Phishing Activity Trends

Similar documents
Phishing Activity Trends Report August, 2006

Phishing Activity Trends

Phishing Activity Trends

Phishing Activity Trends Report August, 2005

Phishing Activity Trends

Phishing Activity Trends Report January, 2005

Phishing Activity Trends Report October, 2004

Phishing Activity Trends Report March, 2005

Phishing Activity Trends Report November, 2004

Phishing Activity Trends Report. 3 rd Quarter Committed to Wiping Out Internet Scams and Fraud

Phishing Activity Trends Report. 4 th Quarter Unifying the. Global Response To Cybercrime. October December 2012

Phishing Activity Trends Report. 4 th Quarter Committed to Wiping Out Internet Scams and Fraud

Anti-Phishing Working Group

Phishing Activity Trends Report. 3 rd Quarter Unifying the. Global Response To Cybercrime. July September 2012

4 th Quarter Phishing Activity Trends Report. Unifying the Global Response To Cybercrime. Activity October December 2017.

Phishing Read Behind The Lines

CE Advanced Network Security Phishing I

Korea Phishing Activity Trends Report

Security & Phishing

Anti-Phishing Working Group

August 2009 Report #22

October 2009 Report #24

December 2009 Report #26

What can we lose not implementing proper security in our IT environment? Aleksandar Pavlovic Security Account Manager Cisco

Panda Security 2010 Page 1

The Rise of Phishing. Dave Brunswick Tumbleweed Communications Anti-Phishing Working Group

RSA FRAUDACTION ANTI-PHISHING SERVICE: BENEFITS OF A COMPREHENSIVE MITIGATION STRATEGY

JPCERT/CC Incident Handling Report [October 1, 2015 December 31, 2015]

Internet Security Threat Report Volume XIII. Patrick Martin Senior Product Manager Symantec Security Response October, 2008

Mapping the Frontiers of the Electronic Crime Threat From Consumers' Desktops to National Equities Markets

Evolution of Spear Phishing. White Paper

JPCERT/CC Incident Handling Report [January 1, March 31, 2018]

SYMANTEC ENTERPRISE SECURITY. Symantec Internet Security Threat Report September 2005 Power and Energy Industry Data Sheet

Protecting Against Online Fraud. F5 EMEA Webinar August 2014

2014 INTERNET COMMERCE CASE STUDY. The Battle Against Phishing and Fraudulent s. 100 S. Ellsworth Ave 4th Floor San Mateo, CA

Issues in Using DNS Whois Data for Phishing Site Take Down

Unique Phishing Attacks (2008 vs in thousands)

Whitepaper on AuthShield Two Factor Authentication with SAP

How to prevent phishing attacks? In 3 Pages. Author: Soroush Dalili irsdl {4t[ yahoo }d0t] com Website: Soroush.SecProject.

FAQ. Usually appear to be sent from official address

DMARC Continuing to enable trust between brand owners and receivers

Botnets: major players in the shadows. Author Sébastien GOUTAL Chief Science Officer

Spam Evolution Report: October 2009

How technology changed fraud investigations. Jean-François Legault Senior Manager Analytic & Forensic Technology June 13, 2011

GLOBAL MOBILE PAYMENT METHODS: FIRST HALF 2016

WHAT IS CORPORATE ACCOUNT TAKEOVER? HOW DOES IT HAPPEN?

Best Practices Guide to Electronic Banking

ELECTRONIC BANKING & ONLINE AUTHENTICATION

1 of 11 10/1/ :26 AM

Fraud Mobility: Exploitation Patterns and Insights

Identity Theft, Fraud & You. PrePare. Protect. Prevent.

How to recognize phishing s

Site Data Protection (SDP) Program Update

Spring Brandjacking Index

NEVIS Smart Solutions against sophisticated attackers

Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1:

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015

GTIC Monthly Threat Report June 2017

Webroot Phishing Threat Trends

Be certain. MessageLabs Intelligence: May 2006

A REVIEW PAPER ON PHISHING A GROWING SCAM

Phishing is Yesterday s News Get Ready for Pharming

Ministry of Government and Consumer Services. ServiceOntario. Figure 1: Summary Status of Actions Recommended in June 2016 Committee Report

Prolexic Attack Report Q4 2011

McAfee Labs Threat Report

KASPERSKY FRAUD PREVENTION FOR ENDPOINTS

New Zealand National Cyber Security Centre Incident Summary

DoD Spear-Phishing Awareness Training. Joint Task Force - Global Network Operations

NOT PROTECTIVELY MARKED PHISHING. July 2016

Incident Play Book: Phishing

Target Breach Overview

CompTIA Security Research Study Trends and Observations on Organizational Security. Carol Balkcom, Product Manager, Security+

REPORT. proofpoint.com

Observation by the Internet Fixed-Point Monitoring System (TALOT2) for November 2011

How Enterprise Tackles Phishing. Nelson Yuen Technology Manager, Cybersecurity Microsoft Hong Kong

Cyber Threat Intelligence Report

The Cost of Denial-of-Services Attacks

MRG Effitas Online Banking Browser Security Assessment Project Q Q1 2014

Why you MUST protect your customer data

The State of Spam A Monthly Report June Generated by Symantec Messaging and Web Security

The Credential Phishing Handbook. Why It Still Works and 4 Steps to Prevent It

Updates on Sharing Threat Data, Security Awareness and Policy Efforts to Fight Cybercrime

Bank of america report phishing

MARKET NEWSLETTER No 69 February 2013

Office 365 Buyers Guide: Best Practices for Securing Office 365

EBOOK. Stopping Fraud. How Proofpoint Helps Protect Your Organization from Impostors, Phishers and Other Non-Malware Threats.

3.5 SECURITY. How can you reduce the risk of getting a virus?

TABLE OF CONTENTS Introduction: IS A TOP THREAT VECTOR... 3 THE PROBLEM: ATTACKS ARE EVOLVING FASTER THAN DEFENSES...

ITU Regional Cybersecurity Forum for Asia-Pacific

WHITEPAPER. Protecting Against Account Takeover Based Attacks

Authentication Security

GLOBAL ENCRYPTION TRENDS STUDY

Consolidated Privacy Notice

The Scenes of Cyber Crime

Identity Theft, Phishing and Pharming: Accountability & Responsibilities. OWASP AppSec DC October The OWASP Foundation

Mitel for Microsoft Dynamics CRM Client V5 Release Notes

Cyber Insurance: What is your bank doing to manage risk? presented by

CYBER SECURITY OPERATION CENTER

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

Observation by Internet Fix-Point Monitoring System (TALOT2) for February 2011

Transcription:

Phishing Activity Trends Report for the Month of, 27 Summarization of Report Findings The number of phishing reports received rose to 24,853 in, an increase of over 1, from February but still more than 5, fewer than January s previous record high of 29,93. The United States is back to being the top geographic location for the hosting of crimeware designed for one of three criminal enterprises: as a phishing-based keylogger, an information-stealing Trojan trolling for banking credentials, or a Trojan redirector; China moved back into second place after surpassing the U.S. for the first time in February. The APWG saw a total of 166 brands hijacked in. The number of unique websites hosting keyloggers decreased in to 1,486, down from February s all time high of 3,121. Unique phishing websites increased slightly to 2,871 in 27. APWG researchers note that this continues the trend of decreasing numbers of URL's being employed since the last months of 26 and early months of 27. This is attributed to a tactical change by one of the phishing groups that use multiple URL's on the same domain name. APWG researchers continue to record elevated numbers of brands subject to phishing attacks, indicating the lower number of phishing URL's does not mean that the phishing problem is diminishing. Phishing Defined and Report Scope Phishing is a form of online identity theft that employs both social engineering and technical subterfuge to steal consumers' personal identity data and financial account credentials. Social-engineering schemes use 'spoofed' e- mails to lead consumers to counterfeit websites designed to trick recipients into divulging financial data such as account usernames and passwords. Hijacking brand names of banks, e-retailers and credit card companies, phishers often convince recipients to respond. Technical subterfuge schemes plant crimeware onto PCs to steal credentials directly, often using key logging systems to intercept consumers online account user names and passwords, and to corrupt local and remote navigational infrastructures to misdirect consumers to counterfeit websites and to authentic websites through phisher-controlled proxies that can be used to monitor and intercept consumers keystrokes. The monthly Phishing Activity Trends Report analyzes phishing attacks reported to the (APWG) via its member companies, Global Research Partners, the organization s website at http://www.antiphishing.org and email submission to reportphishing@antiphishing.org. The APWG phishing attack repository is the Internet s most comprehensive archive of email fraud and phishing activity. The APWG additionally measures the evolution, proliferation and propagation of crimeware drawing from the independent research of our member companies. In the second half of this report are tabulations of crimeware statistics and reportage on specific criminal software detected by our member researchers. Statistical Highlights for 27 Number of unique phishing reports received in : 24853 Number of unique phishing sites received in : 2871 Number of brands hijacked by phishing campaigns in : 166 Number of brands comprising the top 8% of phishing campaigns in : 12 Country hosting the most phishing websites in : United States Contain some form of target name in URL: 27.9 % No hostname just IP address: 17 % Percentage of sites not using port 8: 3 % Average time online for site: 4 days Longest time online for site: 31 days

Methodology APWG is continuing to refine and develop our tracking and reporting methodology. We have recently re-instated the tracking and reporting of unique phishing reports (email campaigns) in addition to unique phishing sites. An email campaign is a unique email sent out to multiple users, directing them to a specific phishing web site, (multiple campaigns may point to the same web site). APWG counts unique phishing report emails as those in a given month with the same subject line in the email. APWG also tracks the number of unique phishing websites. This is now determined by unique base URLs of the phishing sites. APWG is also tracking crimeware instances (unique software applications as determined by MD5 hash of the crimeware sample) as well as unique sties that are distributing crimeware (typically via browser drive-by exploits). Phishing Email Reports and Phishing Site Trends for 27 The total number of unique phishing reports submitted to APWG in 27 was 2,871, a drop of nearly 3, from the previous month. This is a count of unique phishing email reports received by the APWG from the public, its members and its research partners. Phishing Reports Received '6 - '7 28 24 2 1848 1749 219 28571 2367 2615 22136 26877 25816 23787 2993 2361 24853 16 12 8 4 May July September November January The Phishing Attack Trends Report is published monthly by the, an industry association focused on eliminating the identity theft and fraud that result from the growing problem of phishing and email spoofing. For further information, please contact APWG Secretary General Peter Cassidy at 617.669.1123. Analysis for the Phishing Attack Trends Report has been donated by the following companies:

The number of unique phishing websites detected by APWG was 2,871 in 27. Laura Mather, Ph.D., Senior Scientist for MarkMonitor said, "MarkMonitor continues to see a lower number of URL's compared to December of 26. We attribute this trend to a tactical change by one of the phishing groups that use multiple URL's on the same domain; that group is targeting fewer brands. Unfortunately, we continue to see a high number of brands used in phishing attacks, so the lower number of phishing URL's does not mean that the phishing problem is diminishing." New Phishing Sites by Month '6 - '7 36 32 28 24 2 16 12 8 4 9666 14191 11121 11976 147 191 24565 37444 37439 28531 27221 16463 2871 May July September November January Top Used Ports Hosting Phishing Data Collection Servers in 27 saw a continuation of a trend of HTTP port 8 being the most popular port used at 96.98% of all phishing sites reported. Port 84 (.94%) Port 8 (96.98%) Port 82 (.78%) Port 88 (.57%) 6 other ports <.5% (.73%)

Brands & Legitimate Entities Hijacked By Email Phishing Attacks in 27 Number of Reported Brands 27 showed a rise in the number of brands hijacked to 166, breaking away from the two previous months in which the totals each came to 135. 16 12 8 4 7 92 April Hijacked Brands by Month '6 - '7 137 13 154 176 148 117 12 146 166 135 135 May June July August September October November December January February Most Targeted Industry Sectors in 27 Financial Services continue to be the most targeted industry sector at 91.6% of all attacks in the month of. ISP (3%) Retail (3%) Miscellaneous (2.4%) Financial Services 91.6%)

Web Phishing Attack Trends in 27 Countries Hosting Phishing Sites In, Websense Security Labs saw a continuation of the top three countries hosing phishing websites. The United States remains at the top of the list with 27.53%. The rest of the top 1 breakdown is as follows: Republic of Korea 18.19%, China 5.53%, Germany 4.68%, France 2.67%, Chile 2.51%, United Kingdom 2.27%, Russia 2.1%, Canada 1.86%, and Japan with 1.86%. Top 1 Phishing Sites Hosting Countries China Germany France Republic of Korea Chile United Kingdom Russia Canada Japan United States PROJECT: Crimeware Crimeware Taxonomy & Samples According to Classification in 27 PROJECT: Crimeware categorizes crimeware attacks as follows, though the taxonomy will grow as variations in attack code are spawned: Phishing-based Trojans - Keyloggers Definition: Crimeware code which is designed with the intent of collecting information on the end-user in order to steal those users' credentials. Unlike most generic keyloggers, phishing-based keyloggers have tracking components which attempt to monitor specific actions (and specific organizations, most importantly financial institutions and online retailers and ecommerce merchants) in order to target specific information, the most common are; access to financial based websites, ecommerce sites, and web-based mail sites.

Phishing-based Trojans Keyloggers, Unique Variants in Password Stealing Malicious Code Unique Applications 4 35 3 25 2 15 1 5 197 18 215 212 182 172 216 237 23 34 345 289 26 April May June July August September October November December January February Phishing-based Trojans Keyloggers, Unique Websites Hosting Keyloggers in Password Stealing Malicious Code URLs 35 3121 2945 3 2683 25 2157 233 21 2122 185 2 18 1899221 175 1486 15 1 5 April May June July August September October November December January February

Phishing-based Trojans Redirectors Definition: Crimeware code which is designed with the intent of redirecting end-users network traffic to a location where it was not intended to go to. This includes crimeware that changes hosts files and other DNS specific information, crimeware browser-helper objects that redirect users to fraudulent sites, and crimeware that may install a network level driver or filter to redirect users to fraudulent locations. All of these must be installed with the intention of compromising information which could lead to identify theft or other credentials being taken with criminal intent. Along with phishing-based keyloggers we are seeing high increases in traffic redirectors. In particular the highest volume is in malicious code which simply modifies your DNS server settings or your hosts file to redirect either some specific DNS lookups or all DNS lookups to a fraudulent DNS server. The fraudulent server replies with good answers for most domains, however when they want to direct you to a fraudulent one, they simply modify their name server responses. This is particularly effective because the attackers can redirect any of the users requests at any time and the end-users have very little indication that this is happening as they could be typing in the address on their own and not following an email or Instant Messaging lure. Phishing-based Trojans & Downloader s Hosting Countries (by IP address) in The chart below represents a breakdown of the websites which were classified during as hosting malicious code in the form of either a phishing-based keylogger or a Trojan downloader which downloads a keylogger. The United States is back on top with 33.93% after being passed for the first time by China last month. The rest of the breakdown was as follows; China 31.6%, Russia 6.46%, Ukraine 5.21%, France 4.85%, Korea 4.13%, Spain 3.59%, Sweden 3.5%, Brazil 2.69% and Germany with 2.33%. Top 1 Phishing Based Keylogger and Trojan Downloaders by Hosting Country Russia Ukraine France Korea China Spain Sweden Brazil Germany United States

Phishing Research Contributors d MarkMonitor PandaLabs Websense Security Labs MarkMonitor is the global leader in delivering comprehensive online corporate identity protection services, with a focus on making the Internet safe for online transactions. PandaLabs is an international network of research and technical support centers devoted to protecting users against malware. Websense Security Labs mission is to discover, investigate, and report on advanced internet threats to protect employee computing environments. For media inquiries please contact Peter Cassidy, APWG Secretary General at 617.669.1123 or pcassidy@antiphishing.org and Cas Purdy at 858.32.9493 or cpurdy@websense.com. About the The (APWG) is an industry association focused on eliminating the identity theft and fraud that result from the growing problem of phishing and email spoofing. The organization provides a forum to discuss phishing issues, define the scope of the phishing problem in terms of hard and soft costs, and share information and best practices for eliminating the problem. Where appropriate, the APWG will also look to share this information with law enforcement. Membership is open to qualified financial institutions, online retailers, ISPs, the law enforcement community, and solutions providers. There are more than 16 companies and government agencies participating in the APWG and more than 26 members. Note that because phishing attacks and email fraud are sensitive subjects for many organizations that do business online, the APWG has a policy of maintaining the confidentiality of member organizations. The website of the is http://www.antiphishing.org. It serves as a public and industry resource for information about the problem of phishing and email fraud, including identification and promotion of pragmatic technical solutions that can provide immediate protection and benefits against phishing attacks. The analysis, forensics, and archival of phishing attacks to the website are currently powered by Tumbleweed Communications' Message Protection Lab. The APWG, a 51c6 tax-exempted corporation, was founded by Tumbleweed Communications and a number of member banks, financial services institutions, and e-commerce providers. It held its first meeting in November 23 in San Francisco and in June 24 was incorporated as an independent corporation controlled by its steering committee, its board and its executives.