Mobile-only Turkish banking kits gating on geo + UA
A wave of credential-harvesting pages impersonating Turkish retail banks now serves the live phishing UI only to mobile Chrome User-Agents resolving from Turkish IPs; everyone else gets a Cloudflare challenge or an empty page.
Kits are deploying multi-stage gating to defeat reputation scanners. The first hop is a Cloudflare-fronted domain that returns a managed challenge to anything that does not match `Mozilla/5.0 (Linux; Android …) Chrome` with `Accept-Language: tr-TR` and a Turkish residential ASN.
Trusyn's scanner emulates the geo and UA profile and clears the JavaScript challenge in most cases. Sites that additionally enforce ASN-level fences (only TR residential IPs) require a downstream proxy.
Operators should expect that desktop-based abuse-desk reviewers may load the URL and see a clean page or a 1015 block — full-page screenshots are now a mandatory part of the evidence bundle, not an optional extra.