Thursday, March 27, 2025
Homecyber securityPocket Card Users Targeted in Sophisticated Phishing Campaign

Pocket Card Users Targeted in Sophisticated Phishing Campaign

Published on

SIEM as a Service

Follow Us on Google News

A new phishing campaign targeting Japanese Pocket Card users has been uncovered by Symantec.

The attackers are employing sophisticated tactics to deceive cardholders into divulging their login credentials, potentially compromising their financial accounts.

Japanese Cardholders at Risk of Credential Theft

The phishing operation begins with fraudulent emails masquerading as official notifications from Pocket Card’s online service.

These emails bear the subject line “レジットカードのポケットカード会員専用ネットサービスからのお知ら” (translated as “Notice from the online service for Credit Card Pocket Card members”), lending an air of legitimacy to the communication.

Exploiting Familiar Security Measures

In a cunning move, the scammers have co-opted the “Identity Authentication Service (3D Secure)” process, a widely recognized additional authentication step used to enhance account security.

By mimicking this familiar procedure, the attackers increase the likelihood that unsuspecting users will trust the fraudulent communication and follow through with the requested actions.

The core of the attack lies in a malicious link embedded within the email. When clicked, this link redirects the victim to a meticulously crafted fake Pocket Card login page.

This counterfeit site is designed with the sole purpose of harvesting user credentials.

Once a user unwittingly enters their login information, the attackers gain unfettered access to the victim’s Pocket Card account, potentially leading to financial losses and identity theft.

Symantec has responded swiftly to this threat, implementing multi-layered protection for its customers.

On the email front, the company’s email security products now include coverage for this specific phishing campaign.

Additionally, Symantec’s Email Threat Isolation (ETI) technology provides an extra barrier of defense against these malicious emails.

For web-based threats, Symantec has updated its WebPulse-enabled products to categorize the observed malicious domains and IP addresses under appropriate security categories.

This proactive approach helps prevent users from accessing the fraudulent websites, even if they inadvertently click on the phishing links.

As phishing tactics continue to evolve, this campaign serves as a stark reminder of the importance of vigilance when dealing with unexpected emails, even those that appear to come from trusted sources.

Users are advised to verify the authenticity of such communications through official channels and to refrain from clicking on suspicious links or providing sensitive information via email.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup – Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Blacklock Ransomware Infrastructure Breached, Revealing Planned Attacks

Resecurity, a prominent cybersecurity firm, has successfully exploited a vulnerability in the Data Leak...

Classiscam Operators Use Automated Malicious Sites to Steal Financial Data

Classiscam, an automated scam-as-a-service operation, has been identified as a significant threat in Central...

G2 Names INE 2025 Cybersecurity Training Leader

INE, a global leader in networking and cybersecurity training and certifications, is proud to...

Threat Actors Compromise 150,000 Websites to Promote Chinese Gambling Platforms

A large-scale cyberattack has compromised approximately 150,000 legitimate websites by injecting malicious JavaScript to...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Blacklock Ransomware Infrastructure Breached, Revealing Planned Attacks

Resecurity, a prominent cybersecurity firm, has successfully exploited a vulnerability in the Data Leak...

Classiscam Operators Use Automated Malicious Sites to Steal Financial Data

Classiscam, an automated scam-as-a-service operation, has been identified as a significant threat in Central...

Threat Actors Compromise 150,000 Websites to Promote Chinese Gambling Platforms

A large-scale cyberattack has compromised approximately 150,000 legitimate websites by injecting malicious JavaScript to...