Attacks/Breaches
6/26/2013
01:33 PM
50%
50%

Phishing Attackers Diversify, Target Facebook Credentials

FBI warns of surge in spear-phishing attacks, says criminals seek more than bank credentials.

The FBI issued a warning Tuesday to consumers to beware a surge in spear-phishing attacks aimed at stealing intellectual property, financial credentials and personal information, often for the purposes of faking someone's identity. Separately, a security firm warned that in the past year, the volume of phishing attacks more than tripled.

Increasingly, fake -- but often real-looking -- phishing emails come personalized. "Often, the e-mails contain accurate information about victims obtained via a previous intrusion or from data posted on social networking sites, blogs, or other websites," said the bureau's warning. "This information adds a veneer of legitimacy to the message, increasing the chances the victims will open the email and respond as directed."

Internet users today are much more likely to encounter a phishing website than even just two years ago. According to Google's Transparency Report, as of June 9 the search service detected 108,225 phishing sites, up from the 9,264 it detected on May 23, 2010.

[ Mozilla plans to start blocking some tracking cookies in its Firefox browser. Read more: Firefox Advances Do Not Track Technology. ]

Spear-phishing awareness campaigns notwithstanding, the attacks are notoriously difficult for businesses to block. Victims have included security firm RSA, the White House and numerous defense contractors.

As the quantity of attacks has increased, so has the list of targeted data. Historically, many phishing attacks launched for criminal purposes have focused on stealing financial details from consumers and businesses so that gangs could drain money from bank accounts. But today, just 20% of all phishing attacks were disguised to look like they've come from a legitimate financial services organization, according to Kaspersky Lab's recently released report, "The Evolution of Phishing Attacks."

Kaspersky Lab's report is based on data gathered anonymously -- between May 1, 2012, and April 30, 2013 -- from 50 million individual Windows users. Comparing data gathered in that timeframe to the prior 12 months, the security firm found that the number of distinct phishing attack sources tripled, and that 87% more people were targeted than before.

Of all the sites emulated by attackers, 30% were search and email services, followed by social networks (20%), banks and financial institutions (12%), IT company sites (8%), gaming sites (7%), online shopping and auction (7%) and payment services (6%). In the United States, the site most often emulated by phishing attackers was Yahoo, followed by Facebook, Google, Amazon.com, Wow-Europe, Microsoft, AOL, American Express, an unnamed bank and Twitter.

According to the study, the people most often targeted by phishing attacks resided in Russia, the United States, India, Vietnam and the United Kingdom. Meanwhile, the majority of phishing attacks were launched from the United States, followed by the United Kingdom, Germany, Russia and India.

The FBI recommends that anyone who falls victim to a phishing attack file a complaint with its Internet Crime Complaint Center.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6501
Published: 2015-03-30
The default soap.wsdl_cache_dir setting in (1) php.ini-production and (2) php.ini-development in PHP through 5.6.7 specifies the /tmp directory, which makes it easier for local users to conduct WSDL injection attacks by creating a file under /tmp with a predictable filename that is used by the get_s...

CVE-2014-9209
Published: 2015-03-30
Untrusted search path vulnerability in the Clean Utility application in Rockwell Automation FactoryTalk Services Platform before 2.71.00 and FactoryTalk View Studio 8.00.00 and earlier allows local users to gain privileges via a Trojan horse DLL in an unspecified directory.

CVE-2014-9652
Published: 2015-03-30
The mconvert function in softmagic.c in file before 5.21, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not properly handle a certain string-length field during a copy of a truncated version of a Pascal string, which might allow remote atta...

CVE-2014-9653
Published: 2015-03-30
readelf.c in file before 5.22, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not consider that pread calls sometimes read only a subset of the available data, which allows remote attackers to cause a denial of service (uninitialized memory ...

CVE-2014-9705
Published: 2015-03-30
Heap-based buffer overflow in the enchant_broker_request_dict function in ext/enchant/enchant.c in PHP before 5.4.38, 5.5.x before 5.5.22, and 5.6.x before 5.6.6 allows remote attackers to execute arbitrary code via vectors that trigger creation of multiple dictionaries.

Dark Reading Radio
Archived Dark Reading Radio
Good hackers--aka security researchers--are worried about the possible legal and professional ramifications of President Obama's new proposed crackdown on cyber criminals.