9
The data in this report is aggregated from a combination of sources including Symantec’s Phish Report Network (PRN), strategic partners, customers and security solutions. This report discusses the metrics and trends observed in phishing activity during the month of July 2009. Highlighted in the August 2009 report: Symantec observed a 52 percent increase from the previous month in all phishing attack 63 percent of phishing URLs were generated using phishing toolkits; an increase of 150 percent from the previous month More than 130 Web hosting services were used, which accounted for 6 percent of all phishing attacks; a decrease of 14 percent of total Web host URLs when compared to the previous month There was a 17 percent decrease from the previous month in non-English phishing sites Symantec observed an increase in attacks employing fraudulent use of hijacked legitimate SSL certificates August 2009 Report #22 Phishing Tactic Distribution: Phish- ing sites were categorized based upon the domains they leveraged. A considerable increase was seen in the number of phishing sites be- ing generated using phishing tool- kits. This was likely a result of a particular Command & Control served being re-activated. This also is partially attributable for the overall increase in the volume of phishing activity in July. David Cowings Executive Editor Security Response Suyog Sainkar Editor Security Response Sagar Desai PR Contact [email protected]

Highlighted in the August 2009 report - Symanteceval.symantec.com/mktginfo/enterprise/other_resources/b...Phishers today use IP addresses as part of the hostname instead of a domain

Embed Size (px)

Citation preview

Page 1: Highlighted in the August 2009 report - Symanteceval.symantec.com/mktginfo/enterprise/other_resources/b...Phishers today use IP addresses as part of the hostname instead of a domain

The data in this report is aggregated from a combination of sources including Symantec’s Phish Report Network (PRN), strategic partners, customers and security solutions.

This report discusses the metrics and trends observed in phishing activity during the month of July 2009.

Highlighted in the August 2009 report:

Symantec observed a 52 percent increase from the previous month in all phishing attack

63 percent of phishing URLs were generated using phishing toolkits; an increase of 150

percent from the previous month

More than 130 Web hosting services were used, which accounted for 6 percent of all

phishing attacks; a decrease of 14 percent of total Web host URLs when compared to the

previous month

There was a 17 percent decrease from the previous month in non-English phishing sites

Symantec observed an increase in attacks employing fraudulent use of hijacked legitimate

SSL certificates

August 2009 Report #22

Phishing Tactic Distribution: Phish-ing sites were categorized based upon the domains they leveraged.

A considerable increase was seen in the number of phishing sites be-ing generated using phishing tool-

kits. This was likely a result of a particular Command & Control served being re-activated. This also

is partially attributable for the overall increase in the volume of phishing activity in July.

David Cowings Executive Editor

Security Response

Suyog Sainkar Editor

Security Response

Sagar Desai PR Contact

[email protected]

Page 2: Highlighted in the August 2009 report - Symanteceval.symantec.com/mktginfo/enterprise/other_resources/b...Phishers today use IP addresses as part of the hostname instead of a domain

The following categories were analyzed:

Sectors

Number of brands

Phishing toolkits

Fraud URLs with IP addresses

Phish sites by hosted cities

Use of Web-hosting sites

Geo-locations of phishing sites

Non-English phishing sites

Top-Level domains of phishing sites

Country of brand

Sectors: Phishing target sectors are seen in the graphic below.

Number of Brands: Symantec observed that 37 percent of all attacks were from unique

phishing websites, which included more than 226 targeted brands. Although, the unique phishing activity decreased by only 8 percent in July, the proportion of unique phishing

URLs decreased considerably from 62% (in June) to 35% (in July). This was the result of a sharp increase in toolkit activity as the trend-

ing of the two is usually inversely correlated.

Phishing site attack methods and target sectors

Page 3: Highlighted in the August 2009 report - Symanteceval.symantec.com/mktginfo/enterprise/other_resources/b...Phishers today use IP addresses as part of the hostname instead of a domain

Automated Phishing Toolkits: Symantec ob-

served that 63 percent of phishing URLs were generated using phishing toolkits in the last month. The number of toolkit attacks in-

creased by 150 percent. Symantec observed that there was a vast increase in toolkit at-tacks during the first half of the month (primarily targeting the information services

sectors). The increased toolkit attacks observed since

the previous month continued to primarily target a social networking site popular in the United States. This toolkit attack is in all likeli-

hood related to a specific Command & Control server being reactivated. These attacks tar-geted towards the information services sec-

tor, facilitates attackers in the collection of personal data to leverage further spamming activities.

Symantec recently observed an increase in phishing attacks abusing legitimate SSL

certificates. Fraudsters have targeted the us-

ers of major brands by compromising Web servers with SSL certificates so that the fraudulent Web pages can display the familiar

padlock icon, while offering a false sense of security to the victims. In this particular attack, the certificates were

legitimate because they matched the compro-mised legitimate domain. The fake pages that were spoofing the target brands in actuality

had no connection with the displayed domain or the certificate. A single compromised Web server with an SSL certificate can be used to

host a broad range of phishing sites, and, can have a higher success rate to trick users gain trust in the fake site. Web servers using SSL

certificates generally have strong security measures so they do not tend to be compro-mised as frequently as non-SSL sites and in

the larger picture represent a relatively small percentage of all phishing attacks.

Weekly Behavior of Phishing Toolkit Activity

Page 4: Highlighted in the August 2009 report - Symanteceval.symantec.com/mktginfo/enterprise/other_resources/b...Phishers today use IP addresses as part of the hostname instead of a domain

Phishers today use IP addresses as part of the hostname instead of a domain name. This is a

tactic used to hide the actual fake domain name that otherwise can be easily noticed. Also, many banks use IP

addresses in their Web site URLs.

A total of 1067 phishing sites were hosted in 61 countries. This amounted to a decrease of approxi-

mately 29 percent of IP attacks in comparison to the previous month. The Greater China region ac-

counted for approximately 9 per-cent of IP attacks in the month. The total number of IP attacks origi-nating from this region reduced by

10 percent as compared to the pre-vious month. Panama and Peru are new members in the list of top five

countries making their debut appearances at the third and fourth positions respectively.

The top cities hosting Phish sites were Taipei, Jacksonville and Houston. Symantec observed

that Phish sites with IP domains continued to originate from newer cities every month.

Phishing Attacks Using IP Address Domains

Page 5: Highlighted in the August 2009 report - Symanteceval.symantec.com/mktginfo/enterprise/other_resources/b...Phishers today use IP addresses as part of the hostname instead of a domain

For phishers, usage of free Web-hosting ser-vices has been the easiest form of phishing in

terms of cost and technical skills required to develop fake sites.

A total of 130 different Web-hosting services served as the home for 2,402 phishing sites in the month of July. Symantec observed that there was a 14% decrease in the number of

free Web-hosting services utilized for

Phishing sites were analyzed based upon the

geo-location of their web hosts as well as the

1. Geo-Location of Phishing Lures

Leading this area are the USA (35 percent), Germany (5 percent) and Romania (5 per-

cent). In July, there was a considerable in-crease observed in the proportion of phishing

2. Geo-Location of Phishing Web Hosts The top countries are USA (42 percent), Ger-many (6 percent) and Romania (4 percent).

developing phishing sites. More than 85 brands were attacked using this method in

the reporting period. However, this form of attack is not as widely used as it frequently requires manual efforts to prepare the phish-

ing Web page, unlike the automated kit gen-erated websites. Many free web hosts have also improved their preventative and correc-tive anti-phishing measures significantly de-

creasing the lifespan of phishing sites on their systems.

number of unique URL’s (referred to in this

report as “lures”) utilized to lure victims to the phishing web hosts.

lures for Hungary, making an introduction at the ninth position. The proportion of active

phishing lures remained fairly evenly distrib-uted for the rest of the locations.

There was a considerable increase observed in the proportion of phishing hosts for Romania

and Poland. In July, the distribution of web hosts was evenly distributed for rest of the locations.

Phishing Exploits of Free Web-Hosting Services

Global Distribution of Phishing Sites

Page 6: Highlighted in the August 2009 report - Symanteceval.symantec.com/mktginfo/enterprise/other_resources/b...Phishers today use IP addresses as part of the hostname instead of a domain

Phishing attacks in French, Italian

and Chinese languages were found to be higher in July. French language attacks once again returned to the

top position. Symantec observed that phishing websites in French and Italian remained higher for some popular financial brands. Phishing

attacks in Chinese languages pre-vailed from the e-commerce sector.

Phishing URLs were categorized based on the Top-Level Domains (TLD). TLDs are the last part of an Internet domain name; i.e., the let-

ters that follow the final dot of any domain name.

E.g., in the domain name www.example.com, the Top-Level Domain is .com (or COM, as do-main names are not case-sensitive). Country

Code Top-Level Domains (ccTLD) are used by a country or a territory.

Non-English Phishing Trends

Top-Level Domains of Phishing Sites

Geo-Location of Phishing Web Hosts

Page 7: Highlighted in the August 2009 report - Symanteceval.symantec.com/mktginfo/enterprise/other_resources/b...Phishers today use IP addresses as part of the hostname instead of a domain

They are two letters long, for example .us is for the United States. Generic Top-Level Do-

mains (gTLD) are used by aparticular type of organization (.com for a commercial organiza-tion).

1. Generic Top-Level Domains (gTLDs)

The generic TLDs .com, .net and .org were the most utilized with (72 percent), (10 percent)

and (7 percent) of the total phish attacks re-spectively.

2. Country Code Top-Level Domains (ccTLDs)

The German, Korean and United Kingdom ccTLDs were evaluated

to be the highest in phishing attacks with (10 percent), (8 per-cent) and (8 percent)

respectively.

It is three or more letters long. Most gTLDs are available for use worldwide, but for his-

torical reasons .mil (military) and .gov (government) are restricted to use by the re-spective U.S. authorities.

Comparisons of Top-Level Domains of Phishing Sites

Overall TLDs

The most used TLDs in phishing sites in the month of June were, .com, .net and .org compris-ing of (53 percent), (8 percent) and (5 percent) respectively.

The Top-Level Domains in phishing were then further categorized:

Page 8: Highlighted in the August 2009 report - Symanteceval.symantec.com/mktginfo/enterprise/other_resources/b...Phishers today use IP addresses as part of the hostname instead of a domain

The top countries of brands attacked in July were the USA, UK and Italy. There were 30 countries whose brands were attacked. As

seen in the previous months, the trend of the sectors targeted is similar throughout the countries of brand origin except for those be-

longing to Germany and China.

There was a combination of banking, e-commerce and information services sectors in German brands. In China, the e-commerce

sector has been a primary target. However, in July, Symantec observed a few phishing sites targeted towards a large Chinese financial

brand.

Country of Targeted Brands The brands that phishing sites spoofed were categorized based on the country in which the brand’s parent company is based.

Page 9: Highlighted in the August 2009 report - Symanteceval.symantec.com/mktginfo/enterprise/other_resources/b...Phishers today use IP addresses as part of the hostname instead of a domain

Phishing Toolkits: Phishing toolkits are auto-mated toolkits that facilitate the creation of phishing Websites. They allow individuals to

create and carry out phishing attacks even without any technical knowledge.

Unique Phishing Web site: The phishing Web-sites that have a unique Web page are classi-fied as “Unique Phishing Websites”. URLs

from phishing toolkits that randomize their URL string are observed to point to the same Web page and do not contain a unique Web

page in each URL. Unique Phishing websites are the ones where each attack is categorized on distinct Web Pages.

Web-Hosting: Type of Internet hosting ser-vice which allows individuals and organiza-tions to put up their own websites. These

websites run on the space of Web host com-pany servers accessible via the World Wide Web. There are different types of Web host-

ing services namely, free Web hosting, shared Web hosting, dedicated Web hosting, man-aged Web hosting, etc. of which the free Web

hosting service is commonly used to create phishing websites.

Typo-Squatting: Typo-squatting refers to the practice of registering domain names that are typo variations of financial institution web-sites or other popular websites

Phishing Lure: Phishing lures are URLs distrib-uted in spam/phishing email utilized to lure victims to fraudulent phishing websites.

Top-Level Domain (TLD): Sometimes referred to as a Top-Level Domain Name (TLDN): It is the last part of an Internet domain name; that

is, the letters that follow the final dot of any domain name. For example, in the domain name www.example.com, the Top-Level Do-

main is com (or COM, as domain names are not case-sensitive).

Country Code Top-Level Domains (ccTLD): Used by a country or a dependent territory. It is two letters long, for example .us for the

United States.

Generic Top-Level Domains (gTLD): Used by a particular class of organizations (for example,

.com for commercial organizations). It is three or more letters long. Most gTLDs are available for use worldwide, but for historical

reasons .mil (military) and .gov (governmental) are restricted to use by the respective U.S. Authorities. gTLDs are sub

classified into sponsored Top-Level Domains (sTLD), e.g. .aero, .coop and .museum, and un-sponsored Top-Level Domains (uTLD), e.g.

.biz, .info, .name and .pro.

Glossary of Terms