📜 ⬆️ ⬇️

Phishers extend front

Recently, the APWG (Anti-Phishing Working Group) published a statistical report for the second half of 2013. Its results should alert all Internet users.


During this period, 115,565 unique phishing attacks were recorded - this is one of the highest rates since 2007 (when they first started collecting detailed statistics on violations).

The purpose of the attacks were a variety of companies: the target audience of fraudsters only expands over time. The security measures taken against cyber attacks forced phishers to look for new methods of obtaining personal information of network users by illegal means. Now phishers can attack or replace almost any site that requires the input of personal data.
')
In the second half of 2013, 82,163 unique domains were attacked. Most of them were hacked, but APWG also recorded at least 22,831 second-level domains registered by fraudsters. This is also one of the highest rates of all time — four times more than in the second half of 2012.

The phishing domain registrars were mostly Chinese, and 85% of their goals were also Chinese payment systems, social networks and other resources. Domains were registered in various areas and with different (more than 230) registrars, but mostly they are Chinese companies.

We should also mention the company Freenom, which provides services of free registration of second-level domains in the .TK, .CF, .GA and .ML zones. 28% of sites with malicious content were registered in these zones. The most famous is the .TK zone, which is also the leader among all national domains in the number of registered names. And if in it the registrar has already begun an active struggle with fraudsters, then this cannot be said about the other three free zones that have been recently launched. At least 1,429 phishing sites were registered in them.

But there is good news. The average duration of phishing attacks dropped to 28 hours and approached the historical minimum. It is also important to note the decline in the median: 50% of all attacks lasted no more than 7 hours and 54 minutes. This is the result of the joint work of registrars, hosters, law enforcement agencies and companies providing security services in the network.

View the full version of the report here .

Source: https://habr.com/ru/post/219395/


All Articles