Story image

Phishing declines, but targets increase - report

11 Jun 18

Article by RiskIQ threat analyst Andrew Geiger

Phishing actors are always innovating and creating new methods to lure victims into gaining access to their financial information, personally identifiable information, and user accounts.

Understanding the latest phishing techniques and threat actor tendencies helps position customers to stay one step ahead of phishing threats targeting their organisations.

The first 2018 quarterly iteration of the Phishing Roundup details the trends in phishing activity as observed by RiskIQ over Q1 of 2018, drawing upon data used in the Q4 Report of 2017 for comparison and recapping trends that have been seen entering into the new year.

More diversity in targets

For the second quarter in a row, Q1 saw a slight decrease of over 2% in overall phishing detections from Q4 of 2017, with 26,671 unique domains identified.

The data we observed, however, was much richer than in the past regarding targeted brands.

During Q1, RiskIQ saw a total of 299 unique brands targeted through phishing pages, up from the 259 brands we observed in Q4 of 2017.

The breakdown of the top 10 targeted brands is as follows:

  • 40% financial institutions
  • 20% digital transaction providers
  • 10% large tech company
  • 10% major health insurance provider
  • 10% cloud storage provider
  • 10% social media platform

As usual, the same financial institutions make up a significant portion of the top-ten targeted brands for Q1 of 2018 and much of the social media targeting trend that we observed in Q4 of 2017 is now mostly gone, which may indicate a return to tried and trusted tactics by threat actors.

However, the top 10 percentage breakdown for Q1, which includes the arrival of cloud storage providers which were not present last quarter, may indicate an overall more diverse detection of targeted brands.

This diversity of targets helps RiskIQ’s detection models improve their ability to detect phishing attacks.

Detections by registrar

Hostinger proved to be a flash in the pan in Q4 2017, leading the list of registrars used by phishing URLs and then dropping out of the top-five entirely.

GoDaddy, which is no stranger to the top of this list, reclaimed its place ahead of the pack, which isn’t surprising as phishing attacks, as well as the infrastructure used therein, tend to be extremely cyclical.

Detections by hosting provider

The list of top hosting providers used by phishing actors in Q1 saw more changes, with all five spots in flux and three of the five new to the list.

Phishing actors are constantly changing infrastructure, so they have shopped elsewhere in Q1 rather than using the same tools from Q4.

Tensions on the rise after Huawei CFO arrest
“Recently our corporate CFO, Meng Wanzhou, was provisionally detained by the Canadian authorities on behalf of the United States of America."
Palo Alto Networks integrates RedLock and VM-Series with AWS Security Hub
AWS Security Hub is designed to provide users with a comprehensive view of their high-priority security alerts and compliance status.
Juniper simplifies data integration to improve threat detection
Updates to the Juniper Advanced Threat Prevention Appliances leverage third-party firewalls and security data sources.
Is mobile shopping compromising your enterprise security?
When employees do their holiday shopping on company resources, security teams have a challenge with the surge in browsing and online transactions.
Different approach to malware detection needed – VMware
Security needs to move away from the traditional approach of chasing after arbitrary forms of malware.
Modernising ERP systems can help organisations comply with GDPR
“Organisations need to look for modern ERP systems that are specifically designed with GDPR in mind."
APRA Prudential Standard CPS 234: How to communicate with the board
The Australian Prudential Regulation Authority’s standard, CPS 234, is aimed at minimising the threat of cyber attacks for APRA-regulated entities.
Cyber attacks develop complexity, target Windows sysad tools - report
The report explores changes in the threat landscape over the past year, uncovering trends and how they are expected to impact cybersecurity in 2019.