{"id":190,"date":"2025-12-25T06:21:21","date_gmt":"2025-12-25T06:21:21","guid":{"rendered":"https:\/\/phishreaper.ai\/blogs\/?p=190"},"modified":"2025-12-25T07:48:34","modified_gmt":"2025-12-25T07:48:34","slug":"qib-phishing-82-days-is-not-an-incident-its-a-business-model","status":"publish","type":"post","link":"https:\/\/phishreaper.ai\/blogs\/2025\/12\/25\/qib-phishing-82-days-is-not-an-incident-its-a-business-model\/","title":{"rendered":"QIB Phishing &#8211; 82 Days is Not an Incident. It&#8217;s a Business Model."},"content":{"rendered":"<p>A Qatar Islamic Bank (QIB) impersonation domain (qib1[.]online) was registered on 4 October 2025 and detected by PhishReaper&#8217;s agentic AI on the same day. However, it was still active as of 25 December 2025; i.e., An 82\u2011day operating window. In phishing, time is not a detail. Time is the multiplier.<\/p>\n<p><a href=\"https:\/\/phishreaper.ai\/blogs\/2025\/12\/25\/qib-phishing-82-days-is-not-an-incident-its-a-business-model\/qib-phishing-page1\/\" rel=\"attachment wp-att-196\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-196 size-large aligncenter\" src=\"https:\/\/phishreaper.ai\/blogs\/wp-content\/uploads\/2025\/12\/QIB-Phishing-Page1-1024x543.png\" alt=\"QIB Phishing - 82 Days is Not an Incident. It's a Business Model.\" width=\"1024\" height=\"543\" srcset=\"https:\/\/phishreaper.ai\/blogs\/wp-content\/uploads\/2025\/12\/QIB-Phishing-Page1-1024x543.png 1024w, https:\/\/phishreaper.ai\/blogs\/wp-content\/uploads\/2025\/12\/QIB-Phishing-Page1-300x159.png 300w, https:\/\/phishreaper.ai\/blogs\/wp-content\/uploads\/2025\/12\/QIB-Phishing-Page1-768x407.png 768w, https:\/\/phishreaper.ai\/blogs\/wp-content\/uploads\/2025\/12\/QIB-Phishing-Page1-1536x815.png 1536w, https:\/\/phishreaper.ai\/blogs\/wp-content\/uploads\/2025\/12\/QIB-Phishing-Page1.png 1849w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<h2 class=\"western\">Why 82 Days Matter<\/h2>\n<p>An 82\u2011day lifespan is not a \u201csingle incident.\u201d It is a sustained harvesting operation. It provides enough time for redistribution across multiple waves (SMS, WhatsApp, email forwards), enough time for victims to cycle, and enough time for fraud to surface long after data is captured. If detection starts at chargebacks, the defender is measuring the end of the story; not stopping the beginning.<\/p>\n<p><a href=\"https:\/\/phishreaper.ai\/blogs\/2025\/12\/25\/qib-phishing-82-days-is-not-an-incident-its-a-business-model\/vt-qib\/\" rel=\"attachment wp-att-204\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-204\" src=\"https:\/\/phishreaper.ai\/blogs\/wp-content\/uploads\/2025\/12\/VT-QIB-1024x615.png\" alt=\"\" width=\"1024\" height=\"615\" srcset=\"https:\/\/phishreaper.ai\/blogs\/wp-content\/uploads\/2025\/12\/VT-QIB-1024x615.png 1024w, https:\/\/phishreaper.ai\/blogs\/wp-content\/uploads\/2025\/12\/VT-QIB-300x180.png 300w, https:\/\/phishreaper.ai\/blogs\/wp-content\/uploads\/2025\/12\/VT-QIB-768x461.png 768w, https:\/\/phishreaper.ai\/blogs\/wp-content\/uploads\/2025\/12\/VT-QIB.png 1513w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<h2 class=\"western\">Source Code Dissection (What the Page Was Built to Do)<\/h2>\n<p>This page is engineered for <strong>&#8220;structured data theft&#8221;<\/strong>, not <strong>\u201cgeneric login phishing\u201d.<\/strong><\/p>\n<p>Harvested fields observed in the source:<\/p>\n<p>\u2022 Identity anchors: customer name, Qatar ID (national identifier), registered mobile number.<\/p>\n<p>\u2022 Payment credentials: card number (PAN), expiry month\/year, CVV.<\/p>\n<p>\u2022 Victim triage: available balance (used to prioritize high\u2011value victims).<\/p>\n<p>Observed flow:<\/p>\n<p>\u2022 Two-step workflow: identity + contact first, then full card capture.<\/p>\n<p>\u2022 This sequencing increases completion rates: victims \u201ccommit\u201d with low-friction fields before entering high-risk data.<\/p>\n<p>Operational implementation details that matter to defenders:<\/p>\n<p>\u2022 Built on WordPress with a common forms stack (WPForms).<\/p>\n<p>\u2022 Form submission routed through WordPress AJAX handler: <strong>\/wp-admin\/admin-ajax.php<\/strong> on the phishing domain.<\/p>\n<p>\u2022 WPForms commonly stores submissions server-side and\/or emails them (attacker-controlled configuration), meaning exfiltration can look like \u201cnormal CMS behavior\u201d rather than custom malware JavaScript.<\/p>\n<p><a href=\"https:\/\/phishreaper.ai\/blogs\/2025\/12\/25\/qib-phishing-82-days-is-not-an-incident-its-a-business-model\/qib-phishing-page2\/\" rel=\"attachment wp-att-197\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-197 aligncenter\" src=\"https:\/\/phishreaper.ai\/blogs\/wp-content\/uploads\/2025\/12\/QIB-Phishing-Page2-1024x651.png\" alt=\"QIB Phishing - 82 Days is Not an Incident. It's a Business Model.\" width=\"1024\" height=\"651\" srcset=\"https:\/\/phishreaper.ai\/blogs\/wp-content\/uploads\/2025\/12\/QIB-Phishing-Page2-1024x651.png 1024w, https:\/\/phishreaper.ai\/blogs\/wp-content\/uploads\/2025\/12\/QIB-Phishing-Page2-300x191.png 300w, https:\/\/phishreaper.ai\/blogs\/wp-content\/uploads\/2025\/12\/QIB-Phishing-Page2-768x488.png 768w, https:\/\/phishreaper.ai\/blogs\/wp-content\/uploads\/2025\/12\/QIB-Phishing-Page2.png 1494w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<h2 class=\"western\">Observed Indicators &amp; Artifacts (from Source)<\/h2>\n<p>\u2022 Domain: qib1[.]online<\/p>\n<p>\u2022 Submission endpoint: <strong>https:\/\/qib1.online\/wp-admin\/admin-ajax.php<\/strong><\/p>\n<p>\u2022 WPForms markers: <strong>wpforms-ajax-form<\/strong> present; <strong>data-formid=&#8221;8&#8243;<\/strong> referenced in the HTML\/JS configuration.<\/p>\n<p>\u2022 Branding cues: <strong>QIB naming and leadership tagline<\/strong> used to increase trust and reduce suspicion.<\/p>\n<h2><a href=\"https:\/\/phishreaper.ai\/blogs\/2025\/12\/25\/qib-phishing-82-days-is-not-an-incident-its-a-business-model\/sourcecode\/\" rel=\"attachment wp-att-198\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-198\" src=\"https:\/\/phishreaper.ai\/blogs\/wp-content\/uploads\/2025\/12\/SourceCode-1024x542.png\" alt=\"QIB Phishing - 82 Days is Not an Incident. It's a Business Model.\" width=\"1024\" height=\"542\" srcset=\"https:\/\/phishreaper.ai\/blogs\/wp-content\/uploads\/2025\/12\/SourceCode-1024x542.png 1024w, https:\/\/phishreaper.ai\/blogs\/wp-content\/uploads\/2025\/12\/SourceCode-300x159.png 300w, https:\/\/phishreaper.ai\/blogs\/wp-content\/uploads\/2025\/12\/SourceCode-768x406.png 768w, https:\/\/phishreaper.ai\/blogs\/wp-content\/uploads\/2025\/12\/SourceCode-1536x813.png 1536w, https:\/\/phishreaper.ai\/blogs\/wp-content\/uploads\/2025\/12\/SourceCode.png 1667w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/h2>\n<h2>Risk If QIB Waits (What Happens in Practice)<\/h2>\n<p>If QIB relies on reactive signals (complaints, fraud disputes, chargebacks), the attacker keeps the advantage. With full card credentials (PAN\/EXP\/CVV) captured, monetization does not require additional compromise. The inclusion of a registered mobile number and national ID elevates risk beyond card fraud into OTP targeting, SIM\u2011swap attempts, and follow\u2011on impersonation.<\/p>\n<p>What increases with every day the domain remains active:<\/p>\n<p>\u2022 Victim count (more distribution cycles).<\/p>\n<p>\u2022 Loss per victim (attackers focus on high-balance submissions).<\/p>\n<p>\u2022 Operational burden (fraud ops, call center load, reputational damage).<\/p>\n<p>\u2022 Compliance exposure (incident handling, customer remediation, reporting obligations depending on policy\/jurisdiction).<\/p>\n<h2 class=\"western\">Why PhishReaper Exists (Collapse the Window)<\/h2>\n<p>PhishReaper is not designed to <strong>\u201cblock a URL after victims report it.\u201d<\/strong> It is designed to <strong>reduce the time\u2011to\u2011awareness from weeks\/months to hours by surfacing brand\u2011impersonating domains early, scoring intent, and triggering takedown\/blocking\/customer-warning actions before campaigns scale<\/strong>.<\/p>\n<p><strong>A phishing site killed on day one is an inconvenience. A phishing site alive for 82 days becomes a business.<\/strong><\/p>\n<h2 class=\"western\">The Bottom Line<\/h2>\n<p>This incident did not rely on zero\u2011days or advanced tooling. It relied on time.<\/p>\n<p>Fraud does not announce itself. It does not wait for quarterly reviews. It does not pause for internal escalation paths. It exploits time.<\/p>\n<p>An 82-day phishing operation is not a technical anomaly. It is a predictable outcome when detection begins after victims report loss. PhishReaper exists to break this pattern; to surface malicious intent at inception, to collapse attacker dwell time from months to hours, and to ensure that brand trust is defended before it is monetized by criminals.<\/p>\n<p>In phishing, the question is never if damage occurs. It is how long defenders allow attackers to operate before intervening.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A Qatar Islamic Bank (QIB) impersonation domain (qib1[.]online) was registered on 4 October 2025 and detected by PhishReaper&#8217;s agentic AI on the same day. However, it was still active as of 25 December 2025; i.e., An 82\u2011day operating window. In phishing, time is not a detail. Time is the multiplier. Why 82 Days Matter An [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":195,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"pagelayer_contact_templates":[],"_pagelayer_content":"","footnotes":""},"categories":[5,13,4],"tags":[],"class_list":["post-190","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-agentic-ai","category-banking-and-finance","category-phishing-detection"],"_links":{"self":[{"href":"https:\/\/phishreaper.ai\/blogs\/wp-json\/wp\/v2\/posts\/190","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/phishreaper.ai\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/phishreaper.ai\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/phishreaper.ai\/blogs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/phishreaper.ai\/blogs\/wp-json\/wp\/v2\/comments?post=190"}],"version-history":[{"count":9,"href":"https:\/\/phishreaper.ai\/blogs\/wp-json\/wp\/v2\/posts\/190\/revisions"}],"predecessor-version":[{"id":206,"href":"https:\/\/phishreaper.ai\/blogs\/wp-json\/wp\/v2\/posts\/190\/revisions\/206"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/phishreaper.ai\/blogs\/wp-json\/wp\/v2\/media\/195"}],"wp:attachment":[{"href":"https:\/\/phishreaper.ai\/blogs\/wp-json\/wp\/v2\/media?parent=190"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/phishreaper.ai\/blogs\/wp-json\/wp\/v2\/categories?post=190"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/phishreaper.ai\/blogs\/wp-json\/wp\/v2\/tags?post=190"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}