Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Enterprise ServicesSecurity & Business ResilienceBanking/Finance/Insurance

Fake login pages are spoofing the world's largest brands – Where does it end?

By Ian Baxter
the world's largest brands continue to deal with website spoofing
November 12, 2020

If you Google “fake login pages” you’re immediately met with a myriad of how-to guides such as “Fake any website in seconds.” Privacy and ethical concerns aside, this is demonstrative of the ubiquity and proliferation of phishing websites, also known as spoofed websites, and their commonality as a vector for cyberattacks.

These pages almost mirror legitimate websites down to the T, with logos, formatting and overall templates all ranging from difficult to impossible to distinguish from the real thing. That also translates into them being highly effective in their end goal: credential theft.

The key here is how these pages get in front of someone in the first place. Most commonly, the operation entails targeting unsuspecting recipients with phishing emails spoofing a trusted brand and persuading them to insert their legitimate credentials, such as a username and password.  

Then, once the target enters his or her credentials, attackers have the information they need to log in to a real account and commence with illegal activity, such as credit card fraud, data extraction, wire transfers, identity theft and more.

To better understand the scope of this phenomenon, it’s important for security professionals and organizations to know just how widespread the problem is.

Fake Login Pages Prey on Gaps in Email Security

While fake login pages aren’t new, they are increasingly successful for two main reasons. First, messages containing fake logins can now regularly bypass technical controls, such as secure email gateways (SEGs) and SPAM filters, without much time, money or resources invested by the adversary. This occurs because both the message and the sender are able to pass various authentication protocols and gateway controls that look for malicious payloads or known signatures that are frequently absent from these types of messages.

The second reason can be explained by the psychological phenomenon known as inattentional blindness, which occurs when an individual fails to perceive an unexpected change in plain sight. Inattentional blindness became an internet sensation in 2012 when a video posted asking viewers how many white shirted players passed a ball. Intently focused on the task at hand, more than 50% of the viewers failed to recognize a woman in a gorilla suit in the middle of the picture. Even people with phishing awareness training are susceptible to inattentional blindness.

All of this is topped off by the proliferation and success of phishing in recent years. According to the 2020 Verizon Data Breach Investigations Report, about 65% of all breaches now result from hacking and/or email phishing attacks.

Fake Login Pages Spoof the World’s Biggest Brands

To further underscore the severity of today’s hacking and phishing challenges, researchers at IRONSCALES spent the first six months of 2020 identifying and analyzing fake login pages. Here’s a summary of what was found:

  • More than 50,000 fake login pages were identified
  • More than 200 of the world’s most prominent brands were spoofed with fake login pages
  • Nearly 5% (2,500) of the 50,000 fake login pages were polymorphic, with one brand garnering more than 300 permutations
  • The most common recipients of fake login page emails work in the financial services, healthcare and technology industries as well as at government agencies
  • The top 5 brands with the most fake login pages closely mirrors the list of brands that frequently have the most active phishing websites

The top five brands include PayPal, Microsoft, Facebook, eBay and Amazon. And although PayPal sits atop the list, the greatest risk may derive from the 9,500 Microsoft spoofs, as malicious Office 365, SharePoint and One Drive login pages put not just people but entire businesses a risk.

Additionally, Adobe, Aetna, Alibaba, American Airlines, Apple, AT&T, Bank of America, British Telecom, Delta Air Lines, DocuSign, Coinbase, GoDaddy, Instagram, JP Morgan Chase, LinkedIn, Netflix, Stripe, Squarespace, Tesco, Visa and Wells Fargo were also ranked among the top brands with spoofed login pages in 2020.

Attackers Using Polymorphism in Fake Login Pages

Another common wrinkle in fake login pages is the sophistication in how they are created and deployed.

In 2019, 42% of all phishing attacks were reported as polymorphic. Polymorphism occurs when an attacker implements slight but significant and often random change to an emails’ artifacts, such as its content, copy, subject line, sender name or template in conjunction with or after an initial attack has deployed. This strategic approach enables attackers to quickly develop phishing attacks that trick signature-based email security tools that were not built to recognize such modifications to threats; ultimately allowing different versions of the same attack to land undetected in employee inboxes.

In total, IRONSCALES discovered that nearly 5% of what 50,000 fake login pages identified were polymorphic, with Microsoft and Facebook leading the list with 314 and 160 permutations respectively.

Why do certain brands see more permutations than others? For one, the security teams associated with these brands are actively looking to take down fake login pages, so attackers are forced to more frequently evolve the attack ever so slightly so to defeat human and technical controls. Additionally, these brands are a priority and or easy target for a certain hacking group(s), so there is more activity and therefore a need to constantly evolve in order to stay one step ahead of security teams.

How  Can You Stop Fake Login URLs from Reaching Your Employees’ Inboxes?

Traditional SEGs focus on what is in the email, whether a malicious link or attachment, and they generally do a decent job at preventing those types of emails from getting through to intended victims. Because these defenses are generally stalwart, hackers have had to adapt and change their tactics – after all, these folks aren’t the stereotypical “14-year-old kid sitting in the basement,” but rather organized groups that launch sophisticated, targeted attacks, and make a considerable profit while doing so.

To bypass SEGs, hackers have turned to social engineering attacks, which often contain no malicious content that these security systems are built to detect. Instead, these emails are designed to look like they come from someone or something (like a brand) that you know.

Other common variations of these attacks impersonate someone else the recipient knows – a colleague, boss, friend or family member. There are four common variations of these requests: employee availability checks, requests for an unspecific task, requests to purchase a gift card and financial requests, such as to change direct deposit location, bank details or request for payment.

This all comes at a time of a rise in COVID-related phishing attacks. To protect employees, a new technology is emerging to prevent these attacks – Natural Language Processing (NLP) which can diagnose an email just like a drive-through COVID-19 test. It works like this: an email is sent and gets through the first stage of security because it has no link and no malicious content. But NLP will analyze the actual language of the email to look for suspicious patterns like the aforementioned availability checks or financial requests. Companies that rely on traditional indications of compromise (IOC), such as malicious links or attachments, will not identify these attacks in real-time.

Computer vision and AI also play a role in detecting visual anomalies based on learned and trusted profiles (legitimate login pages/websites). While there are some indicators of compromise with fake login pages, such as blurred images, retro branding and a suspicious sense of urgency, many are unidentifiable using legacy anti-phishing technology or the naked eye. Further, NLP uses advanced machine learning and neural networks to identify the ‘what’ is being sent by analyzing fraudulent language.

Fake login pages spread by social engineering tactics have truly become a major risk for brands, as evident by both the frequency at which attackers are relying on them and the success that they are having coopting credentials. While new technology is beginning to help defenders mitigate threats, there is a long way to go before the most commonly deployed email security and anti-phishing tools make fake login page identification ubiquitous. In the meantime, the burden to minimize the risk that fake login pages present falls on brands’ ability to monitor spoofing attempts and organizations capacity to train users to identify suspicious messages that are absent of traditional markers.

KEYWORDS: cyber security enterprise cyber security enterprise data spoofing attacks

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Ian Baxter is Vice President of pre-sales engineering at Ironscales.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Water faucet and cup

High Water Mark: CISA Shares Foundations for Effective Cybersecurity and Risk Management

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Rendered computer with keyboard

    16B Login Credentials Exposed in World’s Largest Data Breach

    See More
  • What are the World's Most Valuable Brands?

    See More
  • Allied officially able to complete G4S acquisition

    G4S acquisition comes to an end; Allied now 7th largest employer in world

    See More

Related Products

See More Products
  • Risk Analysis and the Security Survey, 4th Edition

  • 150952519X.jpg

    Intelligence in An Insecure World, 3rd Edition

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing