Phishing Activity Trends Report August, 2005

Similar documents
Phishing Activity Trends Report August, 2006

Phishing Activity Trends

Phishing Activity Trends

Phishing Activity Trends

Phishing Activity Trends

Phishing Activity Trends Report January, 2005

Phishing Activity Trends Report March, 2005

Phishing Activity Trends Report October, 2004

Phishing Activity Trends Report November, 2004

Phishing Activity Trends Report. 3 rd Quarter Committed to Wiping Out Internet Scams and Fraud

Phishing Activity Trends Report. 4 th Quarter Unifying the. Global Response To Cybercrime. October December 2012

Phishing Activity Trends Report. 4 th Quarter Committed to Wiping Out Internet Scams and Fraud

Anti-Phishing Working Group

Phishing Activity Trends Report. 3 rd Quarter Unifying the. Global Response To Cybercrime. July September 2012

4 th Quarter Phishing Activity Trends Report. Unifying the Global Response To Cybercrime. Activity October December 2017.

Korea Phishing Activity Trends Report

Phishing Read Behind The Lines

CE Advanced Network Security Phishing I

Anti-Phishing Working Group

August 2009 Report #22

GLOBAL MOBILE PAYMENT METHODS: FIRST HALF 2016

Internet Security Threat Report Volume XIII. Patrick Martin Senior Product Manager Symantec Security Response October, 2008

The Rise of Phishing. Dave Brunswick Tumbleweed Communications Anti-Phishing Working Group

October 2009 Report #24

What can we lose not implementing proper security in our IT environment? Aleksandar Pavlovic Security Account Manager Cisco

RSA FRAUDACTION ANTI-PHISHING SERVICE: BENEFITS OF A COMPREHENSIVE MITIGATION STRATEGY

December 2009 Report #26

Security & Phishing

JPCERT/CC Incident Handling Report [October 1, 2015 December 31, 2015]

Mapping the Frontiers of the Electronic Crime Threat From Consumers' Desktops to National Equities Markets

JPCERT/CC Incident Handling Report [January 1, March 31, 2018]

More information from: dry-cleaning-and-laundry-services-global-marketreport-2018-including

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015

The State of Spam A Monthly Report June Generated by Symantec Messaging and Web Security

Issues in Using DNS Whois Data for Phishing Site Take Down

The State of Spam A Monthly Report August Generated by Symantec Messaging and Web Security

Bank of america report phishing

REPORT. proofpoint.com

Protecting Against Online Fraud. F5 EMEA Webinar August 2014

Be certain. MessageLabs Intelligence: May 2006

Panda Security 2010 Page 1

ELECTRONIC BANKING & ONLINE AUTHENTICATION

CYBERTECH MIDWEST Indianapolis, Indiana

DMARC Continuing to enable trust between brand owners and receivers

Cyber Threat Intelligence Report

Unique Phishing Attacks (2008 vs in thousands)

IATF Stakeholder Conference

How to prevent phishing attacks? In 3 Pages. Author: Soroush Dalili irsdl {4t[ yahoo }d0t] com Website: Soroush.SecProject.

Webroot Phishing Threat Trends

Mobile App Development Market Research Report- Global Forecast to 2022

Whitepaper on AuthShield Two Factor Authentication with SAP

AdMob Mobile Metrics. Metrics Highlights. May 2010

The Cost of Denial-of-Services Attacks

2014 INTERNET COMMERCE CASE STUDY. The Battle Against Phishing and Fraudulent s. 100 S. Ellsworth Ave 4th Floor San Mateo, CA

Second International Barometer of Security in SMBs

GLOBAL ENCRYPTION TRENDS STUDY

Digital Forensics - Global Market Outlook ( )

Conducted by Vanson Bourne Research

SYMANTEC ENTERPRISE SECURITY. Symantec Internet Security Threat Report September 2005 Power and Energy Industry Data Sheet

Japan s Measures against Spam

Updates on Sharing Threat Data, Security Awareness and Policy Efforts to Fight Cybercrime

Custom Plugin A Solution to Phishing and Pharming Attacks

Prolexic Attack Report Q4 2011

Spam Evolution Report: October 2009

Best Practices Guide to Electronic Banking

McAfee Labs Threat Report

Third Annual Green IT & Sustainability Survey: U.S. Results and Services Implications

New Zealand National Cyber Security Centre Incident Summary

Domain Name Industry Drivers

Evolution of Spear Phishing. White Paper

The situation of threats in cyberspace in the first half of 2018

Data Loss Prevention - Global Market Outlook ( )

Fraud Mobility: Exploitation Patterns and Insights

Botnets: major players in the shadows. Author Sébastien GOUTAL Chief Science Officer

NEVIS Smart Solutions against sophisticated attackers

KASPERSKY FRAUD PREVENTION FOR ENDPOINTS

ITU Regional Cybersecurity Forum for Asia-Pacific

1 of 11 10/1/ :26 AM

FAQ. Usually appear to be sent from official address

Wick Hill Group, River Court, Albert Drive, Woking, Surrey, GU21 5RP

Registry Internet Safety Group (RISG)

Web Application Threat Trend Report

Computer

CompTIA Security Research Study Trends and Observations on Organizational Security. Carol Balkcom, Product Manager, Security+

Top 10 Global Threat Rank by Source

MRG Effitas Online Banking Browser Security Assessment Project Q Q1 2014

Status of the ISO-STEP Initiative for CGNS-Based Fluid Dynamics Standard

The Cyber War on Small Business

Ministry of Government and Consumer Services. ServiceOntario. Figure 1: Summary Status of Actions Recommended in June 2016 Committee Report

CYBER SECURITY OPERATION CENTER

Supplier Responding to New Products RFP Event

Spring Brandjacking Index

EBOOK. Stopping Fraud. How Proofpoint Helps Protect Your Organization from Impostors, Phishers and Other Non-Malware Threats.

MARKET NEWSLETTER No 69 February 2013

Designing a Software that Detect and Block Phishing Attacks

Site Data Protection (SDP) Program Update

Methodology USA UK AUSTRALIA CANADA JAPAN N=1,008 MOE=+/-3% N=1,044 MOE=+/- 3% N=1,028 MOE=+/- 3% N=1,025 MOE=+/- 3% N=1,005 MOE=+/- 3%

Mitel for Microsoft Dynamics CRM Client V5 Release Notes

Understanding the Changing Cybersecurity Problem

State of Mobile Commerce. Q

Transcription:

Phishing Activity Trends Report August, 25 Phishing is a form of online identity theft that employs both social engineering and technical subterfuge to steal consumers' personal identity data and financial account credentials. Social-engineering schemes use 'spoofed' e- mails to lead consumers to counterfeit websites designed to trick recipients into divulging financial data such as account usernames and passwords. Hijacking brand names of banks, e-retailers and credit card companies, phishers often convince recipients to respond. Technical subterfuge schemes plant crimeware onto PCs to steal credentials directly, often using key logging systems to intercept consumers online account user names and passwords. The monthly Phishing Activity Trends Report analyzes phishing attacks reported to the (APWG) via the organization s website at http://www.antiphishing.org or email submission to reportphishing@antiphishing.org. The APWG phishing attack repository is the Internet s most comprehensive archive of email fraud and phishing activity. The APWG additionally measures the evolution, proliferation and propagation of crimeware drawing from the independent research of our member companies. In the second half of this report are tabulations of crimeware statistics and reportage on specific criminal software detected by our member researchers. Highlights Number of unique phishing reports received in August: 13776 Number of unique phishing sites received in August: 5259 Number of brands hijacked by phishing campaigns in August: 84 Number of brands comprising the top 8% of phishing campaigns in August: 3 Country hosting the most phishing websites in August: United States Contain some form of target name in URL: 49 % No hostname just IP address: 36 % Percentage of sites not using port 8: 6 % Average time online for site: 5.5 days Longest time online for site: 31 days Methodology APWG is continuing to refine and develop its tracking and reporting methodology. We have recently re-instated the tracking and reporting of unique phishing reports (email campaigns) in addition to unique phishing sites. An email campaign is a unique email sent out to multiple users, directing them to a specific phishing web site, (multiple campaigns may point to the same web site). APWG counts unique phishing report emails as those in a given month with the same subject line in the email. APWG also tracks the number of unique phishing websites. This is now determined by unique base URLs of the phishing sites. APWG is also tracking crimeware instances (unique software applications as determined by MD5 hash of the crimeware sample) as well as unique sties that are distributing crimeware (typically via browser drive-by exploits).

Phishing Email Reports And Phishing Site Trends The total number of unique phishing reports submitted to APWG in August 25 was 13,776. This is a slight reduction from the 14,135 reported in July. Keep in mind, this is a count of unique phishing email reports. Phishing Reports Received October-August 16 12 8 6957 12845 13468 14411 14987 155 14135 13776 12883 8975 8829 4 October December February April April June June August August It is important to note that the number of unique phishing websites detected by APWG was 5,259 in August 25, the highest number. This may reflect an increasing tendency for phishers to target a diverse group of smaller brands, and also an increased use of multiple sites to host a single attack, in order to increase their resiliency to takedown efforts. New Phishing Sites by Month October-August 6 5 4 3 256 2625 287 2854 3326 428 4564 5259 2 1 1142 1518 177 October November December January February March April April May May June June July July August The Phishing Attack Trends Report is published monthly by the, an industry association focused on eliminating the identity theft and fraud that result from the growing problem of phishing and email spoofing. For further information, please contact Ronnie Manning at rmanning@websense.com or 858.32.9274 or APWG Secretary General Peter Cassidy at 617.669.1123. Analysis for the Phishing Attack Trends Report has been donated by the following companies:

Top Used Ports Hosting Phishing Data Collection Servers August saw a continuation of a trend of using look-alike cousin domain names to host phishing sites. Consequently, the use of alternate ports has decreased and the standard HTTP port 8 rose to 94.7% of all phishing sites reported. Port 4443 (2.63%) Port 68 (1.43%) 7 other ports < 2% (1.9%) Port 8 (94.7%) Brands and Legitimate Entities Hijacked By Email Phishing Attacks Number of Reported Brands In August, the number of reportedly phished brands rose to 84. APWG is seeing a wide diversity of brands being spoofed, very small financial institutions all over North America and Western Europe are steadily appearing. There is an increasing number of ISP phishing attacks, attempting to trick consumers into divulging credit card information and other personal information based on the guise that their Internet Service is going to be terminated. As with July, we saw an insurance company being spoofed. 16 12 8 4 January 64 69 February Hijacked Brands by Month January-August March 79 79 April May 17 June 74 71 July August 84 Most Targeted Industry Sectors Financial Services continue to be the most targeted industry sector staying steady at nearly 85% of all attacks. APWG received several reports during the month of August by legitimate companies who had somehow been identified as hosting phishing sites. In one case, the consumers could not reach the company's website because access was being blocked by an anti-phishing toolbar. In another case, a domain name registrar had seized the domain name and disabled it in the DNS. This highlights the need for caution and strict verification that a site is indeed fraudulent before being added to anti-phishing blacklists or having a domain name registrar take action. Retail (2.4%) Financial Services (84.5%) ISP (8.3%) Miscellaneous (4.8%)

Web Phishing Attack Trends Countries Hosting Phishing Sites In August, Websense Security Labs saw a continuation of the top three countries hosing phishing websites, with China and the Republic of Korea switching order. The United States remains the on the top of the list with 27.9%, with the top 1 breakdown as follows; China: 12.15%, Republic of Korea: 9.6%, France: 4.7%, Japan: 3.65%, Germany: 3.23%, Australia: 3.5%, Russia: 2.4%, Canada: 2.21%, Sweden: 2.4% Top 1 Phishing Sites Hosting Countries Republic of Korea France Japan Germany China Australia Russia Canada Sweden United States

PROJECT: Crimeware Crimeware Taxonomy & Classification Details PROJECT: Crimeware categorizes crimeware attacks as follows, though the taxonomy will grow as variations in attack code are spawned: Phishing-based Trojans - Keyloggers During the month of August, Websense Security Labs have witnessed a slight decrease in the number of variants of keyloggers, but a steady increase of password stealing malicious code URLs. Phishing-based Trojans Keyloggers, Unique Variants Password Stealing Malicious Code Unique Applications 2 15 154 174 168 1 77 79 5 April May June July August

Phishing-based Trojans Keyloggers, Unique Websites Hosting Keyloggers Password Stealing Malicious Code URLs 12 1 8 6 4 2 918 958 495 526 26 April May June July August Phishing-based Trojans & Downloader s Hosting Countries (by IP address) The chart below represents a breakdown of the websites which were classified during August as hosting malicious code in the form of either a phishing-based keylogger or a Trojan downloader which downloads a keylogger. The United States is still the top geographic location with 4%, Brazil continues to maintain second with 15%, growing from 11% last month. The largest jump this month came from Spain more than doubling from 5.4% last month to almost 12.5% in August. The rest of the breakdown was as follows; China 7.82%, Korea 3.9%, United Kingdom 3.6%, Russia 3.5%, Germany 1.5%, Romania 1.38%, Italy 1.38% Phishing Based Keylogger and Trojan Downloaders by Hosting Country Spain China Brazil Korea UK UK Russia Germany Romania Italy Italy United States

Phishing Research Contributors d MarkMonitor PandaLabs Websense Security Labs MarkMonitor is the global leader in delivering comprehensive online corporate identity protection services, with a focus on making the Internet safe for online transactions. PandaLabs is an international network of research and technical support centers devoted to protecting users against malware. Websense Security Labs mission is to discover, investigate, and report on advanced Internet threats to protect employee computing environments. For media inquiries please contact Ronnie Manning at rmanning@websense.com or 858.32.9274 or Peter Cassidy, APWG Secretary General at 617.669.1123. About the The (APWG) is an industry association focused on eliminating the identity theft and fraud that result from the growing problem of phishing and email spoofing. The organization provides a forum to discuss phishing issues, define the scope of the phishing problem in terms of hard and soft costs, and share information and best practices for eliminating the problem. Where appropriate, the APWG will also look to share this information with law enforcement. Membership is open to qualified financial institutions, online retailers, ISPs, the law enforcement community, and solutions providers. There are more than 13 companies and government agencies participating in the APWG and more than 19 members. Note that because phishing attacks and email fraud are sensitive subjects for many organizations that do business online, the APWG has a policy of maintaining the confidentiality of member organizations. The website of the is http://www.antiphishing.org. It serves as a public and industry resource for information about the problem of phishing and email fraud, including identification and promotion of pragmatic technical solutions that can provide immediate protection and benefits against phishing attacks. The analysis, forensics, and archival of phishing attacks to the website are currently powered by Tumbleweed Communications' Message Protection Lab. The APWG was founded by Tumbleweed Communications and a number of member banks, financial services institutions, and e-commerce providers. It held its first meeting in November 23 in San Francisco and in June 24 was incorporated as an independent corporation controlled by its steering committee, its board and its executives.