Security in Depth
Security in Depth
  • Home
  • About
  • Services
  • CARR
  • Incident Response
  • Events
  • Login
  • Contact Us
  • Technical
  • Learning in Depth
  • Articles and Media
  • Privacy
  • Scams
  • Careers
  • Downloads
  • DMARC
  • Cyber Research
  • Seniors
  • AI and Cyber
  • Partners
  • ISO27001
  • Incident Management
  • Bookings
  • Cyber Training
  • ThreatIntel
  • CyberAssist
  • More
    • Home
    • About
    • Services
    • CARR
    • Incident Response
    • Events
    • Login
    • Contact Us
    • Technical
    • Learning in Depth
    • Articles and Media
    • Privacy
    • Scams
    • Careers
    • Downloads
    • DMARC
    • Cyber Research
    • Seniors
    • AI and Cyber
    • Partners
    • ISO27001
    • Incident Management
    • Bookings
    • Cyber Training
    • ThreatIntel
    • CyberAssist
  • Sign In
  • Create Account

  • Bookings
  • Orders
  • My Account
  • Signed in as:

  • filler@godaddy.com


  • Bookings
  • Orders
  • My Account
  • Sign out

Signed in as:

filler@godaddy.com

  • Home
  • About
  • Services
  • CARR
  • Incident Response
  • Events
  • Login
  • Contact Us
  • Technical
  • Learning in Depth
  • Articles and Media
  • Privacy
  • Scams
  • Careers
  • Downloads
  • DMARC
  • Cyber Research
  • Seniors
  • AI and Cyber
  • Partners
  • ISO27001
  • Incident Management
  • Bookings
  • Cyber Training
  • ThreatIntel
  • CyberAssist

Account


  • Bookings
  • Orders
  • My Account
  • Sign out


  • Sign In
  • Bookings
  • Orders
  • My Account

Can you spot the Fake Login?

Test Your Skills with Our Quiz

In the digital world, where scams and phishing attempts are ever-present, being able to distinguish between legitimate login pages and fake ones is an essential skill. Think you've got a keen eye for spotting these fakes? It's time to put your abilities to the test with our interactive quiz.


We've compiled five real-life examples of fake login pages and placed them alongside their original, legitimate counterparts. These examples are pulled from actual scams and are designed to mimic the originals closely. Your challenge is to identify which is the authentic page and which is the imposter.

This quiz isn't just a test; it's a learning experience. Each example is an opportunity to sharpen your skills and learn the subtle (and sometimes not so subtle) differences that can help you stay safe online.


As you navigate through the quiz, remember that the devil is often in the details. Pay close attention to the URL, the layout of the page, the quality of images and logos, and any typos or grammatical errors in the text. These are all clues that can help you determine the authenticity of a login page.

By the end of this quiz, you'll have a better understanding of the tactics used by scammers and how to avoid falling victim to their tricks. Remember, staying safe online is about staying informed and vigilant.


So, do you think you can spot a fake? Let's find out.

Question 1. Which one is a real login portal for Bank of Melbourne?

Question 2. Which one is a real login portal for Westpac?

Question 3. Which one is a real login portal for Commonwealth Bank?

Question 4. Which one is a real login portal for Bankwest?

Question 5. Which one is a real login portal for uBank?

Question 1 answer: A

The app login interface appears to be done by fraudulent entities, evident from the consistent typo found in both the initial information field and the first query. Moreover, notable discrepancies can be  observed in the interface elements, including inaccurate color tones, fonts, font weights, and positioning when compared to the original. 

Question 2 answer: A

The  login interface of the app seems to be created by frauds, distinctly highlighting the disparities between the authentic and counterfeit versions. This includes evident inaccuracies in color schemes, fonts, font weights, and the overall arrangement of interface elements. 

Question 3 answer: A

The login interface of the app seems to be created by frauds, distinctly highlighting the disparities between the authentic and counterfeit versions. This includes evident inaccuracies such as color schemes, fonts, font weights, clickable words, inactive text fields and the overall arrangement of interface elements. 

Question 4 answer: B

The login interface of the app seems to be created by frauds, distinctly  highlighting the disparities between the authentic and counterfeit versions. This includes evident inaccuracies in color schemes, fonts, font weights, clickable words and the overall arrangement of interface elements. 

Question 5 answer: B

The login interface of the app seems to be created by frauds, distinctly highlighting the disparities between the authentic and counterfeit versions. This includes evident inaccuracies in color schemes, fonts,  font weights, copy format and the overall arrangement of interface elements. 

In Conclusion

If you punched in your details into any one of these bogus login pages, your bank details would've been sent directly to scammers. This is a relatively new malware called Octo and it's the latest offering from cybercriminals which can be privately purchased on the dark web.


Its creator is a shady figure (or figures) who call themselves the Architect or "goodluck".


The malware is powerful — it can record your calls, harvest your contacts, evade antivirus, bypass multi-factor authentication, log what you type and send you text messages. It can also perform what's known as overlay attacks, which is what happens when hackers superimpose a fake login page over an authentic app, like the ones above, to trick you into giving up your credentials.


Copyright © 2024 Security in Depth - All Rights Reserved.

  • Services
  • Shop
  • Contact Us
  • Learning in Depth
  • Articles and Media
  • Privacy
  • Virtual CISO
  • Legal
  • Scams
  • CARR -What to expect
  • bogus logins
  • Bookings
  • Data Recording Policy

Cookie Policy

This website uses cookies. By continuing to use this site, you accept our use of cookies.

DeclineAccept & Close