 MIN READ

3 CANADIAN REAL ESTATE SCAMS YOU SHOULD KNOW ABOUT

Scammers and identity thieves are taking advantage of unsuspecting homeowners.
In some cases, thieves are selling homes...

Jun 29, 2021   |   5 MIN READ

5 RANSOMWARE THREATS CANADIANS NEED TO KNOW

More online users around the world are affected by ransomware due to
ever-increasing online activity and the...

Jun 28, 2021   |   7 MIN READ

Next
 * 1
 * 2
 * 3

Back to top

 *  
 *  
 *  
 *  
 *  

Corporate Headquarters
6220 America Center Drive
San Jose, CA 95002 USA

PRODUCTS

McAfee® Total Protection

McAfee® Gamer Security

McAfee® Identity Protection Service

McAfee® Security Scan Plus

McAfee® WebAdvisor

McAfee® Techmaster Concierge

McAfee® Virus Removal Service

RESOURCES

Antivirus

Parental Controls

Malware

Firewall

Blogs

Activate Retail Card

Threat Center

McAfee Enterprise

SUPPORT

Consumer Support

FAQs

Renewals

ABOUT

About McAfee

Careers

Contact Us

Newsroom

Investors

Privacy & Legal Terms

System Requirements

Sitemap

United States / English

Copyright © 2021 McAfee, LLC


United States / English


Copyright © 2021 McAfee, LLC


✓
Thanks for sharing!
AddToAny
More…