Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

ThreatsDay Bulletin: OpenSSL RCE, Foxit 0-Days, Copilot Leak, AI Password Flaws & 20+ Stories

February 28, 2026

Mobile app permissions (still) matter more than you may think

February 27, 2026

How AI Collapses Your Response Window

February 27, 2026
Facebook X (Twitter) Instagram
Saturday, February 28
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Multifaceted Phishing Scheme Deceives Bitpanda Customers
News

Multifaceted Phishing Scheme Deceives Bitpanda Customers

Team-CWDBy Team-CWDFebruary 25, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A sophisticated phishing campaign impersonating cryptocurrency brokerage Bitpanda has been uncovered by cybersecurity researchers.

The operation, detailed in a new advisory by the Cofense Phishing Defense Center, combines credential theft with extensive personal data harvesting, using a near-perfect replica of the legitimate platform to deceive users.

As cryptocurrency adoption increases, so does criminal interest. Analysts at Cofense said this latest campaign goes beyond typical login harvesting by guiding victims through a staged, fake multi-factor authentication (MFA) process designed to collect multiple forms of personally identifiable information.

Cofense explained the observed attack begins with an email formatted to resemble official Bitpanda communications, complete with familiar branding and layout.

The message informs recipients that updated security standards require them to reconfirm their information or risk having their accounts blocked. The warning introduces urgency. It also reflects a common scare tactic.

A “Start Update” button directs users to a fraudulent website. Although the landing page closely mirrors the genuine Bitpanda login screen and even links to the legitimate app download page via QR code, a closer inspection reveals a deceptive domain. The malicious domain had reportedly been created only days before analysis.

Read more on cryptocurrency phishing scams: Crypto Hack Losses in First Half of 2025 Exceed 2024 Total

Multi-Step Data Harvesting

Once credentials are entered, victims are pushed through additional verification screens requesting:

  • First and last name

  • Telephone number

  • Residential address

  • Date of birth

Each step is framed as part of an MFA process. The information collected could enable attackers to reset passwords, submit fraudulent support tickets or access other accounts where personal data is used for verification.

After completing the forms, users see a confirmation message stating their verification was successful before being redirected to the legitimate Bitpanda login page.

How to Defend Against Similar Attacks

“Malicious campaigns can range from broad to highly targeted. This example demonstrates the latter, with high accuracy to the real service, deceptive URL domains, and wording that makes the victim believe in a false sense of security. It not only harvested login credentials but also harvested sensitive user information,” Cofense wrote.

“Campaigns like these can be headed off with tools designed to detect and quarantine threats that slip through secure email gateways (SEGs).”

Users should hover over links to check destination URLs, confirm that sender addresses match official company domains and be cautious of messages that threaten account suspension if immediate action is not taken.

Accessing brokerage platforms directly through bookmarked or manually typed addresses, rather than embedded email links, can also reduce exposure. Even small inconsistencies in domain names or formatting may signal a fraudulent site.

Image credit: Mamun_Sheikh / Shutterstock.com



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleSmartLoader Attack Uses Trojanized Oura MCP Server to Deploy StealC Infostealer
Next Article Keenadu Firmware Backdoor Infects Android Tablets via Signed OTA Updates
Team-CWD
  • Website

Related Posts

News

ThreatsDay Bulletin: OpenSSL RCE, Foxit 0-Days, Copilot Leak, AI Password Flaws & 20+ Stories

February 28, 2026
News

How AI Collapses Your Response Window

February 27, 2026
News

UK Vulnerability Monitoring Service Cuts Unresolved Security Flaws

February 27, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Here’s what you should know

February 6, 2026

In memoriam: David Harley

November 12, 2025

What if your romantic AI chatbot can’t keep a secret?

November 18, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.