Anti-Phishing Working Group

Similar documents
Phishing Activity Trends Report October, 2004

Phishing Activity Trends Report January, 2005

The Rise of Phishing. Dave Brunswick Tumbleweed Communications Anti-Phishing Working Group

Phishing Activity Trends Report March, 2005

Phishing Activity Trends Report November, 2004

Phishing Activity Trends Report August, 2005

Phishing Activity Trends Report August, 2006

Phishing Activity Trends

Phishing Activity Trends

Phishing Activity Trends

Phishing Activity Trends

Bank of america report phishing

FAQ. Usually appear to be sent from official address

Phishing Activity Trends Report. 3 rd Quarter Committed to Wiping Out Internet Scams and Fraud

CE Advanced Network Security Phishing I

4 th Quarter Phishing Activity Trends Report. Unifying the Global Response To Cybercrime. Activity October December 2017.

Phishing Activity Trends Report. 4 th Quarter Unifying the. Global Response To Cybercrime. October December 2012

Korea Phishing Activity Trends Report

Custom Plugin A Solution to Phishing and Pharming Attacks

How to prevent phishing attacks? In 3 Pages. Author: Soroush Dalili irsdl {4t[ yahoo }d0t] com Website: Soroush.SecProject.

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015

NOT PROTECTIVELY MARKED PHISHING. July 2016

Phishing Activity Trends Report. 4 th Quarter Committed to Wiping Out Internet Scams and Fraud

3.5 SECURITY. How can you reduce the risk of getting a virus?

JPCERT/CC Incident Handling Report [January 1, March 31, 2018]

How to recognize phishing s

Evolution of Spear Phishing. White Paper

RSA FRAUDACTION ANTI-PHISHING SERVICE: BENEFITS OF A COMPREHENSIVE MITIGATION STRATEGY

Security & Phishing

DMARC Continuing to enable trust between brand owners and receivers

Issues in Using DNS Whois Data for Phishing Site Take Down

IMPORTANT SECURITY INFORMATION PHISHING

Comptia RC CompTIA Security+ Recertification Exam. For More Information Visit link below: Version = Product

Phishing: Don t Phall Phor It Part 1

Phishing Activity Trends Report. 3 rd Quarter Unifying the. Global Response To Cybercrime. July September 2012

Anti-Phishing Working Group

Best Practices Guide to Electronic Banking

August 2009 Report #22

Unique Phishing Attacks (2008 vs in thousands)

Phishing Read Behind The Lines

Your security on click Jobs

Report on Spamvertising and Phishing using.hk Domain Names and McAfee Report. ccnso Meeting June 24, 2008

ELECTRONIC BANKING & ONLINE AUTHENTICATION

2014 INTERNET COMMERCE CASE STUDY. The Battle Against Phishing and Fraudulent s. 100 S. Ellsworth Ave 4th Floor San Mateo, CA

Countermeasures against Mobile spam

JPCERT/CC Incident Handling Report [October 1, 2015 December 31, 2015]

WHAT IS CORPORATE ACCOUNT TAKEOVER? HOW DOES IT HAPPEN?

Introduction. Logging in. WebQuarantine User Guide

06CS051. Server Side Support for SiteWatcher, an Antiphishing Software

Frauds & Scams. Why is the Internet so attractive to scam artists? 2006 Internet Fraud Trends. Fake Checks. Nigerian Scam

A Lightweight Framework for Detection and Resolution for Phishing, Pharming and Spoofing

June 2012 First Data PCI RAPID COMPLY SM Solution

Symantec Intelligence Quarterly: Best Practices and Methodologies October - December, 2009

DoD Spear-Phishing Awareness Training. Joint Task Force - Global Network Operations

Monthly SEO Report. Example Client 16 November 2012 Scott Lawson. Date. Prepared by

Fighting Phishing I: Get phish or die tryin.

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts

A STUDY OF TWO-FACTOR AUTHENTICATION AGAINST ON-LINE IDENTITY THEFT

Caribbean Cyber Security: Not Only Government s Responsibility

IT Security Update on Practical Risk Mitigation Strategies

FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS?

Spring Brandjacking Index

A practical guide to IT security

IT Security Protecting Ourselves From Phishing Attempts. Ray Copeland Chief Information Officer (CIO)

The State of Spam A Monthly Report June Generated by Symantec Messaging and Web Security

IT Security Update on Practical Risk Mitigation Strategies

DIGITAL FORENSICS. We Place Digital Evidence at Your Fingertips. Cyanre is South Africa's leading provider of computer and digital forensic services

Identity Theft, Phishing and Pharming: Accountability & Responsibilities. OWASP AppSec DC October The OWASP Foundation

Identity Theft, Fraud & You. PrePare. Protect. Prevent.

How Enterprise Tackles Phishing. Nelson Yuen Technology Manager, Cybersecurity Microsoft Hong Kong

Wire Fraud Begins to Hammer the Construction Industry

Electronic Identity Theft and Basic Security

SANS/REN-ISAC Partnership

States, Companies Begin to Can Spam

Designing a Software that Detect and Block Phishing Attacks

Phishing. What do phishing s do?

Train employees to avoid inadvertent cyber security breaches

Botnets: major players in the shadows. Author Sébastien GOUTAL Chief Science Officer

Maintaining Trust: Visa Inc. Payment Security Strategy

1 of 11 10/1/ :26 AM

REPORT. Year In Review. proofpoint.com

An Empirical Analysis of Phishing Attack and Defense

December 2009 Report #26

Updates on Sharing Threat Data, Security Awareness and Policy Efforts to Fight Cybercrime

Us bank phishing letter. Us bank phishing letter

Webroot Phishing Threat Trends

Identity Theft Prevention Program. Effective beginning August 1, 2009

Protect Yourself From. Identify Theft

Phishing: When is the Enemy

October 2009 Report #24

A REVIEW PAPER ON PHISHING A GROWING SCAM

IPS with isensor sees, identifies and blocks more malicious traffic than other IPS solutions

Target Breach Overview

NEVIS Smart Solutions against sophisticated attackers

Today s Presentation. Define phishing Explain phishing techniques Examples of phishing Statistics about phishing Defense against Dark Arts Resources

Office of the City Auditor 2014 Third Quarter Activity Report November 25, 2014

Web Cash Fraud Prevention Best Practices

Phishing. Eugene Davis UAH Information Security Club April 11, 2013

Client-side defenses against web-based identity theft

Automating Security Response based on Internet Reputation

Transcription:

Phishing Attack Trends Report April, 2004 Phishing attacks use spoofed e-mails and fraudulent websites designed to fool recipients into divulging personal financial data such as credit card numbers, account usernames and passwords, social security numbers, etc. By hijacking the trusted brands of well-known banks, online retailers and credit card companies, data suggests that phishers are able to convince up to 5% of recipients to respond to them. The result of these scams is that consumers suffer credit card fraud, identity theft, and financial loss. The Phishing Attack Trends Report analyzes phishing attacks reported to the via the organization s website, http://www.antiphishing.org or email submission via reportphishing@antiphishing.org. The Anti- Phishing Working Group phishing attack repository is the Internet s most comprehensive archive of email fraud and phishing attacks. Highlights Number of unique phishing attacks reported in April: 1125 Average number of unique phishing attacks per day reported in April: 37.5 Organization most targeted by phishing attacks in April: Citibank, 475 attacks Business sector most targeted by phishing attacks in April: Financial Services The Phishing Attack Trends Report is published monthly by the, an industry association focused on eliminating the identity theft and fraud that result from the growing problem of phishing and email spoofing. For further information, please contact Dan Maier at dmaier@antiphishing.org or +1 650-216-2078. Analysis for the Phishing Attack Trends Report has been donated by the Tumbleweed Communications Message Protection Lab. The mission of the Tumbleweed Message Protection Lab is to analyze enterprise email threats (e.g. spam, email fraud, viruses, etc) and design new email protection technologies.

Email Phishing Attack Trends In April, there were 1125 new, unique phishing attacks reported to the. This was a 180% increase over the number of attacks reported in March (402). The average number of phishing attacks per day grew significantly in April to 37.5 (from 13.0 in March). Analyzing this information on a weekly basis shows two weeks that averaged almost 40 attacks per day, and weekly volumes consistently over 200 attacks per week. This marks a huge increase in the volume of phishing attacks. Who Is Being Targeted By Phishing Attacks? Most-Targeted Companies Unique Phishing Attacks by Targeted Company In April, Citibank was barraged by an average of almost 16 phishing attacks per day. The 475 attacks targeted at Citibank, representing a 385% increase from March, exceeded the total attacks reported against all organizations for the prior month (402). ebay and Paypal were the second and third most targeted companies respectively, with the volume of attacks against each of these organizations doubling from the prior month. It is noteworthy that 15 of the top 20 targeted organizations are financial services organizations, with 3 ISPs and 2 others rounding out the mix. Phish Target Apr-04 Mar-04 Feb-04 Jan-04 Dec-03 Nov-03 Citibank 475 98 58 34 17 1 ebay 221 110 104 51 33 6 Paypal 135 63 42 10 16 6 US Bank 62 4 0 2 0 0 Barclays 31 11 6 1 1 0 Fleet Bank 28 23 9 2 1 0 Earthlink 18 5 8 9 6 4 Westpac 17 10 0 3 1 2 Lloyds 15 4 0 1 1 0 AOL 9 10 10 35 4 0 SBC 9 1 0 0 0 0 ANZ 7 4 0 0 3 0 FDIC 7 0 2 2 0 0 Halifax 6 1 0 1 0 0 National Bank 6 0 0 0 0 0 NatWest 6 2 0 0 1 0 E-Gold 5 2 2 0 2 0 Suntrust Bank 5 1 0 0 0 0 Bank One 4 5 0 0 1 0 Microsoft 4 5 1 6 0 0

With 6 months of data available for analysis, it is interesting to look at the trends for overall phishing attacks, as well as the top 3 targeted companies. Overall, unique phishing attacks reported to the APWG have been growing at 110% per month, from 28 originally reported in November 2003 to 1125 reported in April 2004. This represents a 40X growth over the past six months, or almost 4000%. And it is quite clear that Citibank, ebay and Paypal are favorite targets of phishers attacks against these organizations have shown a monthly growth rate of 250%, 105%, and 85% respectively. Most-Targeted Industry Sectors The most targeted industry sector for phishing attacks continues to be Financial Services, from the perspective of total attacks as well as number of companies targeted. The Retail sector (primarily ebay) continues to follow, although there are significantly fewer retailers targeted. The Financial Services sector averaged almost 35 reported phishing attacks per company in April, although this number is significantly skewed by Citibank receiving 475 of the attacks.

APWG THREAT ADVISORY ALERT Browser Web Address Spoofed Using Floating Window In a new twist on a recently identified phishing attack technique, phishers are putting floating windows over the Address Bar in a Web browser to fool people into thinking they are on a legitimate site. It works like this: once the link to the phisher s site is clicked, a perfectly branded Web page is opened. But to complete the scam, the phisher needs to disguise the Web address so that the victim will be fooled into thinking he/she is on a legitimate site. To do this, the phisher has developed some Javascript that draws a window showing a legitimate address above the victim s Internet Explorer Web Address bar (see below). Upon closer inspection of the Web Address bar (see below), it is clear that this replacement is not perfect it overlaps the address bar frame slightly. Unfortunately, it is quite adequate to fool most people who tend to see what they expect on a cursory glance at the Web Address bar. Also note that, although the address bar is covered, the status bar remains correct. When clicking 'next' on the first page, one could notice the 'loading http://validation-required.info/...' message in the status bar. After the victim clic ks 'next' on the first page, the second phish page loads. It is here that the phish demands the personal information from the victim.

About the The (APWG) is an industry association focused on eliminating the identity theft and fraud that result from the growing problem of phishing and email spoofing. The organization provides a forum to discuss phishing issues, define the scope of the phishing problem in terms of hard and soft costs, and share information and best practices for eliminating the problem. Where appropriate, the APWG will also look to share this information with law enforcement. Membership is open to qualified financial institutions, online retailers, ISPs, the law enforcement community, and solutions providers. There are currently over 200 member organizations participating in the APWG. Note that because phishing attacks and email fraud are sensitive subjects for many organizations that do business online, the APWG has a policy of maintaining the confidentiality of member organizations. The Web site of the is http://www.antiphishing.org. It serves as a public and indus try resource for information about the problem of phishing and email fraud, including identification and promotion of pragmatic technical solutions that can provide immediate protection and benefits against phishing attacks. The analysis, forensics, and archival of phishing attacks to the Web site are currently powered by Tumbleweed Communications' Message Protection Lab. The APWG was founded by Tumbleweed Communications and a number of member banks, financial services institutions, and e-commerce providers. It held its first meeting in November 2003 in San Francisco.