Cyber Security News

Pocket Card Users Targeted in Sophisticated Phishing Campaign

A new phishing campaign targeting Japanese Pocket Card users has been uncovered by Symantec.

The attackers are employing sophisticated tactics to deceive cardholders into divulging their login credentials, potentially compromising their financial accounts.

Japanese Cardholders at Risk of Credential Theft

The phishing operation begins with fraudulent emails masquerading as official notifications from Pocket Card’s online service.

These emails bear the subject line “レジットカードのポケットカード会員専用ネットサービスからのお知ら” (translated as “Notice from the online service for Credit Card Pocket Card members”), lending an air of legitimacy to the communication.

Exploiting Familiar Security Measures

In a cunning move, the scammers have co-opted the “Identity Authentication Service (3D Secure)” process, a widely recognized additional authentication step used to enhance account security.

By mimicking this familiar procedure, the attackers increase the likelihood that unsuspecting users will trust the fraudulent communication and follow through with the requested actions.

The core of the attack lies in a malicious link embedded within the email. When clicked, this link redirects the victim to a meticulously crafted fake Pocket Card login page.

This counterfeit site is designed with the sole purpose of harvesting user credentials.

Once a user unwittingly enters their login information, the attackers gain unfettered access to the victim’s Pocket Card account, potentially leading to financial losses and identity theft.

Symantec has responded swiftly to this threat, implementing multi-layered protection for its customers.

On the email front, the company’s email security products now include coverage for this specific phishing campaign.

Additionally, Symantec’s Email Threat Isolation (ETI) technology provides an extra barrier of defense against these malicious emails.

For web-based threats, Symantec has updated its WebPulse-enabled products to categorize the observed malicious domains and IP addresses under appropriate security categories.

This proactive approach helps prevent users from accessing the fraudulent websites, even if they inadvertently click on the phishing links.

As phishing tactics continue to evolve, this campaign serves as a stark reminder of the importance of vigilance when dealing with unexpected emails, even those that appear to come from trusted sources.

Users are advised to verify the authenticity of such communications through official channels and to refrain from clicking on suspicious links or providing sensitive information via email.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup – Try for Free

Aman Mishra

Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Recent Posts

Microsoft Patch Tuesday May 2025 Released With the Fixes for 72 Flaws With 5 Actively Exploited 0-Day

Microsoft has released its May 2025 Patch Tuesday updates, addressing 72 security vulnerabilities across its…

22 minutes ago

Ivanti Released Security Updates to Fix for the Mutiple RCE Vulnerabilities – Patch Now

Ivanti, a leading enterprise software provider, has released critical security updates addressing vulnerabilities across several…

2 hours ago

Fortinet FortiVoice Zero-day Vulnerability Actively Exploited in The Wild

A critical stack-based buffer overflow vulnerability (CWE-121) has been discovered in multiple Fortinet products, including…

2 hours ago

Ransomware Attacks Surge by 123% Amid Evolving Tactics and Strategies

The 2025 Third-Party Breach Report from Black Kite highlights a staggering 123% surge in ransomware…

3 hours ago

Researchers Introduce Mythic Framework Agent to Enhance Pentesting Tool Performance

Penetration testing is still essential for upholding strong security procedures in a time when cybersecurity…

3 hours ago

Swan Vector APT Targets Organizations with Malicious LNK and DLL Implants

A newly identified advanced persistent threat (APT) campaign, dubbed "Swan Vector" by Seqrite Labs, has…

3 hours ago