Friday, March 28, 2025
Homecyber securityPocket Card Users Targeted in Sophisticated Phishing Campaign

Pocket Card Users Targeted in Sophisticated Phishing Campaign

Published on

SIEM as a Service

Follow Us on Google News

A new phishing campaign targeting Japanese Pocket Card users has been uncovered by Symantec.

The attackers are employing sophisticated tactics to deceive cardholders into divulging their login credentials, potentially compromising their financial accounts.

Japanese Cardholders at Risk of Credential Theft

The phishing operation begins with fraudulent emails masquerading as official notifications from Pocket Card’s online service.

These emails bear the subject line “レジットカードのポケットカード会員専用ネットサービスからのお知ら” (translated as “Notice from the online service for Credit Card Pocket Card members”), lending an air of legitimacy to the communication.

Exploiting Familiar Security Measures

In a cunning move, the scammers have co-opted the “Identity Authentication Service (3D Secure)” process, a widely recognized additional authentication step used to enhance account security.

By mimicking this familiar procedure, the attackers increase the likelihood that unsuspecting users will trust the fraudulent communication and follow through with the requested actions.

The core of the attack lies in a malicious link embedded within the email. When clicked, this link redirects the victim to a meticulously crafted fake Pocket Card login page.

This counterfeit site is designed with the sole purpose of harvesting user credentials.

Once a user unwittingly enters their login information, the attackers gain unfettered access to the victim’s Pocket Card account, potentially leading to financial losses and identity theft.

Symantec has responded swiftly to this threat, implementing multi-layered protection for its customers.

On the email front, the company’s email security products now include coverage for this specific phishing campaign.

Additionally, Symantec’s Email Threat Isolation (ETI) technology provides an extra barrier of defense against these malicious emails.

For web-based threats, Symantec has updated its WebPulse-enabled products to categorize the observed malicious domains and IP addresses under appropriate security categories.

This proactive approach helps prevent users from accessing the fraudulent websites, even if they inadvertently click on the phishing links.

As phishing tactics continue to evolve, this campaign serves as a stark reminder of the importance of vigilance when dealing with unexpected emails, even those that appear to come from trusted sources.

Users are advised to verify the authenticity of such communications through official channels and to refrain from clicking on suspicious links or providing sensitive information via email.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup – Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

SquareX Discloses Browser-Native Ransomware that Puts Millions at Risk

From WannaCry to the MGM Resorts Hack, ransomware remains one of the most damaging...

Hackers Exploit DNS MX Records to Create Fake Logins Imitating 100+ Brands

Cybersecurity researchers have discovered a sophisticated phishing-as-a-service (PhaaS) platform, dubbed "Morphing Meerkat," that leverages...

New Python-Based Discord RAT Targets Users to Steal Login Credentials

A recently identified Remote Access Trojan (RAT) has raised alarms within the cybersecurity community...

PJobRAT Android Malware Masquerades as Dating and Messaging Apps to Target Military Personnel

PJobRAT, an Android Remote Access Trojan (RAT) first identified in 2019, has resurfaced in...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Hackers Exploit DNS MX Records to Create Fake Logins Imitating 100+ Brands

Cybersecurity researchers have discovered a sophisticated phishing-as-a-service (PhaaS) platform, dubbed "Morphing Meerkat," that leverages...

New Python-Based Discord RAT Targets Users to Steal Login Credentials

A recently identified Remote Access Trojan (RAT) has raised alarms within the cybersecurity community...

PJobRAT Android Malware Masquerades as Dating and Messaging Apps to Target Military Personnel

PJobRAT, an Android Remote Access Trojan (RAT) first identified in 2019, has resurfaced in...