06:45 PM
Dark Reading
Dark Reading
Products and Releases

Facebook Sites Dominate Social Network Phishing in Q1 2018: Kaspersky Lab

The findings come from Kaspersky Lab's new 'Spam and Phishing in Q1 2018' report.

Woburn, MA – May 23, 2018 – In the first quarter of 2018, Kaspersky Lab’s anti-phishing technologies prevented more than 3.7 million attempts to visit fraudulent social network pages, of which 60 percent were fake Facebook pages, according to Kaspersky Lab’s ‘Spam and Phishing in Q1 2018’ report.

Social network phishing is a form of cybercrime that involves the theft of personal data from a victim’s social network account. The fraudster creates a copy of a social networking website (such as a fake Facebook page), and tries to lure unsuspecting victims to it, forcing them to give up their personal data – such as their name, password, credit card number, PIN code and more – in the process.

At the beginning of the year, Facebook was the most popular social networking brand for fraudsters to abuse, and Facebook pages were frequently faked by cybercriminals to try and steal personal data via phishing attacks. This is part of a long-term trend: in 2017, Facebook became one of the top three targets for phishing overall, at nearly 8 percent, followed by Microsoft Corporation (6 percent) and PayPal (5 percent). In Q1 2018, Facebook also led the social network phishing category, followed by VK, a Russian online social networking service, and LinkedIn. The reason for this is likely to be the 2.13 billion active monthly Facebook users worldwide, including those who log in to unknown apps using their Facebook credentials, thereby granting access to their accounts. This makes unwary Facebook users a profitable target for cybercriminal phishing attacks.

The distribution of different types of social network phishing detected by Kaspersky Lab in Q1 2018

These findings reinforce the fact that personal data is valuable in the world of information technology, both for legitimate organizations and attackers. Cybercriminals are constantly searching for new methods to attack users, so it’s important to be aware of fraudster techniques to avoid becoming the next target. For example, a recent trend is the increase of spam emails related to GDPR, Europe’s General Data Protection Regulation. Examples include offers of paid webinars to clarify the new legislation or invitations to install special software that provides access to online resources to ensure compliance with the new rules.

“The continuous increase in phishing attacks - targeting both social networks and financial organizations - shows us that users need to pay more serious attention to their online activities,” said Nadezhda Demidova, lead web content analyst, Kaspersky Lab. “Despite the recent global scandals, people continue to click on unsafe links and allow unknown apps to access their personal data. Due to this lack of user vigilance, the data on a huge number of accounts gets lost or extorted from users. This can then lead to destructive attacks and a constant flow of money for the cybercriminals.”

Kaspersky Lab experts advise users to take the following measures to protect themselves from phishing:

  • Always check the link address and the sender’s email before clicking anything. Don’t click the link, but type it into your browser’s address line instead.
  • Before clicking any link, check if the link address shown is the same as the actual hyperlink (the real address the link will take you to) – this can be checked by hovering your mouse over the link.
  • Only use a secure connection, especially when you visit sensitive websites. As a precaution, do not use unknown or public Wi-Fi without password protection. For maximum protection, use VPN solutions that encrypt your traffic. Remember: if you are using an insecure connection, cybercriminals can invisibly redirect you to phishing pages.
  • Check the HTTPS connection and domain name when you open a webpage. This is especially important when you are using websites which contain sensitive data, such as sites for online banking, shopping, email, social media sites, etc.
  • Never share your sensitive data, such as passwords, bank card data and more, with a third party. Official companies will never ask for this type of data via email.
  • Use a reliable security solution with behavior-based anti-phishing technologies, such as Kaspersky Total Security, to detect and block spam and phishing attacks.


Other key findings in the report include:


  • The main targets of phishing attacks have remained the same since the end of last year. They are primarily global Internet portals and the financial sector, including banks, payment services and online stores.
  • About $35,000 was stolen through one phishing site that appeared to offer the opportunity to invest in the rumored Telegram ICO. Approximately $84,000 was stolen following a single phishing email mailshot related to the launch of ‘The Bee Token’ ICO.
  • Financial phishing continues to account for almost half of all phishing attacks (43.9 percent), which is 4.4 percent more compared to the end of last year. Attacks against banks, e-shops and payment systems remain the top three targets, demonstrating cybercriminals’ desire to access users’ money.
  • Brazil was the country with the largest share of users attacked by phishers in the first quarter of 2018 (19 percent). It was followed by Argentina (13 percent), Venezuela (13 percent), Albania (13 percent) and Bolivia (12 percent).


  • In the first quarter of 2018, the amount of spam peaked in January (55 percent). The average share of spam in the world’s email traffic was 52 percent, which is 4.6 percent lower than the average figure of the last quarter of 2017.
  • Vietnam became the most popular source of spam, overtaking the U.S. and China. Others in the top 10 included India, Germany, France, Brazil, Russia, Spain and the Islamic Republic of Iran.
  • The country most targeted by malicious mailshots was Germany. Russia came second, followed by United Kingdom, Italy and the UAE.

To learn more about spam and phishing in Q1 2018, read our blogpost on

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 contains hardcoded credentials in the WCF service on port 9003. An authenticated remote attacker can use these credentials to access the badge system database and modify its contents.
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 stores user credentials and other sensitive information with a known weak encryption method (MD5 hash of a salt and password).
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 stores backup files as encrypted zip files. The password to the zip is hard-coded and unchangeable. An attacker with access to these backups can decrypt them and obtain sensitive data.
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 database uses default credentials. Users are unable to change the credentials without vendor intervention.
PUBLISHED: 2019-01-18
Crestron AM-100 before firmware version contains an authentication bypass in the web interface's return.cgi script. Unauthenticated remote users can use the bypass to access some administrator functionality such as configuring update sources and rebooting the device.