SlideShare uma empresa Scribd logo
1 de 9
Baixar para ler offline
November 2009                                                                                               Report #25


          The data in this report is aggregated from a combination of sources including Symantec’s Phish
          Report Network (PRN), strategic partners, customers and security solutions.

          This report discusses the metrics and trends observed in phishing activity during the month of
          October 2009.
                                   Highlighted in the November 2009 report:
                   Symantec observed a 17 percent increase from the previous month in all phishing at-
                    tacks
                   30 percent of phishing URLs were generated using phishing toolkits; an increase of 24
                    percent from the previous month
                   Symantec observed a 45 percent increase from the previous month in non-English
                    phishing sites
                   More than 97 Web hosting services were used, which accounted for 8 percent of all
                    phishing attacks; a decrease of 19 percent in total Web host URLs when compared to
                    the previous month




          Phishing Tactic Distribution: Phishing sites
          were categorized based upon the domains
          they leveraged. In October, there was an
          increase observed in the volume of phishing
          activity, as forecasted in the previous
          months. There was a considerable increase
          observed in the number of phishing sites
          being generated using phishing toolkits. The
          recent downtrend of phishing attacks, in all
          likelihood, is seen to have been discontin-
          ued with the resurgence in toolkit attacks in
          October, and signals the approach of the
          holiday season.




          David Cowings                   Suyog Sainkar                  Sagar Desai
          Executive Editor                Editor                         PR Contact
          Security Response               Security Response              Sagar_desai@symantec.com
Phishing site attack methods and target sectors
The following categories were analyzed:
   Sectors
   Number of brands
   Phishing toolkits
   Fraud URLs with IP addresses
   Phish sites that use IP address domains – categorized by hosted cities
   Use of Web hosting sites
   Geo-locations of phishing sites
   Non-English phishing sites
   Top-Level domains of phishing sites
   Country of brand

Sectors: Phishing target sectors are seen in the graphic below.


Number of Brands:
Symantec observed that 70
percent of all attacks were
from unique phishing
Websites, which included
more than 201 targeted
brands. In October, the
unique phishing activity
decreased by 4% over the
previous month. The
proportion of unique
phishing URLs decreased
from 75 percent (in
September) to 70 percent
(in October). This was
partially attributable to an
increase in toolkit activity as
the trending of the two is
usually inversely correlated.
Weekly Behavior of Phishing Toolkit Activity




Automated Phishing Toolkits:                    attacks targeted a wide range of brands from
                                                diverse sectors. It further turned out interest-
Symantec observed that in October, 30 per-
                                                ing to observe that most of these brands, for a
cent of phishing URLs were generated using
                                                while, had been disengaged by the fraudsters
phishing toolkits. The number of toolkit
                                                from the toolkit activities. This in all likelihood
attacks increased considerably by 24 percent.
                                                indicates that the fraudsters have reactivated
Symantec observed that the toolkit attacks
                                                many command-and-control servers, with-
were more in number at the beginning and
                                                drawn recently, for a new season of phishing
towards the end of the month. The sharp
                                                activity. Symantec observed that the resur-
increase observed in the toolkit attacks was
                                                gence in toolkit attacks has resulted in other
primarily attributed to a phishing attack
                                                tactics such as Typo squatting which had
targeting a popular information services
                                                increased in the recent months, back to a
brand.
                                                normal level of activity.
Symantec observed that the increased toolkit

Phishing Attacks Using IP Address Domains

Phishers today use IP addresses as part of the hostname instead of a domain name. This is a
tactic employed to hide the actual fake domain name that otherwise can easily be noticed. As
many banks use IP addresses in their website URLs, this establishes a precedent that spam-
mers can follow as it raises less suspicion.
A total of 977 phishing sites were hosted in 57 countries. This amounted to an increase of ap-
proximately 3 % of IP attacks in comparison to the previous month. The United States is still
home to a majority of phishing activity and continues to be the top ranked country hosting
phishing sites-primarily due to its significantly developed Internet infrastructure. In October,
Germany accounted
for approximately 9 %
of IP attacks making
its debut at the second
position. The Greater
China region accounted
for approximately 8
percent of IP attacks in
the month. The total
number of IP attacks
originating from this
region reduced by 10
percent as compared to
the previous month.




The top cities hosting phish sites were Dresden, Seoul and Atlanta. It was interesting to observe
that phish sites with IP domains continued to originate from newer cities every month. In Octo-
ber, Dresden-a city in Germany and Baton Rouge-the capital city of Louisiana State, introduced
themselves in the list of top cities hosting phish sites.
Phishing Exploits of Free Web Hosting Services
For phishers, using free Web hosting services      brands were attacked using this method in
has been the easiest form of phishing in terms     the reporting period.
of cost and technical skills required to develop
fake sites.                                        However, this form of attack is not as widely
                                                   used as it frequently requires manual efforts
A total of 97 different Web hosting services       to prepare the phishing Web page, unlike the
served as the home for 1,813 phishing sites in     automated kit generated Web sites. Many
the month of October. Symantec observed            free Web hosts have also improved their pre-
that there was an 18 percent decrease in the       ventative and corrective anti-phishing meas-
number of free Web hosting services utilized       ures significantly decreasing the lifespan of
for developing phishing sites. More than 71        phishing sites on their systems.

Global Distribution of Phishing Sites
Phishing sites were analyzed based upon the         number of unique URL’s (referred to in this
geo-location of their Web hosts as well as the     report as “lures”) utilized to lure victims to
                                                   the phishing Web hosts.
1. Geo-Location of Phishing Lures
Leading this area is the United States (36 per-    South Korea and Germany. The proportion of
cent), South Korea (7 %) and Germany (5 %).        active phishing lures remained evenly distrib-
In October, there was a considerable increase      uted for the rest of the locations.
observed in the number of phishing lures for




2. Geo-Location of Phishing Web Hosts              of phishing hosts for South Korea. In October,
The top countries are USA (38 percent), South      the distribution of Web hosts was evenly
Korea (9 %) and Germany (5 %). There was a         distributed for all other locations.
staggering 100 percent and more increase
observed in the total number
Geo-Location of Phishing Web Hosts




Non-English Phishing Trends


Phishing attacks in Italian, French
and Chinese languages were found
to be higher in October. The Italian
language attacks, increased in
number and superseded the
French language attacks. Symantec
observed that phishing websites in
Italian, French and Spanish
remained higher for the financial
sector; while, the phishing attacks
in Chinese language prevailed in
the e-commerce sector.




Top-Level Domains of Phishing Sites
Phishing URLs were categorized based on the       E.g., in the domain name www.example.com,
Top-Level Domains (TLD). TLDs are the last        the Top-Level Domain is .com (or COM, as
part of an Internet domain name; i.e., the        domain names are not case-sensitive).
letters that follow the final dot of any domain   Country Code Top-Level Domains (ccTLD) are
name.                                             used by a country or a territory.
They are two letters long, for example .us is for   It is three or more letters long. Most gTLDs
the United States. Generic Top-Level                are available for use worldwide, but for
Domains (gTLD) are used by a particular type of     historical reasons .mil (military) and .gov
organization (.com for a commercial                 (government) are restricted to use by the
organization).                                      respective U.S. authorities.

Comparisons of Top-Level Domains of Phishing Sites

Overall TLDs
The most used TLDs in phishing sites in the month of October were, .com, .net and .org com-
prising of (50 percent), (9 %) and (4 %) respectively.

The Top-Level Domains in phishing were then further categorized:




1. Generic Top-Level
Domains (gTLDs)
The generic TLDs .com,
.net and .co were the
most utilized with (73
percent), (12 percent) and
(6 %) of the total phish
attacks respectively.

2. Country Code Top-
Level Domains (ccTLDs)
The German, Russian and
United Kingdom ccTLDs
were evaluated to be the
highest in phishing attacks
with (9 %), (8 %) and (7%)
respectively.
Country of Targeted Brands

The brands that phishing sites spoofed were categorized based on the country in which the
brand’s parent company is based.


The top countries of brands attacked in October were the USA, UK and Italy. There were 29
countries whose brands were attacked. As seen in the previous months, the trend of the sec-
tors targeted is similar throughout the countries of brand origin except for those belonging to
Germany and China. There was a combination of banking, e-commerce and information ser-
vices sectors in German brands. In China, the e-commerce sector remains a primary target.
Glossary of Terms

Phishing Toolkits: Phishing toolkits are auto-    Top-Level Domain (TLD): Sometimes referred
mated toolkits that facilitate the creation of    to as a Top-Level Domain Name (TLDN): It is
phishing Websites. They allow individuals to      the last part of an Internet domain name; that
create and carry out phishing attacks even        is, the letters that follow the final dot of any
without any technical knowledge.                  domain name. For example, in the domain
                                                  name www.example.com, the Top-Level Do-
Unique Phishing Website: The phishing Web-        main is com (or COM, as domain names are
sites that have a unique Web page are classi-     not case-sensitive).
fied as “Unique Phishing Websites”. URLs
from phishing toolkits that randomize their       Country Code Top-Level Domains (ccTLD):
URL string are observed to point to the same      Used by a country or a dependent territory. It
Web page and do not contain a unique Web          is two letters long, for example .us for the
page in each URL. Unique Phishing websites        United States.
are the ones where each attack is categorized
on distinct Web Pages.                            Generic Top-Level Domains (gTLD): Used by a
                                                  particular class of organizations (for example,
Web-Hosting: Type of Internet hosting ser-        .com for commercial organizations). It is
vice which allows individuals and organiza-       three or more letters long. Most gTLDs are
tions to put up their own websites. These         available for use worldwide, but for historical
websites run on the space of Web host com-        reasons .mil (military) and .gov
pany servers accessible via the World Wide        (governmental) are restricted to use by the
Web. There are different types of Web host-       respective U.S. Authorities. gTLDs are sub
ing services namely, free Web hosting, shared     classified into sponsored Top-Level Domains
Web hosting, dedicated Web hosting, man-          (sTLD), e.g. .aero, .coop and .museum, and un-
aged Web hosting, etc. of which the free Web      sponsored Top-Level Domains (uTLD), e.g.
hosting service is commonly used to create        .biz, .info, .name and .pro.
phishing websites.

Typo-Squatting: Typo-squatting refers to the
practice of registering domain names that are
typo variations of financial institution web-
sites or other popular websites

Phishing Lure: Phishing lures are URLs distrib-
uted in spam/phishing email utilized to lure
victims to fraudulent phishing websites.

Mais conteúdo relacionado

Mais procurados

Istr number 23 internet security threat repor 2018 symantec
Istr number 23 internet security threat repor 2018 symantecIstr number 23 internet security threat repor 2018 symantec
Istr number 23 internet security threat repor 2018 symantecSoluciona Facil
 
RSA Monthly Online Fraud Report -- October 2013
RSA Monthly Online Fraud Report -- October 2013RSA Monthly Online Fraud Report -- October 2013
RSA Monthly Online Fraud Report -- October 2013EMC
 
Symantec Intelligence Report
Symantec Intelligence ReportSymantec Intelligence Report
Symantec Intelligence ReportSymantec
 
Symantec Intelligence Report - June 2014
Symantec Intelligence Report - June 2014Symantec Intelligence Report - June 2014
Symantec Intelligence Report - June 2014Symantec
 
Trendlabs 1h-2016-security-roundup-en
Trendlabs 1h-2016-security-roundup-enTrendlabs 1h-2016-security-roundup-en
Trendlabs 1h-2016-security-roundup-enAndrey Apuhtin
 
The Executive's Guide to the 2016 Global Threat Intelligence Report
The Executive's Guide to the 2016 Global Threat Intelligence ReportThe Executive's Guide to the 2016 Global Threat Intelligence Report
The Executive's Guide to the 2016 Global Threat Intelligence ReportSimona Franciosi
 
Breach level index_report_2017_gemalto
Breach level index_report_2017_gemaltoBreach level index_report_2017_gemalto
Breach level index_report_2017_gemaltoJonas Mercier
 
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012Symantec
 
ISTR Volume 18
ISTR Volume 18ISTR Volume 18
ISTR Volume 18Symantec
 
2016 trustwave global security report
2016 trustwave global security report2016 trustwave global security report
2016 trustwave global security reportMarco Antonio Agnese
 
Internet Security Threat Report (ISTR) Government
Internet Security Threat Report (ISTR) GovernmentInternet Security Threat Report (ISTR) Government
Internet Security Threat Report (ISTR) GovernmentSSLRenewals
 
Symantec Intelligence Report - July 2014
Symantec Intelligence Report - July 2014Symantec Intelligence Report - July 2014
Symantec Intelligence Report - July 2014Symantec
 
Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Entersoft Security
 
Ransomware Review 2017
Ransomware Review 2017Ransomware Review 2017
Ransomware Review 2017Dryden Geary
 
akamai's [state of internet] / security
akamai's [state of internet] / securityakamai's [state of internet] / security
akamai's [state of internet] / securityThe Internet of Things
 
Topsec email security 2016
Topsec email security 2016Topsec email security 2016
Topsec email security 2016Nathan CAVRIL
 
6 Cybersecurity Trends to Watch in 2019
6 Cybersecurity Trends to Watch in 20196 Cybersecurity Trends to Watch in 2019
6 Cybersecurity Trends to Watch in 2019BluePayProcessing
 
The Year in Phishing - RSA Fraud Report: January 2013
The Year in Phishing - RSA Fraud Report: January 2013The Year in Phishing - RSA Fraud Report: January 2013
The Year in Phishing - RSA Fraud Report: January 2013EMC
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shiftsmalvvv
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shiftsmalvvv
 

Mais procurados (20)

Istr number 23 internet security threat repor 2018 symantec
Istr number 23 internet security threat repor 2018 symantecIstr number 23 internet security threat repor 2018 symantec
Istr number 23 internet security threat repor 2018 symantec
 
RSA Monthly Online Fraud Report -- October 2013
RSA Monthly Online Fraud Report -- October 2013RSA Monthly Online Fraud Report -- October 2013
RSA Monthly Online Fraud Report -- October 2013
 
Symantec Intelligence Report
Symantec Intelligence ReportSymantec Intelligence Report
Symantec Intelligence Report
 
Symantec Intelligence Report - June 2014
Symantec Intelligence Report - June 2014Symantec Intelligence Report - June 2014
Symantec Intelligence Report - June 2014
 
Trendlabs 1h-2016-security-roundup-en
Trendlabs 1h-2016-security-roundup-enTrendlabs 1h-2016-security-roundup-en
Trendlabs 1h-2016-security-roundup-en
 
The Executive's Guide to the 2016 Global Threat Intelligence Report
The Executive's Guide to the 2016 Global Threat Intelligence ReportThe Executive's Guide to the 2016 Global Threat Intelligence Report
The Executive's Guide to the 2016 Global Threat Intelligence Report
 
Breach level index_report_2017_gemalto
Breach level index_report_2017_gemaltoBreach level index_report_2017_gemalto
Breach level index_report_2017_gemalto
 
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
 
ISTR Volume 18
ISTR Volume 18ISTR Volume 18
ISTR Volume 18
 
2016 trustwave global security report
2016 trustwave global security report2016 trustwave global security report
2016 trustwave global security report
 
Internet Security Threat Report (ISTR) Government
Internet Security Threat Report (ISTR) GovernmentInternet Security Threat Report (ISTR) Government
Internet Security Threat Report (ISTR) Government
 
Symantec Intelligence Report - July 2014
Symantec Intelligence Report - July 2014Symantec Intelligence Report - July 2014
Symantec Intelligence Report - July 2014
 
Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018
 
Ransomware Review 2017
Ransomware Review 2017Ransomware Review 2017
Ransomware Review 2017
 
akamai's [state of internet] / security
akamai's [state of internet] / securityakamai's [state of internet] / security
akamai's [state of internet] / security
 
Topsec email security 2016
Topsec email security 2016Topsec email security 2016
Topsec email security 2016
 
6 Cybersecurity Trends to Watch in 2019
6 Cybersecurity Trends to Watch in 20196 Cybersecurity Trends to Watch in 2019
6 Cybersecurity Trends to Watch in 2019
 
The Year in Phishing - RSA Fraud Report: January 2013
The Year in Phishing - RSA Fraud Report: January 2013The Year in Phishing - RSA Fraud Report: January 2013
The Year in Phishing - RSA Fraud Report: January 2013
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
 

Semelhante a Phishing Report Novembre 2009

Symantec Physhing Report Aprile 2009
Symantec Physhing Report Aprile 2009Symantec Physhing Report Aprile 2009
Symantec Physhing Report Aprile 2009Freedata Labs
 
Spam and Phishing Report - Marzo 2010
Spam and Phishing Report - Marzo 2010Spam and Phishing Report - Marzo 2010
Spam and Phishing Report - Marzo 2010Symantec Italia
 
Symantec Intelligence Report - October 2014
Symantec Intelligence Report - October 2014Symantec Intelligence Report - October 2014
Symantec Intelligence Report - October 2014Symantec
 
Global Cyber Attacks report 2018 - 2019 | HaltDos
Global Cyber Attacks report 2018 - 2019 | HaltDosGlobal Cyber Attacks report 2018 - 2019 | HaltDos
Global Cyber Attacks report 2018 - 2019 | HaltDosHaltdos
 
ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019- Mark - Fullbright
 
Symantec Intelligence Report December 2014
Symantec Intelligence Report December 2014Symantec Intelligence Report December 2014
Symantec Intelligence Report December 2014Symantec
 
WatchGuard Internet Security Report
WatchGuard Internet Security ReportWatchGuard Internet Security Report
WatchGuard Internet Security ReportBAKOTECH
 
Security troubles in e commerce website
Security troubles in e commerce websiteSecurity troubles in e commerce website
Security troubles in e commerce websiteDr. Raghavendra GS
 
Apwg trends report_q3_2016
Apwg trends report_q3_2016Apwg trends report_q3_2016
Apwg trends report_q3_2016Andrey Apuhtin
 
Malwarebytes labs 2019 - state of malware report 2
Malwarebytes labs 2019 - state of malware report 2Malwarebytes labs 2019 - state of malware report 2
Malwarebytes labs 2019 - state of malware report 2Felipe Prado
 
Cyber Security Report 2019
Cyber Security Report 2019Cyber Security Report 2019
Cyber Security Report 2019Omar Bshara
 
IBM X-Force Threat Intelligence Index 2020
IBM X-Force Threat Intelligence Index 2020IBM X-Force Threat Intelligence Index 2020
IBM X-Force Threat Intelligence Index 2020mResearcher
 
Are There Any Domains Impersonating Your Company For Phishing?
Are There Any Domains Impersonating Your Company For Phishing?Are There Any Domains Impersonating Your Company For Phishing?
Are There Any Domains Impersonating Your Company For Phishing?NormShield
 
Symantec Intelligence Report: February 2015
Symantec Intelligence Report: February 2015Symantec Intelligence Report: February 2015
Symantec Intelligence Report: February 2015Symantec
 
Apwg trends report_q1-q3_2015
Apwg trends report_q1-q3_2015Apwg trends report_q1-q3_2015
Apwg trends report_q1-q3_2015Andrey Apuhtin
 
Apwg trends report_q4_2016
Apwg trends report_q4_2016Apwg trends report_q4_2016
Apwg trends report_q4_2016Andrey Apuhtin
 
Supersized Security Threats – Can You Stop 2016 from Repeating?
Supersized Security Threats – Can You Stop 2016 from Repeating?Supersized Security Threats – Can You Stop 2016 from Repeating?
Supersized Security Threats – Can You Stop 2016 from Repeating?Valerie Lanzone
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information SecurityMichele Thomas
 

Semelhante a Phishing Report Novembre 2009 (20)

Symantec Physhing Report Aprile 2009
Symantec Physhing Report Aprile 2009Symantec Physhing Report Aprile 2009
Symantec Physhing Report Aprile 2009
 
Spam and Phishing Report - Marzo 2010
Spam and Phishing Report - Marzo 2010Spam and Phishing Report - Marzo 2010
Spam and Phishing Report - Marzo 2010
 
Symantec Intelligence Report - October 2014
Symantec Intelligence Report - October 2014Symantec Intelligence Report - October 2014
Symantec Intelligence Report - October 2014
 
Global Cyber Attacks report 2018 - 2019 | HaltDos
Global Cyber Attacks report 2018 - 2019 | HaltDosGlobal Cyber Attacks report 2018 - 2019 | HaltDos
Global Cyber Attacks report 2018 - 2019 | HaltDos
 
ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
Symantec Intelligence Report December 2014
Symantec Intelligence Report December 2014Symantec Intelligence Report December 2014
Symantec Intelligence Report December 2014
 
WatchGuard Internet Security Report
WatchGuard Internet Security ReportWatchGuard Internet Security Report
WatchGuard Internet Security Report
 
Security troubles in e commerce website
Security troubles in e commerce websiteSecurity troubles in e commerce website
Security troubles in e commerce website
 
Apwg trends report_q3_2016
Apwg trends report_q3_2016Apwg trends report_q3_2016
Apwg trends report_q3_2016
 
Malwarebytes labs 2019 - state of malware report 2
Malwarebytes labs 2019 - state of malware report 2Malwarebytes labs 2019 - state of malware report 2
Malwarebytes labs 2019 - state of malware report 2
 
Typo squatting
Typo squattingTypo squatting
Typo squatting
 
Cyber Security Report 2019
Cyber Security Report 2019Cyber Security Report 2019
Cyber Security Report 2019
 
IBM X-Force Threat Intelligence Index 2020
IBM X-Force Threat Intelligence Index 2020IBM X-Force Threat Intelligence Index 2020
IBM X-Force Threat Intelligence Index 2020
 
Are There Any Domains Impersonating Your Company For Phishing?
Are There Any Domains Impersonating Your Company For Phishing?Are There Any Domains Impersonating Your Company For Phishing?
Are There Any Domains Impersonating Your Company For Phishing?
 
Symantec Intelligence Report: February 2015
Symantec Intelligence Report: February 2015Symantec Intelligence Report: February 2015
Symantec Intelligence Report: February 2015
 
Apwg trends report_q1-q3_2015
Apwg trends report_q1-q3_2015Apwg trends report_q1-q3_2015
Apwg trends report_q1-q3_2015
 
Apwg trends report_q4_2016
Apwg trends report_q4_2016Apwg trends report_q4_2016
Apwg trends report_q4_2016
 
Digital Threat Landscape
Digital Threat LandscapeDigital Threat Landscape
Digital Threat Landscape
 
Supersized Security Threats – Can You Stop 2016 from Repeating?
Supersized Security Threats – Can You Stop 2016 from Repeating?Supersized Security Threats – Can You Stop 2016 from Repeating?
Supersized Security Threats – Can You Stop 2016 from Repeating?
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 

Mais de Symantec Italia

Il Cloud a difesa della mail e del web
Il Cloud a difesa della mail e del webIl Cloud a difesa della mail e del web
Il Cloud a difesa della mail e del webSymantec Italia
 
Garantire la confidenzialità delle informazioni: la soluzione PGP per l'Encry...
Garantire la confidenzialità delle informazioni: la soluzione PGP per l'Encry...Garantire la confidenzialità delle informazioni: la soluzione PGP per l'Encry...
Garantire la confidenzialità delle informazioni: la soluzione PGP per l'Encry...Symantec Italia
 
Le minacce, le tecniche di attacco e i canali di vendita delle informazioni
Le minacce, le tecniche di attacco e i canali di vendita delle informazioniLe minacce, le tecniche di attacco e i canali di vendita delle informazioni
Le minacce, le tecniche di attacco e i canali di vendita delle informazioniSymantec Italia
 
Backup Exec 2010: la matrice di prodotto
Backup Exec 2010: la matrice di prodottoBackup Exec 2010: la matrice di prodotto
Backup Exec 2010: la matrice di prodottoSymantec Italia
 
Symantec Backup Exec 2010 per Windows Small Business Server
Symantec Backup Exec 2010 per Windows Small Business ServerSymantec Backup Exec 2010 per Windows Small Business Server
Symantec Backup Exec 2010 per Windows Small Business ServerSymantec Italia
 
Backup Exec 2010. Domande frequenti
Backup Exec 2010. Domande frequentiBackup Exec 2010. Domande frequenti
Backup Exec 2010. Domande frequentiSymantec Italia
 
Symantec Backup Exec 2010
Symantec Backup Exec 2010Symantec Backup Exec 2010
Symantec Backup Exec 2010Symantec Italia
 
Spam Report Gennaio 2010
Spam Report Gennaio 2010Spam Report Gennaio 2010
Spam Report Gennaio 2010Symantec Italia
 
Storage: le Tendenze per il 2010
Storage: le Tendenze per il 2010Storage: le Tendenze per il 2010
Storage: le Tendenze per il 2010Symantec Italia
 
Sicurezza Internet: tendenze e previsioni 2010
Sicurezza Internet: tendenze e previsioni 2010Sicurezza Internet: tendenze e previsioni 2010
Sicurezza Internet: tendenze e previsioni 2010Symantec Italia
 
Symantec Backup Exec System Recovery 2010
Symantec Backup Exec System Recovery 2010Symantec Backup Exec System Recovery 2010
Symantec Backup Exec System Recovery 2010Symantec Italia
 
Report on Rogue Security Software: a summary
Report on Rogue Security Software: a summaryReport on Rogue Security Software: a summary
Report on Rogue Security Software: a summarySymantec Italia
 
Report on Rogue Security Software
Report on Rogue Security SoftwareReport on Rogue Security Software
Report on Rogue Security SoftwareSymantec Italia
 
Smb Disaster Preparedness Survey Italia
Smb Disaster Preparedness Survey ItaliaSmb Disaster Preparedness Survey Italia
Smb Disaster Preparedness Survey ItaliaSymantec Italia
 
I primi dieci vantaggi di Symantec Protection Suite e i primi dieci motivi pe...
I primi dieci vantaggi di Symantec Protection Suite e i primi dieci motivi pe...I primi dieci vantaggi di Symantec Protection Suite e i primi dieci motivi pe...
I primi dieci vantaggi di Symantec Protection Suite e i primi dieci motivi pe...Symantec Italia
 
Symantec Endpoint Protection: la tecnologia Antivirus Symantec di nuova gener...
Symantec Endpoint Protection: la tecnologia Antivirus Symantec di nuova gener...Symantec Endpoint Protection: la tecnologia Antivirus Symantec di nuova gener...
Symantec Endpoint Protection: la tecnologia Antivirus Symantec di nuova gener...Symantec Italia
 
Symantec Internet Security Threat Report, Volume XIV
Symantec Internet Security Threat Report, Volume XIVSymantec Internet Security Threat Report, Volume XIV
Symantec Internet Security Threat Report, Volume XIVSymantec Italia
 
Symantec Backup Exec 12.5 for Windows Server e Symantec Backup Exec System Re...
Symantec Backup Exec 12.5 for Windows Server e Symantec Backup Exec System Re...Symantec Backup Exec 12.5 for Windows Server e Symantec Backup Exec System Re...
Symantec Backup Exec 12.5 for Windows Server e Symantec Backup Exec System Re...Symantec Italia
 
Symantec Backup Exec System Recovery 8. Domande frequenti
Symantec Backup Exec System Recovery 8. Domande frequentiSymantec Backup Exec System Recovery 8. Domande frequenti
Symantec Backup Exec System Recovery 8. Domande frequentiSymantec Italia
 

Mais de Symantec Italia (20)

Il Cloud a difesa della mail e del web
Il Cloud a difesa della mail e del webIl Cloud a difesa della mail e del web
Il Cloud a difesa della mail e del web
 
Duqu: il nuovo Stuxnet?
Duqu: il nuovo Stuxnet?Duqu: il nuovo Stuxnet?
Duqu: il nuovo Stuxnet?
 
Garantire la confidenzialità delle informazioni: la soluzione PGP per l'Encry...
Garantire la confidenzialità delle informazioni: la soluzione PGP per l'Encry...Garantire la confidenzialità delle informazioni: la soluzione PGP per l'Encry...
Garantire la confidenzialità delle informazioni: la soluzione PGP per l'Encry...
 
Le minacce, le tecniche di attacco e i canali di vendita delle informazioni
Le minacce, le tecniche di attacco e i canali di vendita delle informazioniLe minacce, le tecniche di attacco e i canali di vendita delle informazioni
Le minacce, le tecniche di attacco e i canali di vendita delle informazioni
 
Backup Exec 2010: la matrice di prodotto
Backup Exec 2010: la matrice di prodottoBackup Exec 2010: la matrice di prodotto
Backup Exec 2010: la matrice di prodotto
 
Symantec Backup Exec 2010 per Windows Small Business Server
Symantec Backup Exec 2010 per Windows Small Business ServerSymantec Backup Exec 2010 per Windows Small Business Server
Symantec Backup Exec 2010 per Windows Small Business Server
 
Backup Exec 2010. Domande frequenti
Backup Exec 2010. Domande frequentiBackup Exec 2010. Domande frequenti
Backup Exec 2010. Domande frequenti
 
Symantec Backup Exec 2010
Symantec Backup Exec 2010Symantec Backup Exec 2010
Symantec Backup Exec 2010
 
Spam Report Gennaio 2010
Spam Report Gennaio 2010Spam Report Gennaio 2010
Spam Report Gennaio 2010
 
Storage: le Tendenze per il 2010
Storage: le Tendenze per il 2010Storage: le Tendenze per il 2010
Storage: le Tendenze per il 2010
 
Sicurezza Internet: tendenze e previsioni 2010
Sicurezza Internet: tendenze e previsioni 2010Sicurezza Internet: tendenze e previsioni 2010
Sicurezza Internet: tendenze e previsioni 2010
 
Symantec Backup Exec System Recovery 2010
Symantec Backup Exec System Recovery 2010Symantec Backup Exec System Recovery 2010
Symantec Backup Exec System Recovery 2010
 
Report on Rogue Security Software: a summary
Report on Rogue Security Software: a summaryReport on Rogue Security Software: a summary
Report on Rogue Security Software: a summary
 
Report on Rogue Security Software
Report on Rogue Security SoftwareReport on Rogue Security Software
Report on Rogue Security Software
 
Smb Disaster Preparedness Survey Italia
Smb Disaster Preparedness Survey ItaliaSmb Disaster Preparedness Survey Italia
Smb Disaster Preparedness Survey Italia
 
I primi dieci vantaggi di Symantec Protection Suite e i primi dieci motivi pe...
I primi dieci vantaggi di Symantec Protection Suite e i primi dieci motivi pe...I primi dieci vantaggi di Symantec Protection Suite e i primi dieci motivi pe...
I primi dieci vantaggi di Symantec Protection Suite e i primi dieci motivi pe...
 
Symantec Endpoint Protection: la tecnologia Antivirus Symantec di nuova gener...
Symantec Endpoint Protection: la tecnologia Antivirus Symantec di nuova gener...Symantec Endpoint Protection: la tecnologia Antivirus Symantec di nuova gener...
Symantec Endpoint Protection: la tecnologia Antivirus Symantec di nuova gener...
 
Symantec Internet Security Threat Report, Volume XIV
Symantec Internet Security Threat Report, Volume XIVSymantec Internet Security Threat Report, Volume XIV
Symantec Internet Security Threat Report, Volume XIV
 
Symantec Backup Exec 12.5 for Windows Server e Symantec Backup Exec System Re...
Symantec Backup Exec 12.5 for Windows Server e Symantec Backup Exec System Re...Symantec Backup Exec 12.5 for Windows Server e Symantec Backup Exec System Re...
Symantec Backup Exec 12.5 for Windows Server e Symantec Backup Exec System Re...
 
Symantec Backup Exec System Recovery 8. Domande frequenti
Symantec Backup Exec System Recovery 8. Domande frequentiSymantec Backup Exec System Recovery 8. Domande frequenti
Symantec Backup Exec System Recovery 8. Domande frequenti
 

Último

A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 

Último (20)

A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 

Phishing Report Novembre 2009

  • 1. November 2009 Report #25 The data in this report is aggregated from a combination of sources including Symantec’s Phish Report Network (PRN), strategic partners, customers and security solutions. This report discusses the metrics and trends observed in phishing activity during the month of October 2009. Highlighted in the November 2009 report:  Symantec observed a 17 percent increase from the previous month in all phishing at- tacks  30 percent of phishing URLs were generated using phishing toolkits; an increase of 24 percent from the previous month  Symantec observed a 45 percent increase from the previous month in non-English phishing sites  More than 97 Web hosting services were used, which accounted for 8 percent of all phishing attacks; a decrease of 19 percent in total Web host URLs when compared to the previous month Phishing Tactic Distribution: Phishing sites were categorized based upon the domains they leveraged. In October, there was an increase observed in the volume of phishing activity, as forecasted in the previous months. There was a considerable increase observed in the number of phishing sites being generated using phishing toolkits. The recent downtrend of phishing attacks, in all likelihood, is seen to have been discontin- ued with the resurgence in toolkit attacks in October, and signals the approach of the holiday season. David Cowings Suyog Sainkar Sagar Desai Executive Editor Editor PR Contact Security Response Security Response Sagar_desai@symantec.com
  • 2. Phishing site attack methods and target sectors The following categories were analyzed:  Sectors  Number of brands  Phishing toolkits  Fraud URLs with IP addresses  Phish sites that use IP address domains – categorized by hosted cities  Use of Web hosting sites  Geo-locations of phishing sites  Non-English phishing sites  Top-Level domains of phishing sites  Country of brand Sectors: Phishing target sectors are seen in the graphic below. Number of Brands: Symantec observed that 70 percent of all attacks were from unique phishing Websites, which included more than 201 targeted brands. In October, the unique phishing activity decreased by 4% over the previous month. The proportion of unique phishing URLs decreased from 75 percent (in September) to 70 percent (in October). This was partially attributable to an increase in toolkit activity as the trending of the two is usually inversely correlated.
  • 3. Weekly Behavior of Phishing Toolkit Activity Automated Phishing Toolkits: attacks targeted a wide range of brands from diverse sectors. It further turned out interest- Symantec observed that in October, 30 per- ing to observe that most of these brands, for a cent of phishing URLs were generated using while, had been disengaged by the fraudsters phishing toolkits. The number of toolkit from the toolkit activities. This in all likelihood attacks increased considerably by 24 percent. indicates that the fraudsters have reactivated Symantec observed that the toolkit attacks many command-and-control servers, with- were more in number at the beginning and drawn recently, for a new season of phishing towards the end of the month. The sharp activity. Symantec observed that the resur- increase observed in the toolkit attacks was gence in toolkit attacks has resulted in other primarily attributed to a phishing attack tactics such as Typo squatting which had targeting a popular information services increased in the recent months, back to a brand. normal level of activity. Symantec observed that the increased toolkit Phishing Attacks Using IP Address Domains Phishers today use IP addresses as part of the hostname instead of a domain name. This is a tactic employed to hide the actual fake domain name that otherwise can easily be noticed. As many banks use IP addresses in their website URLs, this establishes a precedent that spam- mers can follow as it raises less suspicion.
  • 4. A total of 977 phishing sites were hosted in 57 countries. This amounted to an increase of ap- proximately 3 % of IP attacks in comparison to the previous month. The United States is still home to a majority of phishing activity and continues to be the top ranked country hosting phishing sites-primarily due to its significantly developed Internet infrastructure. In October, Germany accounted for approximately 9 % of IP attacks making its debut at the second position. The Greater China region accounted for approximately 8 percent of IP attacks in the month. The total number of IP attacks originating from this region reduced by 10 percent as compared to the previous month. The top cities hosting phish sites were Dresden, Seoul and Atlanta. It was interesting to observe that phish sites with IP domains continued to originate from newer cities every month. In Octo- ber, Dresden-a city in Germany and Baton Rouge-the capital city of Louisiana State, introduced themselves in the list of top cities hosting phish sites.
  • 5. Phishing Exploits of Free Web Hosting Services For phishers, using free Web hosting services brands were attacked using this method in has been the easiest form of phishing in terms the reporting period. of cost and technical skills required to develop fake sites. However, this form of attack is not as widely used as it frequently requires manual efforts A total of 97 different Web hosting services to prepare the phishing Web page, unlike the served as the home for 1,813 phishing sites in automated kit generated Web sites. Many the month of October. Symantec observed free Web hosts have also improved their pre- that there was an 18 percent decrease in the ventative and corrective anti-phishing meas- number of free Web hosting services utilized ures significantly decreasing the lifespan of for developing phishing sites. More than 71 phishing sites on their systems. Global Distribution of Phishing Sites Phishing sites were analyzed based upon the number of unique URL’s (referred to in this geo-location of their Web hosts as well as the report as “lures”) utilized to lure victims to the phishing Web hosts. 1. Geo-Location of Phishing Lures Leading this area is the United States (36 per- South Korea and Germany. The proportion of cent), South Korea (7 %) and Germany (5 %). active phishing lures remained evenly distrib- In October, there was a considerable increase uted for the rest of the locations. observed in the number of phishing lures for 2. Geo-Location of Phishing Web Hosts of phishing hosts for South Korea. In October, The top countries are USA (38 percent), South the distribution of Web hosts was evenly Korea (9 %) and Germany (5 %). There was a distributed for all other locations. staggering 100 percent and more increase observed in the total number
  • 6. Geo-Location of Phishing Web Hosts Non-English Phishing Trends Phishing attacks in Italian, French and Chinese languages were found to be higher in October. The Italian language attacks, increased in number and superseded the French language attacks. Symantec observed that phishing websites in Italian, French and Spanish remained higher for the financial sector; while, the phishing attacks in Chinese language prevailed in the e-commerce sector. Top-Level Domains of Phishing Sites Phishing URLs were categorized based on the E.g., in the domain name www.example.com, Top-Level Domains (TLD). TLDs are the last the Top-Level Domain is .com (or COM, as part of an Internet domain name; i.e., the domain names are not case-sensitive). letters that follow the final dot of any domain Country Code Top-Level Domains (ccTLD) are name. used by a country or a territory.
  • 7. They are two letters long, for example .us is for It is three or more letters long. Most gTLDs the United States. Generic Top-Level are available for use worldwide, but for Domains (gTLD) are used by a particular type of historical reasons .mil (military) and .gov organization (.com for a commercial (government) are restricted to use by the organization). respective U.S. authorities. Comparisons of Top-Level Domains of Phishing Sites Overall TLDs The most used TLDs in phishing sites in the month of October were, .com, .net and .org com- prising of (50 percent), (9 %) and (4 %) respectively. The Top-Level Domains in phishing were then further categorized: 1. Generic Top-Level Domains (gTLDs) The generic TLDs .com, .net and .co were the most utilized with (73 percent), (12 percent) and (6 %) of the total phish attacks respectively. 2. Country Code Top- Level Domains (ccTLDs) The German, Russian and United Kingdom ccTLDs were evaluated to be the highest in phishing attacks with (9 %), (8 %) and (7%) respectively.
  • 8. Country of Targeted Brands The brands that phishing sites spoofed were categorized based on the country in which the brand’s parent company is based. The top countries of brands attacked in October were the USA, UK and Italy. There were 29 countries whose brands were attacked. As seen in the previous months, the trend of the sec- tors targeted is similar throughout the countries of brand origin except for those belonging to Germany and China. There was a combination of banking, e-commerce and information ser- vices sectors in German brands. In China, the e-commerce sector remains a primary target.
  • 9. Glossary of Terms Phishing Toolkits: Phishing toolkits are auto- Top-Level Domain (TLD): Sometimes referred mated toolkits that facilitate the creation of to as a Top-Level Domain Name (TLDN): It is phishing Websites. They allow individuals to the last part of an Internet domain name; that create and carry out phishing attacks even is, the letters that follow the final dot of any without any technical knowledge. domain name. For example, in the domain name www.example.com, the Top-Level Do- Unique Phishing Website: The phishing Web- main is com (or COM, as domain names are sites that have a unique Web page are classi- not case-sensitive). fied as “Unique Phishing Websites”. URLs from phishing toolkits that randomize their Country Code Top-Level Domains (ccTLD): URL string are observed to point to the same Used by a country or a dependent territory. It Web page and do not contain a unique Web is two letters long, for example .us for the page in each URL. Unique Phishing websites United States. are the ones where each attack is categorized on distinct Web Pages. Generic Top-Level Domains (gTLD): Used by a particular class of organizations (for example, Web-Hosting: Type of Internet hosting ser- .com for commercial organizations). It is vice which allows individuals and organiza- three or more letters long. Most gTLDs are tions to put up their own websites. These available for use worldwide, but for historical websites run on the space of Web host com- reasons .mil (military) and .gov pany servers accessible via the World Wide (governmental) are restricted to use by the Web. There are different types of Web host- respective U.S. Authorities. gTLDs are sub ing services namely, free Web hosting, shared classified into sponsored Top-Level Domains Web hosting, dedicated Web hosting, man- (sTLD), e.g. .aero, .coop and .museum, and un- aged Web hosting, etc. of which the free Web sponsored Top-Level Domains (uTLD), e.g. hosting service is commonly used to create .biz, .info, .name and .pro. phishing websites. Typo-Squatting: Typo-squatting refers to the practice of registering domain names that are typo variations of financial institution web- sites or other popular websites Phishing Lure: Phishing lures are URLs distrib- uted in spam/phishing email utilized to lure victims to fraudulent phishing websites.