Article Details
Scrape Timestamp (UTC): 2025-12-10 14:59:04.776
Original Article Text
Click to Toggle View
New Spiderman phishing service targets dozens of European banks. A new phishing kit called Spiderman is targeting customers of numerous European banks and cryptocurrency services using pixel-perfect replicas of legitimate sites. The platform allows cybercriminals to launch phishing campaigns that can capture login credentials, two-factor authentication (2FA) codes, and credit card data. The Spiderman phishing kit, analyzed by researchers at Varonis, targets financial institutions in five countries, including major brands such as Deutsche Bank, ING, Comdirect, Blau, O2, CaixaBank, Volksbank, and Commerzbank. The researchers observed that it can create phishing pages for online portals of fintech companies, such as the Swedish service Klarna and PayPal. It can also steal seed phrases for Ledger, Metamask, and Exodus cryptocurrency wallets. “Because Spiderman is modular, new banks, portals, and authentication methods can be added. As European countries roll out updated e-banking flows, this kit will likely evolve in parallel,” Varonis says in its report. The researchers found that Spiderman is popular among cybercriminals, with one of its groups on Signal counting 750 members. From the dashboard, operators can view victim sessions in real time, capture credentials, perform one-click data export, intercept PhotoTAN/one-time pass (OTP) codes in real time, and harvest credit card details. PhotoTAN is an OTP system used by many banks in Europe, where a colored mosaic image is displayed during login or transaction approval steps, which the user must scan with the bank’s app to proceed. The app decodes the mosaic and displays a transaction-specific OTP that must be entered back into the banking site. Although PhotoTAN capture isn’t a novel feature in phishing kits, it is considered a “must-have” for platforms targeting European institutions. Spiderman operators can configure their targeting scope from the control panel, limiting it to specific countries, adding ISP allowlisting, device-type filters (mobile or desktop users), and setting up redirects for visitors that don’t qualify for phishing attacks. Varonis researchers warn that the data captured by Spiderman can lead to banking account takeover, SIM swapping, credit card fraud, and identity theft. All phishing kits rely on victims clicking on a link that takes them to a fake login page, so the best protection is to always confirm you’re on the official domain before entering your credentials, and double-checking for browser-in-the-browser windows that could display the correct URL. Receiving an SMS or PhotoTAN prompt on your device that is not linked to an action you made is a sign of a takeover attempt and should be reported to the bank immediately. Break down IAM silos like Bitpanda, KnowBe4, and PathAI Broken IAM isn't just an IT problem - the impact ripples across your whole business. This practical guide covers why traditional IAM practices fail to keep up with modern demands, examples of what "good" IAM looks like, and a simple checklist for building a scalable strategy.
Daily Brief Summary
The Spiderman phishing kit is targeting customers of major European banks and fintech companies, including Deutsche Bank, ING, and PayPal, using highly convincing fake websites.
Cybercriminals using Spiderman can capture sensitive data such as login credentials, two-factor authentication codes, and credit card information from unsuspecting users.
This modular phishing platform allows for the addition of new targets and authentication methods, adapting alongside evolving e-banking systems in Europe.
Researchers from Varonis identified a group of 750 cybercriminals using Spiderman, with capabilities to intercept PhotoTAN and OTP codes, crucial for European banking security.
The phishing kit's dashboard offers real-time victim session monitoring and one-click data export, enabling efficient data theft and potential account takeovers.
Spiderman's operators can fine-tune their attacks by targeting specific countries, ISPs, and device types, enhancing the effectiveness of their phishing campaigns.
Users are advised to verify website authenticity before entering credentials and report any suspicious SMS or PhotoTAN prompts to their banks immediately to prevent fraud.