Direct answer
What is Belgian phishing intelligence? It is phishing and fraud intelligence scored for Belgian relevance using local brands, language, institutions, payment routes, telecom context and official sources.
Local context changes detection
Belgian phishing often borrows trust from banks, bpost, itsme, MyMinfin, Card Stop, telecoms, public services and fake financial platforms. Non-.be TLDs can be highly relevant when they impersonate Belgian brands.
Sources that matter
FSMA, Safeonweb/CCB, Febelfin, FPS Finance, BIPT, DNS Belgium, official baselines, CT logs, URLScan-style evidence, shortlink expansion and active OSINT each contribute a different layer.
Operational output
The useful result is a Belgian Live Feed, brand pressure, smishing routes, fake financial platform watch, mule graph, evidence readiness and exportable feeds for existing controls.
How PhishNet uses this
Inside PhishNet this topic is treated as operational graph context: observations are linked to sources, evidence, Belgian relevance, confirmation state, liveness, campaigns and exports. Public pages explain the method; authenticated users can pivot into the full platform workflow when a signal needs investigation or handoff.
Selected sources and research
These pages combine PhishNet platform knowledge with public research, official Belgian sources and open OSINT documentation.
Common questions
What is Belgian phishing intelligence?
It is phishing and fraud intelligence scored for Belgian relevance using local brands, language, institutions, payment routes, telecom context and official sources.
Are only .be domains Belgian-relevant?
No. A .top, .xyz, .shop or other TLD can be Belgian-relevant when it targets a Belgian brand, institution, phone route, IBAN pattern or campaign.