Commercial Bank Users Beware
Today, Sri Lankans searching for Commercial Bank or ComBank Digital on Google were met with danger right at the top of the page. The first result — marked Sponsored — wasn’t the bank at all. It was a phishing website using the domain comdank.online, redirecting to id.combankdigital.online.

🎭 How the Scam Worked
The attackers bought Google Ads for search terms like Commercial Bank Sri Lanka, ComBank login, and ComBank Digital.
- Victims who trusted the top result clicked the ad.
- They were directed first to comdank.online.
- From there, the site redirected them into id.combankdigital.online — a fake copy of the ComBank Digital login page.

The fake page looked identical to the real portal. Anyone entering a username and password was shown a “Please wait” loading screen.

From testing, here’s what likely happened behind the scenes:
- The phishing kit appeared to relay credentials live into the real Commercial Bank login.
- If details were valid, it could then prompt the victim to enter their OTP SMS code, completing the takeover.
- If details were invalid (as in my test with fake data), the site displayed an error such as “Invalid credentials” or “Account locked.”
While there are no confirmed victims, the setup strongly suggests this was a real-time phishing kit built to bypass OTP-based security.
🕵️ Cloaking: How They Hid the Site
This wasn’t an amateur scam. The phishing site used cloaking techniques to hide:
- Typing comdank.online directly showed a harmless restaurant page or a 403 Access Denied error.
- Clicking through the Google Ad showed the fake ComBank login.
- The phishing URL even included OAuth-style parameters (
client_id,nonce,code_challenge) to look technical and legitimate.
This makes the scam much harder for CERT or investigators to detect.

📉 The Ad Has Been Taken Down
The fraudulent Google Ad has now been removed. But that doesn’t mean the threat is gone. Scammers can easily launch the same attack again tomorrow with a fresh domain name.
Today it was comdank.online and id.combankdigital.online. Tomorrow, it could be another variation.
🏦 ComBank’s Official Response
Commercial Bank moved fast to warn customers. They have:
- Issued a special notice about fake websites
- Sent emails to customers warning them to always check the URL
- Shared their official secure links:
https://www.combank.lk/digitalbanking/https://www.combankdigital.com
Here is the official notice from ComBank:

🛡️ How to Protect Yourself
- Don’t trust the top ad result. Scroll down and click the official bank link.
- Always type the URL manually:
www.combank.lkorwww.combankdigital.com. - Check spelling carefully — “comdank” is not “combank.”
- Look for HTTPS (the padlock).
- Never share OTPs or passwords. The bank will never ask for them.
- If you entered details into the fake site:
- Call ComBank immediately → 1316 or +94 11 235 3353
- Reset your Digital Banking password
- Monitor your account for unusual activity
🌍 Has This Happened Before?
This is the first time we’ve seen a phishing scam in Sri Lanka abusing Google Ads cloaking. But it’s not the first phishing campaign overall. Locally, we’ve already seen:
- SMS scams pretending to be banks, Abans JBL, and telecom companies
- WhatsApp/Telegram job scams (STX Entertainment, Essential, SG Bike Mart)
- Fake shopping sites promoted on Facebook Ads
Globally, Google Ads phishing is not new. In 2023–2024, banks in the US, UK, and India reported attacks where ads led users to fake login portals. Some of those kits also used real-time OTP relays, just like this one appears to have been designed to do.
The fact that this method has now surfaced in Sri Lanka means our scam landscape is evolving to global levels of sophistication.
🔮 The Bigger Picture
Today, it was Commercial Bank. Tomorrow, it could be Sampath, HNB, People’s Bank, or BOC.
This was not a cheap SMS blast. It was an advanced phishing kit:
- Leveraging Google Ads trust
- Using cloaking to stay hidden
- Built to bypass OTP two-factor authentication
Even the most careful users could be tricked. Because who expects the first result on Google to be fake?
⚡ DEBUGGER’s Note:
This attack shows just how fast scams in Sri Lanka are evolving. The site wasn’t just after usernames and passwords — it was likely built to fool OTPs too. That’s why this is terrifying.
Know the Threat. Stop the Attack.
– DEBUGGER


