Friday, May 9, 2025
Homecyber securityPocket Card Users Targeted in Sophisticated Phishing Campaign

Pocket Card Users Targeted in Sophisticated Phishing Campaign

Published on

SIEM as a Service

Follow Us on Google News

A new phishing campaign targeting Japanese Pocket Card users has been uncovered by Symantec.

The attackers are employing sophisticated tactics to deceive cardholders into divulging their login credentials, potentially compromising their financial accounts.

Japanese Cardholders at Risk of Credential Theft

The phishing operation begins with fraudulent emails masquerading as official notifications from Pocket Card’s online service.

- Advertisement - Google News

These emails bear the subject line “レジットカードのポケットカード会員専用ネットサービスからのお知ら” (translated as “Notice from the online service for Credit Card Pocket Card members”), lending an air of legitimacy to the communication.

Exploiting Familiar Security Measures

In a cunning move, the scammers have co-opted the “Identity Authentication Service (3D Secure)” process, a widely recognized additional authentication step used to enhance account security.

By mimicking this familiar procedure, the attackers increase the likelihood that unsuspecting users will trust the fraudulent communication and follow through with the requested actions.

The core of the attack lies in a malicious link embedded within the email. When clicked, this link redirects the victim to a meticulously crafted fake Pocket Card login page.

This counterfeit site is designed with the sole purpose of harvesting user credentials.

Once a user unwittingly enters their login information, the attackers gain unfettered access to the victim’s Pocket Card account, potentially leading to financial losses and identity theft.

Symantec has responded swiftly to this threat, implementing multi-layered protection for its customers.

On the email front, the company’s email security products now include coverage for this specific phishing campaign.

Additionally, Symantec’s Email Threat Isolation (ETI) technology provides an extra barrier of defense against these malicious emails.

For web-based threats, Symantec has updated its WebPulse-enabled products to categorize the observed malicious domains and IP addresses under appropriate security categories.

This proactive approach helps prevent users from accessing the fraudulent websites, even if they inadvertently click on the phishing links.

As phishing tactics continue to evolve, this campaign serves as a stark reminder of the importance of vigilance when dealing with unexpected emails, even those that appear to come from trusted sources.

Users are advised to verify the authenticity of such communications through official channels and to refrain from clicking on suspicious links or providing sensitive information via email.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup – Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Critical Vulnerability in Ubiquiti UniFi Protect Camera Allows Remote Code Execution by Attackers

Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score...

IXON VPN Client Vulnerability Allows Privilege Escalation for Attackers

A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux,...

Cisco IOS Software SISF Vulnerability Could Enable Attackers to Launch DoS Attacks

Cisco has released security updates addressing a critical vulnerability in the Switch Integrated Security...

Seamless AI Communication: Microsoft Azure Adopts Google’s A2A Protocol

Microsoft has announced its support for the Agent2Agent (A2A) protocol, an open standard developed...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Critical Vulnerability in Ubiquiti UniFi Protect Camera Allows Remote Code Execution by Attackers

Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score...

IXON VPN Client Vulnerability Allows Privilege Escalation for Attackers

A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux,...

Cisco IOS Software SISF Vulnerability Could Enable Attackers to Launch DoS Attacks

Cisco has released security updates addressing a critical vulnerability in the Switch Integrated Security...