April 11, 2014
The Anti-Phishing Work Group has released its study of phishing attacks in the second half of 2013. The group found that of all phishing efforts, nearly one-third (32.9 percent) were directed at banks and another 17.5 targeted money-transfer services.
"Phishing" is defined as the attempt to steal money, using electronic media such as websites and email to trick a victim into uploading malicious software onto a computer or divulging sensitive information that gives the attacker free access to the system.
The Target breach began as a phishing expedition disguised as email communication from a vendor.
The APWG study yielded several major findings about phishing attacks:
The number of times that the targets were attacked follows a long tail. PayPal was the most-targeted institution (24,580 attacks, or 21 percent of the total), followed by Taobao.com (19,290 attacks, or 16.7 percent). Half of the targets were attacked three or fewer times during the six-month period.
The phishing kits used by less sophisticated phishers tend to contain templates for popular targets. If a site is getting phished for the first time, it may have been targeted by a more sophisticated phisher, who had the skill and motivation to design and execute a new template.
Of those 22,831 malicious domain registrations, 19,348 (85 percent) were registered to phish Chinese targets — services and sites in China that serve a primarily Chinese customer base. Chinese phishers have always preferred to register domains, relying upon hacked domains and compromised Web servers less often than phishers elsewhere. Their major targets included Taobao.com; the Industrial and Commercial Bank of China; China Central TV; ZheJiang Satellite TV; and Tencent, China’s most-used ISP.
A specific tactic used by phishers continues to heavily impact our statistics. In this attack, a phisher breaks into a web server that hosts a large number of domains – a “shared virtual server.” Then he uploads one copy of his phishing content and updates the web server configuration to add that content to every hostname served by that server. Then all web sites on that server display the phishing pages. Instead of hacking sites one at a time, the phisher often infects hundreds of web sites at a time, depending on the server.
This is an unusual amount of “churn” or turnover, and shows phishers trying out new targets. They appear to be looking for companies that are newly popular, have vulnerable user bases, and/or are not ready to defend themselves against phishing.
The complete, detailed report is available for free download.