Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

ABTV //

Phishing

6/25/2018
11:05 AM
Scott Ferguson
Scott Ferguson
News Analysis-Security Now
50%
50%

Phishing Attacks Are Increasing & Gaining in Sophistication

Reports from Palo Alto Networks and Barracuda Networks show that different types of phishing attacks are increasing, and becoming more sophisticated and deceptive.

Phishing attacks remain one of the oldest types of security concerns for enterprises, but that doesn't mean they have lost their ability to trick end-users into clicking. In fact, recent reports show increasingly sophisticated and deceptive schemes.

The number of phishing attacks has been on an uptick in the last two months, according to one report, released Monday, from Barracuda Networks. The company's software blocked more than 1.5 million phishing emails in May, and research observed over 10,000 unique attempts.

In June so far, Barracuda blocked 1.7 million phishing emails with more than 2,000 unique attempts.

Jonathan Tanner, a software engineer with Barracuda and the author of the June 25 study, wrote in an email to Security Now that it's difficult to determine why phishing emails increase or decrease in certain months.

"Generally speaking, there's always a chance that criminals could take advantage of current events, holidays, etc. to base campaigns around," Tanner wrote. "This could be anything from composing messages around summer sales, for example, or right now we have the World Cup going on -- it wouldn't be surprising to see a phishing campaign based on either of those subjects."

In fact, Check Point noted a specific phishing scam targeting World Cup fans that started around the time the tournament began in early June. (See World Cup Penalty: Phishing Campaign Targets Soccer Fans.)

The Barracuda report follows similar analysis from Palo Alto Networks' Unit 42, which published a blog post on June 18, that looked at phishing emails for the first quarter of this year. Overall, researchers noted that while exploit kits had declined, the number of malicious emails had not.

Specifically, Palo Alto found over 150 phishing domains being hosted in the US, with the next closest being Germany with 28. Poland had 13.

"In the first quarter of 2018, we found 4,213 URLs from 262 unique domains used in phishing attacks. On average, we found one domain serving 16 different phishing URLs," according to the blog post.


Boost your understanding of new cybersecurity approaches at Light Reading's Automating Seamless Security in Carrier & Enterprise Networks event on October 17 in Chicago! Service providers and enterprises receive FREE passes. All others can save 20% off passes using the code LR20 today!

In his email, Tanner noted that the rise of malware-as-a-service makes these types of attacks much easier to start, as well as more profitable for the people behind them.

"Credentials, whether phished directly or obtained through malware, are a profitable commodity at scale so there is certainly an incentive to break into this market," Tanner wrote. "As another example of copying the SaaS model, botnets are 'rented' for distribution of such emails, making logistics easier. Ransomware has been a big contributor over the past few years as well, although it's likely to decrease as protections are put in place on the victim-side, prevalence of victims not receiving their files post-ransom payment increases, and fewer victims opt to pay the ransom."

And this is where an increasingly level of sophistication comes in.

Along with new statistics, Barracuda released several examples of phishing emails, including one that distributes malware by urging the reader to open an attachment that relates to an urgent matter. From there, the attackers can distribute viruses, worms, bots, ransomware, password stealers and more.

In another example, Barracuda researchers found a spear phishing campaign involving cybercriminals registering domain names and involved in "typosquatting," specifically misspelling Netflix as "Netfliix" in order to get the email reader to click on a link or attachment.

"It's possible that less sophisticated attackers will increase their sophistication level as they familiarize themselves with the techniques available, but there will likely always be a large number of newcomers to the market as well that use unsophisticated techniques and poor grammar," Tanner noted. "Ultimately, if an attacker achieves their goals with a lower level of sophistication, there isn't much incentive to increase it. I think there will always be a place for both highly sophisticated attacks that are barely differentiable than real email as well as unsophisticated, mass attacks that simply rely on a few users falling for the trick."

Related posts:

— Scott Ferguson is the managing editor of Light Reading and the editor of Security Now. Follow him on Twitter @sferguson_LR.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/2/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9498
PUBLISHED: 2020-07-02
Apache Guacamole 1.1.0 and older may mishandle pointers involved inprocessing data received via RDP static virtual channels. If a userconnects to a malicious or compromised RDP server, a series ofspecially-crafted PDUs could result in memory corruption, possiblyallowing arbitrary code to be executed...
CVE-2020-3282
PUBLISHED: 2020-07-02
A vulnerability in the web-based management interface of Cisco Unified Communications Manager, Cisco Unified Communications Manager Session Management Edition, Cisco Unified Communications Manager IM & Presence Service, and Cisco Unity Connection could allow an unauthenticated, remote attack...
CVE-2020-5909
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, when users run the command displayed in NGINX Controller user interface (UI) to fetch the agent installer, the server TLS certificate is not verified.
CVE-2020-5910
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the Neural Autonomic Transport System (NATS) messaging services in use by the NGINX Controller do not require any form of authentication, so any successful connection would be authorized.
CVE-2020-5911
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller installer starts the download of Kubernetes packages from an HTTP URL On Debian/Ubuntu system.