Attacks/Breaches
6/26/2013
01:33 PM
50%
50%

Phishing Attackers Diversify, Target Facebook Credentials

FBI warns of surge in spear-phishing attacks, says criminals seek more than bank credentials.

The FBI issued a warning Tuesday to consumers to beware a surge in spear-phishing attacks aimed at stealing intellectual property, financial credentials and personal information, often for the purposes of faking someone's identity. Separately, a security firm warned that in the past year, the volume of phishing attacks more than tripled.

Increasingly, fake -- but often real-looking -- phishing emails come personalized. "Often, the e-mails contain accurate information about victims obtained via a previous intrusion or from data posted on social networking sites, blogs, or other websites," said the bureau's warning. "This information adds a veneer of legitimacy to the message, increasing the chances the victims will open the email and respond as directed."

Internet users today are much more likely to encounter a phishing website than even just two years ago. According to Google's Transparency Report, as of June 9 the search service detected 108,225 phishing sites, up from the 9,264 it detected on May 23, 2010.

[ Mozilla plans to start blocking some tracking cookies in its Firefox browser. Read more: Firefox Advances Do Not Track Technology. ]

Spear-phishing awareness campaigns notwithstanding, the attacks are notoriously difficult for businesses to block. Victims have included security firm RSA, the White House and numerous defense contractors.

As the quantity of attacks has increased, so has the list of targeted data. Historically, many phishing attacks launched for criminal purposes have focused on stealing financial details from consumers and businesses so that gangs could drain money from bank accounts. But today, just 20% of all phishing attacks were disguised to look like they've come from a legitimate financial services organization, according to Kaspersky Lab's recently released report, "The Evolution of Phishing Attacks."

Kaspersky Lab's report is based on data gathered anonymously -- between May 1, 2012, and April 30, 2013 -- from 50 million individual Windows users. Comparing data gathered in that timeframe to the prior 12 months, the security firm found that the number of distinct phishing attack sources tripled, and that 87% more people were targeted than before.

Of all the sites emulated by attackers, 30% were search and email services, followed by social networks (20%), banks and financial institutions (12%), IT company sites (8%), gaming sites (7%), online shopping and auction (7%) and payment services (6%). In the United States, the site most often emulated by phishing attackers was Yahoo, followed by Facebook, Google, Amazon.com, Wow-Europe, Microsoft, AOL, American Express, an unnamed bank and Twitter.

According to the study, the people most often targeted by phishing attacks resided in Russia, the United States, India, Vietnam and the United Kingdom. Meanwhile, the majority of phishing attacks were launched from the United States, followed by the United Kingdom, Germany, Russia and India.

The FBI recommends that anyone who falls victim to a phishing attack file a complaint with its Internet Crime Complaint Center.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2011-4403
Published: 2015-04-24
Multiple cross-site request forgery (CSRF) vulnerabilities in Zen Cart 1.3.9h allow remote attackers to hijack the authentication of administrators for requests that (1) delete a product via a delete_product_confirm action to product.php or (2) disable a product via a setflag action to categories.ph...

CVE-2012-2930
Published: 2015-04-24
Multiple cross-site request forgery (CSRF) vulnerabilities in TinyWebGallery (TWG) before 1.8.8 allow remote attackers to hijack the authentication of administrators for requests that (1) add a user via an adduser action to admin/index.php or (2) conduct static PHP code injection attacks in .htusers...

CVE-2012-2932
Published: 2015-04-24
Multiple cross-site scripting (XSS) vulnerabilities in TinyWebGallery (TWG) before 1.8.8 allow remote attackers to inject arbitrary web script or HTML via the (1) selitems[] parameter in a copy, (2) chmod, or (3) arch action to admin/index.php or (4) searchitem parameter in a search action to admin/...

CVE-2012-5451
Published: 2015-04-24
Multiple stack-based buffer overflows in HttpUtils.dll in TVMOBiLi before 2.1.0.3974 allow remote attackers to cause a denial of service (tvMobiliService service crash) via a long string in a (1) GET or (2) HEAD request to TCP port 30888.

CVE-2015-0297
Published: 2015-04-24
Red Hat JBoss Operations Network 3.3.1 does not properly restrict access to certain APIs, which allows remote attackers to execute arbitrary Java methos via the (1) ServerInvokerServlet or (2) SchedulerService or (3) cause a denial of service (disk consumption) via the ContentManager.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.