All Posts
Research
1
min read

The Lure of PSD2

PSD2 legislation aims at reducing payment fraud for the financial industry, but threat actors are using the situation to scam new phishing victims.
Published on
November 26, 2019
Table of Contents
<h2>Overview</h2><p>The Payment Services Directive (PSD) was adopted within the European Union in 2007. PSD is a directive aimed at regulating payment services with the intention to make cross-border payments in the EU as easy, efficient and secure as payments within a member state. PSD2 builds on the previous legislation in the following three areas:</p><ul><li>Increased customer rights</li><li>Enhanced security through SCA (Strong Customer Authentication) criteria</li><li>Enablement of third-party access to account information</li></ul><p>Although the majority of PSD2’s requirements became law in January 2018, the SCA compliance has been delayed by a further 18 months to ensure industry has extra time for implementation. The UK Financial Conduct Authority (FCA) has agreed to a phased roll-out plan to full compliance by 14 March 2021<sup>[1]</sup>. It is expected that other European regulators will aim for this timeline also. As efforts within the financial sector works towards implementation, cyber threat actors and groups are using PSD2 as an opportune theme to target and strike. Anomali Threat Research (ATR) continue to observe suspect domain registrations and active sightings related to using PSD2 as a malicious lure. This blog will highlight recent notable findings to raise awareness of this activity across financial institutions, electronic money institutions and payment institutions throughout Europe.</p><h2>Findings</h2><p>The use of social engineering and targeted phishing campaigns as a primary infection method is a seemingly constant observation. Symantec states that spear-phishing emails are the most popular avenue for attack and were used by 65% of all known cyber threat groups<sup>[2]</sup>. The Google Transparency Report graph below gives an indication of the explosive growth in phishing site activity over the past 10 years. There are a number of factors that contribute to this long standing rising trajectory, but fundamentally, the overarching driver for seeing this trend is the low technical barriers and cost to attack, and the susceptibility rates and financial rewards for successful campaigns by cyber threat actors and groups.</p><p style="text-align: center;"><em><img alt="Number of sites deemed dangerous by Google Safe Browsing (November 2009 - November 2019)" src="https://cdn.filestackcontent.com/Jcz7x2tsQxS6XtYeyt3b"/><br/> Figure 1. Number of sites deemed dangerous by Google Safe Browsing (November 2009 - November 2019)</em></p><p>Anomali Threat Research analysed domain registrations from 2016. There has been an expected consistent rise in registrations with “psd2” in the domain name (Figure 2) as the legislation was announced and efforts began to implement.</p><p style="text-align: center;"><em><img alt="Domain registrations containing “psd2”" src="https://cdn.filestackcontent.com/C8A8XwGRNC8Kqt8ar0Sg"/><br/> Figure 2. Domain registrations containing “psd2”</em></p><p>Focusing the lens on the usage of PSD2 as a theme to target financial institutions and customer data, Anomali researchers found a large number of illegitimate login pages which were hosted on domains that had “psd2” as part of the registered name. The common credential harvesting tradecraft is typically observed, whereby a web page is created mirroring the exact layout and style of the intended targeted organisation, in an attempt to lure unsuspecting users into disclosing their credentials (Figure 3 and 4).</p><p style="text-align: center;"><em><img alt="Credential harvesting page targeting Poste Italiane, the Italian postal service provider who also provide a range of financial services, hosted on a crafted “psd2” domain" src="https://cdn.filestackcontent.com/tPXqyRoeSfmbdug01leW"/><br/> Figure 3. Credential harvesting page targeting Poste Italiane, the Italian postal service provider who also provide a range of financial services, hosted on a crafted “psd2” domain</em></p><p style="text-align: center;"><em><img alt="Credential harvesting page targeting Sparkasse, a German savings bank, also hosted on a crafted “psd2” domain" src="https://cdn.filestackcontent.com/gRhOoaDGRLOB6rocmF8B"/><br/> Figure 4. Credential harvesting page targeting Sparkasse, a German savings bank, also hosted on a crafted “psd2” domain</em></p><p>Aside from testing victim susceptibility with rogue authentication portals to obtain username and password data, which is frequently observed in the targeting of entities across all sectors globally, one observable was recorded which targeted the individual(s) by requesting them to complete an illegitimate process of adaptation to PSD2 web form (Figure 5). This form requested a payment card number, expiration date, CVV2, and even the account balance amount.</p><p style="text-align: center;"><em><img alt="Adaption to PSD2 web form targeting Monte dei Paschi di Siena (MPS), an Italian bank" src="https://cdn.filestackcontent.com/TrB05JKvRmOROunTiogn"/><br/> Figure 5. Adaption to PSD2 web form targeting Monte dei Paschi di Siena (MPS), an Italian bank</em></p><h2>Concluding Remarks</h2><p>The PSD2 legislation is bringing wholesale changes to the financial industry, with a core underpinning to reduce payment fraud losses. Trend Micro have documented an excellent research paper<sup>[3]</sup> considering the potential threats after a fully rolled out PSD2 implementation is in place, covering attacks on APIs, greater visibility and therefore targeting intent to those smaller FinTech organisations that don’t have robust cyber risk management programmes, and ultimately attacks on the user, which is relatable to the findings in this blog piece. In this analysis Anomali Threat Research observed findings which explicitly included “psd2” in the registered domain entity and also pivoted from these. There will obviously be other tactics and techniques employed by cyber threat actors to target individuals and institutions, however we hope these findings assist in highlighting PSD2 as a lure to attack, and that the financial sector can take the necessary steps to proactively monitor and reduce the potential impact of such activity.</p><h2>Endnotes</h2><p><sup>[1]</sup> Barclaycard, “What is PSD2 and will it affect how merchants take payments”, accessed November 11, 2019, published June 25, 2019, <a href="https://www.barclaycard.co.uk/business/news-and-insights/what-is-psd2" target="_blank">https://www.barclaycard.co.uk/business/news-and-insights/what-is-psd2</a></p><p><sup>[2]</sup> Symantec Security Response Team, “Internet Security Threat Report 24”, Symantec, accessed November 11, 2019, published February, 19, 2019, <a href="https://www.symantec.com/blogs/threat-intelligence/istr-24-cyber-security-threat-landscape" target="_blank">https://www.symantec.com/blogs/threat-intelligence/istr-24-cyber-security-threat-landscape</a></p><p><sup>[3]</sup> Feike Hacquebord, Robert McArdle, Fernando Mercês, and David Sancho, “When PSD2 Opens More Doors: The Risk of Open Banking”, Trend Micro, accessed November 13, 2019, published September 17, 2019, <a href="https://blog.trendmicro.com/trendlabs-security-intelligence/when-psd2-opens-more-doors-the-risks-of-open-banking/" target="_blank">https://blog.trendmicro.com/trendlabs-security-intelligence/when-psd2-opens-more-doors-the-risks-of-open-banking/</a></p><p style="text-align: center;"><a class="button button-xlarge button-rounded button-blue-grad" href="https://www.anomali.com/resources/whitepapers/the-lure-of-psd2-anomali-threat-research" target="_blank">Download Report</a></p>

FEATURED RESOURCES

January 20, 2026
Anomali Cyber Watch

Anomali Cyber Watch: Remcos RAT, BitB phishing, Linux Malware Framework, Supply Chain Intrusion and more

New Malware Campaign Delivers Remcos RAT Through Text-Only Staging and Living-Off-the-Land Execution. Browser-in-the-Browser Phishing Evolves into a High-Fidelity Credential Trap. Cloud-Aware Linux Malware Framework Poised for Future Threats. And More..
Read More
January 13, 2026
Anomali Cyber Watch

Anomali Cyber Watch: Cisco ISE Flaw, Ni8mare, N8scape, Zero-Click Prompt Injection and more

Anomali Cyber Watch: Cisco ISE Flaw Enables Arbitrary File Read via Administrative Access. Ni8mare and N8scape Vulnerabilities Expose n8n Automation Platforms to Full Compromise. Zero-Click Prompt Injection Abuse Enables Silent Data Exfiltration via AI Agents. Phishing Attacks Exploit Misconfigured Email Routing to Spoof Internal Domains. Ransomware Activity in the U.S. Continued to Rise in 2025. Android Ghost Tap Malware Drives Remote NFC Payment Fraud Campaigns. Black Cat SEO Poisoning Malware Campaign Exploits Software Search Results. MuddyWater Upgrades Espionage Arsenal with RustyWater RAT in Middle East Spear-Phishing. China-Linked ESXi VM Escape Exploit Observed in the Wild. Instagram Denies Data Breach Despite Claims of 17.5 Million Account Data Leak
Read More
January 6, 2026
Anomali Cyber Watch

Anomali Cyber Watch: OWASP Agentic AI, MongoBleed, WebRAT Malware, and more

Real-World Attacks Behind OWASP Agentic AI Top 10. MongoDB Memory Leak Vulnerability “MongoBleed” Actively Exploited. WebRAT Malware Spread via Fake GitHub Proof of Concept Exploits. Trusted Cloud Automation Weaponized for Credential Phishing. MacSync macOS Stealer Evolves to Abuse Code Signing and Swift Execution. Claimed Resecurity Breach Turns Out to Be Honeypot Trap. Cybersecurity Professionals Sentenced for Enabling Ransomware Attacks. Google Tests Nano Banana 2 Flash as Its Fastest Image AI Model. RondoDox Botnet Exploits React2Shell to Hijack 90,000+ Systems. Critical n8n Expression Injection Leads to Arbitrary Code Execution
Read More
Explore All