Direct answer
Can journalists cite this report? Yes. Each report has a stable canonical URL, source date, methodology and citation snippet.
Executive summary
Fake platforms borrow authority from celebrities, media brands, regulators and investment language before moving victims to contact or payment routes.
What the report contains
A public-safe narrative, sanitized observations, chart-ready data cards, methodology, limits, citation metadata and a briefing request path.
Method and limits
Reports use fixed public snapshots and expert interpretation. They do not expose raw operational IOCs, victim data, secrets, or sensitive active-OSINT artifacts.
How to act on it
Public readers can cite the report, download a safe summary, request a briefing, or ask for authenticated dataset access when operational detail is required.
How PhishNet uses this
Inside PhishNet this topic is treated as operational graph context: observations are linked to sources, evidence, Belgian relevance, confirmation state, liveness, campaigns and exports. Public pages explain the method; authenticated users can pivot into the full platform workflow when a signal needs investigation or handoff.
Selected sources and research
These pages combine PhishNet platform knowledge with public research, official Belgian sources and open OSINT documentation.
Common questions
Can journalists cite this report?
Yes. Each report has a stable canonical URL, source date, methodology and citation snippet.
Is the PDF the same as the platform data?
No. Public PDFs are sanitized summaries. The platform contains operational evidence and exports for authorized users.