Why fraudsters copy your platform
March 15, 2026 · 4 min read
Attackers do not always reach your users through your platform. Sometimes they reach them by pretending to be your platform.
Let's take a look at hosting providers. Attackers scan the provider's IP ranges to identify websites using the service, building a list of customers and their contact details. They create a page that looks identical to the hosting provider's control panel login. They send the link to customers through email or messaging, with a message urgent enough to prompt action. Customers visit the fake page, enter their credentials, and at that moment the credentials are lost. The attackers now have valid usernames and passwords for real accounts on the real platform.
The phishing campaign itself is invisible to the hosting provider. It happens on external infrastructure, through external communication channels, against users who have no reason to suspect anything until it is too late. The provider has no way to block the fake page or intercept the phishing emails, and no visibility into which users enter their credentials on the replica.
But what happens next is entirely visible. The attackers use the stolen credentials to log in to the real platform. That login attempt hits the provider's actual authentication system on a device the account has never used, with an IP address inconsistent with the user's history, at a time and location that break the account's established pattern. The phishing is invisible, but the login is not.
Every platform is a target
Hosting providers are one example, but this attack works against any platform with a login page and a user base worth targeting. SaaS applications, e-commerce platforms, financial services, healthcare portals, internal business tools: if your users authenticate with credentials, someone can build a fake version of your login page and harvest those credentials.
The attack scales with automation. Scraping customer lists from public sources, generating phishing pages from templates, and distributing them through bulk email is an industrialized process.
User activity monitoring is not optional. You cannot prevent every phishing campaign that targets your users. You can detect when stolen credentials are used against your real platform, and you can act before the attacker does damage.
MFA helps, but it does not close the door
Multi-factor authentication is the standard defense against credential theft, and it works. An attacker who has a stolen password but no access to the user's second factor cannot complete authentication. For the accounts where MFA is enforced, a successful phish of the password alone is not enough.
MFA raises the cost of credential theft significantly and blocks the majority of opportunistic attacks. It does not eliminate the need to monitor what happens after authentication. The accounts without MFA are exposed to simple credential replay. The accounts with MFA are exposed to proxy-based session capture. Both produce the same result: an attacker logging in from unfamiliar infrastructure with a valid session.
What the stolen credential login looks like
A phishing-sourced login activity has behavioral characteristics that distinguish it from the legitimate user's normal pattern.
Device and location mismatch. The legitimate user logs in from a consistent set of devices and locations built up over months or years of account history. The attacker logs in from a device the account has never seen, from an IP address in a different city or country, on a network type inconsistent with the user's established pattern.
Session behavior after login. A legitimate user who logs in to a hosting control panel browses their sites, checks settings, and follows a pattern consistent with their usage history. An attacker who logs in with stolen credentials goes straight to high-value targets: account settings, payment methods, DNS configuration, email forwarding rules. The session is focused and purposeful in a way that deviates from the account's normal rhythm.
Timing anomalies. The attacker may log in within hours of the phishing campaign being sent, creating a cluster of anomalous logins across multiple accounts in a narrow time window. If several accounts that normally show no login activity suddenly authenticate from unfamiliar infrastructure within the same afternoon, the pattern indicates a coordinated attack rather than individual account compromises.
Rapid account changes. The attacker's priority after gaining access is to secure that access: change the email address, change the password, add a new authentication method. These changes happening shortly after a login from an unrecognized device and location are the strongest takeover signal available.
How tirreno catches the login, not the phish
tirreno monitors user events on your actual platform. It cannot prevent phishing, but it detects the moment harvested credentials are used.
When a phishing campaign hits and multiple accounts begin showing suspicious login activity from new IPs and devices in a short window, the pattern is visible in the activity page in real time. The trust scores drop across affected accounts. Accounts crossing the auto-blacklisting threshold are suspended automatically. Accounts in the review range surface for your team with the full context of what triggered the score.
Timing determines the outcome. A compromised login detected and blocked within minutes limits the damage to a failed attempt. One that goes undetected for days gives the attacker time to change credentials, exfiltrate data, and use the compromised account as a staging point for further attacks.
Getting started
Install. Deploy a tirreno instance for your platform. The administration guide covers setup and configuration.
Send events. Send events to tirreno from your backend for every login attempt (successful and failed), password change, email change, and session activity. Include username, IP, user agent, timestamp, and event type. The developer guide has the API schema.
Apply the account_takeover preset. Open the rules page, activate the preset, and browse the activity page. The behavioral baselines build as login data accumulates. Within days you will have a picture of normal authentication patterns for your user base.
Monitor for coordinated anomalies. When multiple accounts show anomalous logins from unrecognized networks in a short window, you are likely seeing the result of a phishing campaign. The activity page makes this visible as it happens.
Download at tirreno.com/download.