Research library

Phishing research with psychology, economics, kits, infrastructure and Belgian context.

A public research library for journalists, researchers, CERT teams, universities and applied cyber labs who need more than a metric sheet: deep explainers, cited sources, defensive kit intelligence and OSINT methods connected to the PhishNet graph.

Reproducible snapshots
Daily fixed public observations with citation metadata.
Source provenance
Source families, confirmation state and safety boundaries stay visible.
Graph relationships
Signals connect to brands, routes, evidence, kits and campaigns.
Research access path
Public modules lead to authenticated operational datasets.

For research institutions

PhishNet is designed for empirical phishing and fraud research: longitudinal country comparison, source-quality measurement, mule-route behavior, kit/campaign reuse, evidence readiness and public-safe observation modules derived from cached Belgian snapshots.

Advanced technical studies

Country comparison

Economics

Kit families

Kit weakness intelligence

PhishNet field observations

PhishNet field observations

Belgian brand abuse on .top, .xyz, .shop and other non-local TLDs

Why country relevance must look at brand, language, lure and evidence instead of only Belgian registry space.

PhishNet field observations

Belgian brand pressure and multilingual lure adaptation

How Dutch, French and English lure variants shape Belgian brand-targeting research.

PhishNet field observations

Evidence readiness as the bottleneck in phishing response

Why the difference between a suspicious URL and an action-ready case matters for CERTs, researchers and abuse desks.

PhishNet field observations

How public warnings and OSINT feeds reinforce each other

Why official Belgian warnings and open OSINT sources become more valuable when fused.

PhishNet field observations

Mule-route behavior in Belgian phishing

How IBANs, phones, wallets, QR payloads and payment references connect phishing pages to fraud monetization.

PhishNet field observations

Shortlink and callback-route behavior in Belgian smishing

Why SMS phishing should be studied as a route graph rather than a final-domain list.

PhishNet field observations

Source overlap as a confidence signal in phishing OSINT

How independent source families turn weak signals into stronger review candidates without hiding uncertainty.

PhishNet field observations

What 93 unique attack-kit captures reveal about phishing infrastructure

A public-safe analysis of 93 production kit-vault captures, showing what deduplicated raw evidence can teach police officers, researchers and CERT teams without publishing the kits.

PhishNet field observations

Why current-feed presence is not liveness

A research note on why feeds, screenshots and technical reachability must remain distinct.

PhishNet field observations

Why raw cyber evidence needs an observation dataset

Raw vault material becomes useful to police, researchers and insurers only when every artifact has collection time, source, method, target, provenance, policy and safe derived features attached.

Psychology

Quarterly flagship reports

Research method

Research methods

Societal and economic studies

Technical

Technical

Callback number watch and support-route spoofing

How phone routes bridge phishing, vishing and payment fraud.

Technical

Certificate Transparency as phishing early warning

How certificate issuance can reveal brand abuse before full deployment.

Technical

Common Crawl and public web OSINT for phishing

How public web archives and indexes provide context without live scanning.

Technical

Email-header clustering for phishing campaigns

How Message-ID, Return-Path, DKIM selectors and relay chains support campaign clustering.

Technical

Homoglyph, IDN and lookalike domain monitoring

How Unicode, keyboard proximity and lexical similarity affect early-warning detection.

Technical

Malware and credential theft after phishing

How phishing can lead to stealers, loaders, credential theft and session compromise.

Technical

Passive DNS, ASN and hosting reuse

How infrastructure recurrence connects campaigns across changing domains.

Technical

QR phishing and PDF evidence

How QR codes, PDFs and metadata move phishing away from visible URLs.

Technical

Sender-ID abuse and Belgian mobile trust

How sender labels, timing and local brands shape smishing conversion.

Technical

Smishing, shortlinks and callback routes in Belgium

Why mobile phishing needs sender, shortlink, redirect and phone-route intelligence.

Technical

TDS, cloaking and anti-bot phishing infrastructure

Why phishing pages behave differently by scanner, country, browser or timing.

Technical

URLScan evidence and redirect-chain analysis

Why screenshots, DOM, redirects and network traces matter for phishing evidence.

Weekly public reports