Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

ABTV //

Phishing

// // //
6/25/2018
11:05 AM
Scott Ferguson
Scott Ferguson
News Analysis-Security Now

Phishing Attacks Are Increasing & Gaining in Sophistication

Reports from Palo Alto Networks and Barracuda Networks show that different types of phishing attacks are increasing, and becoming more sophisticated and deceptive.

Phishing attacks remain one of the oldest types of security concerns for enterprises, but that doesn't mean they have lost their ability to trick end-users into clicking. In fact, recent reports show increasingly sophisticated and deceptive schemes.

The number of phishing attacks has been on an uptick in the last two months, according to one report, released Monday, from Barracuda Networks. The company's software blocked more than 1.5 million phishing emails in May, and research observed over 10,000 unique attempts.

In June so far, Barracuda blocked 1.7 million phishing emails with more than 2,000 unique attempts.

Phishing email disguised as message from a bank\r\n(Source: Barracuda Networks)\r\n
Phishing email disguised as message from a bank
\r\n(Source: Barracuda Networks)\r\n

Jonathan Tanner, a software engineer with Barracuda and the author of the June 25 study, wrote in an email to Security Now that it's difficult to determine why phishing emails increase or decrease in certain months.

"Generally speaking, there's always a chance that criminals could take advantage of current events, holidays, etc. to base campaigns around," Tanner wrote. "This could be anything from composing messages around summer sales, for example, or right now we have the World Cup going on -- it wouldn't be surprising to see a phishing campaign based on either of those subjects."

In fact, Check Point noted a specific phishing scam targeting World Cup fans that started around the time the tournament began in early June. (See World Cup Penalty: Phishing Campaign Targets Soccer Fans.)

The Barracuda report follows similar analysis from Palo Alto Networks' Unit 42, which published a blog post on June 18, that looked at phishing emails for the first quarter of this year. Overall, researchers noted that while exploit kits had declined, the number of malicious emails had not.

Specifically, Palo Alto found over 150 phishing domains being hosted in the US, with the next closest being Germany with 28. Poland had 13.

"In the first quarter of 2018, we found 4,213 URLs from 262 unique domains used in phishing attacks. On average, we found one domain serving 16 different phishing URLs," according to the blog post.


Boost your understanding of new cybersecurity approaches at Light Reading's Automating Seamless Security in Carrier & Enterprise Networks event on October 17 in Chicago! Service providers and enterprises receive FREE passes. All others can save 20% off passes using the code LR20 today!

In his email, Tanner noted that the rise of malware-as-a-service makes these types of attacks much easier to start, as well as more profitable for the people behind them.

"Credentials, whether phished directly or obtained through malware, are a profitable commodity at scale so there is certainly an incentive to break into this market," Tanner wrote. "As another example of copying the SaaS model, botnets are 'rented' for distribution of such emails, making logistics easier. Ransomware has been a big contributor over the past few years as well, although it's likely to decrease as protections are put in place on the victim-side, prevalence of victims not receiving their files post-ransom payment increases, and fewer victims opt to pay the ransom."

And this is where an increasingly level of sophistication comes in.

Along with new statistics, Barracuda released several examples of phishing emails, including one that distributes malware by urging the reader to open an attachment that relates to an urgent matter. From there, the attackers can distribute viruses, worms, bots, ransomware, password stealers and more.

In another example, Barracuda researchers found a spear phishing campaign involving cybercriminals registering domain names and involved in "typosquatting," specifically misspelling Netflix as "Netfliix" in order to get the email reader to click on a link or attachment.

"It's possible that less sophisticated attackers will increase their sophistication level as they familiarize themselves with the techniques available, but there will likely always be a large number of newcomers to the market as well that use unsophisticated techniques and poor grammar," Tanner noted. "Ultimately, if an attacker achieves their goals with a lower level of sophistication, there isn't much incentive to increase it. I think there will always be a place for both highly sophisticated attacks that are barely differentiable than real email as well as unsophisticated, mass attacks that simply rely on a few users falling for the trick."

Related posts:

— Scott Ferguson is the managing editor of Light Reading and the editor of Security Now. Follow him on Twitter @sferguson_LR.

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The 10 Most Impactful Types of Vulnerabilities for Enterprises Today
Managing system vulnerabilities is one of the old est - and most frustrating - security challenges that enterprise defenders face. Every software application and hardware device ships with intrinsic flaws - flaws that, if critical enough, attackers can exploit from anywhere in the world. It's crucial that defenders take stock of what areas of the tech stack have the most emerging, and critical, vulnerabilities they must manage. It's not just zero day vulnerabilities. Consider that CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilitlies in widely used applications that are "actively exploited," and most of them are flaws that were discovered several years ago and have been fixed. There are also emerging vulnerabilities in 5G networks, cloud infrastructure, Edge applications, and firmwares to consider.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-1172
PUBLISHED: 2023-03-17
The Bookly plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the full name value in versions up to, and including, 21.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that w...
CVE-2023-1469
PUBLISHED: 2023-03-17
The WP Express Checkout plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘pec_coupon[code]’ parameter in versions up to, and including, 2.2.8 due to insufficient input sanitization and output escaping. This makes it possible for authenti...
CVE-2023-1466
PUBLISHED: 2023-03-17
A vulnerability was found in SourceCodester Student Study Center Desk Management System 1.0. It has been rated as critical. This issue affects the function view_student of the file admin/?page=students/view_student. The manipulation of the argument id with the input 3' AND (SELECT 2100 FROM (SELECT(...
CVE-2023-1467
PUBLISHED: 2023-03-17
A vulnerability classified as critical has been found in SourceCodester Student Study Center Desk Management System 1.0. Affected is an unknown function of the file Master.php?f=delete_img of the component POST Parameter Handler. The manipulation of the argument path with the input C%3A%2Ffoo.txt le...
CVE-2023-1468
PUBLISHED: 2023-03-17
A vulnerability classified as critical was found in SourceCodester Student Study Center Desk Management System 1.0. Affected by this vulnerability is an unknown functionality of the file admin/?page=reports&date_from=2023-02-17&date_to=2023-03-17 of the component Report Handler. The manipula...