Suspicious

Phishings targeting Klarna

Suspicious and active websites


Phishings targeting Klarna

Suspicious and active websites


About
AIBuy-now-pay-later (BNPL) target. Lures impersonate 'payment due' or 'account locked' notices to harvest card data.

Suspicious sites — confidence is not always 100%. Use for Threat Hunting or watchlists.

Last check (UTC) First seen (UTC) URL Screenshot Flags Details

Suspicious sites — confidence is not always 100%. Use for Threat Hunting or watchlists.

URL Screenshot Details

AIHow to verify a real Klarna URL

  • Legitimate Klarna URLs always end in klarna.com (e.g. www.klarna.com, account.klarna.com). Anything else — including look-alike typosquats, hyphenated variations, or unfamiliar TLDs like .xyz / .top / .vip — is not Klarna.
  • The padlock icon proves TLS is active, not that the site is safe. Free DV certificates are issued to attackers in minutes; every active site listed above has a valid TLS certificate.
  • If you got the link from email, SMS, or social media, do not click it. Open klarna.com from your browser bookmark or type the domain manually.
  • Real Klarna pages almost never ask for credentials immediately after clicking from a message — treat any such redirect as a phishing attempt until the domain is verified.