Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

9/22/2009
12:50 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Cyveillance Disputes Reports Of Phishing Decline

Cyveillance detects 176,864 distinct phishing attacks between June and August 2009, one of the highest three-month totals on record

ARLINGTON, Va., September 22, 2009 -- Cyveillance, a world leader in cyber intelligence, today announced a significant increase in phishing attacks, contradicting claims by leading technology vendors IBM, Microsoft and Symantec. Based on its comprehensive Internet monitoring and sophisticated intelligence analysis, Cyveillance is seeing a consistent increase in phishing attacks (176,864 over the past three months) with growth from areas outside traditional email spam; including social networking, voice and SMS texting.

"There has been a natural evolution of attack vectors over the years, which began with malware on floppy disks, progressing to emails, Web sites and now other avenues including Twitter, Facebook and even cellular phones," said Panos Anastassiadis, President and CEO of Cyveillance. "Phishing is no different. Phishers have simply become more efficient at launching their attacks and consumers need to be aware that these threats are no longer limited to simple spam email campaigns."

Phishing causes the majority of its damage within the first 24 hours of being launched, making it crucial for vendors to detect attacks as quickly as possible. Microsoft recently reported its Internet Explorer 8 (IE8) service detected over 80% of phishing attacks. Cyveillance, in on-going research into online threats, has tested that same tool and found that only 31.5% of newly identified phishing attacks were actually detected. Cyveillance testing shows that Internet Explorer 8 has indeed increased its detection rate by 6% over Internet Explorer 7, but even this improved service leaves users vulnerable to over two-thirds of newly discovered phishing attacks.

Industry leaders IBM and Symantec recently reported a decline in phishing attacks for 2009, basing their report primarily on traditional indicators of malicious activity: a decrease in spam activity and phishing toolkits. Cyveillance, however, has determined that traditional warning indicators no longer effectively expose the phishing threat level: the threat is in fact increasing. From June to August 2009 Cyveillance directly identified 176,864 actual, distinct phishing attacks, one of the highest three-month volumes ever detected. The industry has focused on traditional email-based phishing attacks, which is no longer the preferred method of today's more successful phishers. Traditional email monitoring misses attacks perpetrated through more creative means, including URLs distributed by tweets, instant messages and SMS texts. Therefore, while phishing email volume may have fallen, the number of phishing attacks is actually rising through more sophisticated methods of identifying and attacking targets (and also through more focused email campaigns launched by phishers).

Recognizing that the level of threat can be cyclical, Cyveillance is warning consumers to be aware that no "silver bullet" will protect against phishing attacks. It is important for consumers to not solely rely on vendor solutions and stay educated about new and evolving threats, as phishing still relies on human interaction to capture sensitive data.

All Cyveillance phishing figures and statistics are actual measurements, not projections based upon sample datasets. Cyveillance's IE8 testing took place over a three-day period in August and examined the percentage of phishing attacks recognized by the tool upon real-time detection. The phishing statistics were collected and analyzed between June and August 2009. For more information about Cyveillance's research findings in their "1H 2009 Cyber Intelligence Report," please visit http://www.cyveillance.com/web/forms/request.asp?getFile=115.

About Cyveillance Cyveillance, a world leader in cyber intelligence, provides an intelligence-led approach to security. Through continuous, comprehensive Internet monitoring and sophisticated intelligence analysis, Cyveillance proactively identifies and eliminates threats to information, infrastructure, individuals and their interactions, enabling its customers to preserve their reputation, revenues, and customer trust. Cyveillance serves the Global 2000 and OEM Data Partners " protecting the majority of the Fortune 50, regional financial institutions nationwide, and more than 30 million global consumers through its partnerships with security and service providers that include AOL and Microsoft. Cyveillance is a wholly owned subsidiary of QinetiQ North America. For more information, please visit www.cyveillance.com or http://www.qinetiq-na.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Former CISA Director Chris Krebs Discusses Risk Management & Threat Intel
Kelly Sheridan, Staff Editor, Dark Reading,  2/23/2021
Edge-DRsplash-10-edge-articles
Security + Fraud Protection: Your One-Two Punch Against Cyberattacks
Joshua Goldfarb, Director of Product Management at F5,  2/23/2021
News
Cybercrime Groups More Prolific, Focus on Healthcare in 2020
Robert Lemos, Contributing Writer,  2/22/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Building the SOC of the Future
Building the SOC of the Future
Digital transformation, cloud-focused attacks, and a worldwide pandemic. The past year has changed the way business works and the way security teams operate. There is no going back.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-27132
PUBLISHED: 2021-02-27
SerComm AG Combo VD625 AGSOT_2.1.0 devices allow CRLF injection (for HTTP header injection) in the download function via the Content-Disposition header.
CVE-2021-25284
PUBLISHED: 2021-02-27
An issue was discovered in through SaltStack Salt before 3002.5. salt.modules.cmdmod can log credentials to the info or error log level.
CVE-2021-3144
PUBLISHED: 2021-02-27
In SaltStack Salt before 3002.5, eauth tokens can be used once after expiration. (They might be used to run command against the salt master or minions.)
CVE-2021-3148
PUBLISHED: 2021-02-27
An issue was discovered in SaltStack Salt before 3002.5. Sending crafted web requests to the Salt API can result in salt.utils.thin.gen_thin() command injection because of different handling of single versus double quotes. This is related to salt/utils/thin.py.
CVE-2021-3151
PUBLISHED: 2021-02-27
i-doit before 1.16.0 is affected by Stored Cross-Site Scripting (XSS) issues that could allow remote authenticated attackers to inject arbitrary web script or HTML via C__MONITORING__CONFIG__TITLE, SM2__C__MONITORING__CONFIG__TITLE, C__MONITORING__CONFIG__PATH, SM2__C__MONITORING__CONFIG__PATH, C__M...