Explore the latest news and trends  

Sign up for our weekly security newsletter


Be the first to receive important updates on security





Send

Analysis Discovers over 3,200 Distinct Phishing Toolkits

 

E-mail phishers keep searching more effective techniques to earn greater profits. Often they use previously used material whereby they package website resources with some phishing kit then send it to one central server from where they dispatch fresh phishing e-mails.

 

Occasionally, carelessness on their part causes the kits to be left behind resulting in getting detected and analyzed. Duo Security a trustworthy specialist giving solutions for making access conducted an experiment spanning a month and located the origins of such abandoned kits. Locating was easy for, it was more-or-less inexpensive to access hijacked websites; easy to gain admission into e-mail accounts from where phishing e-mails could then be dispatched; and quite easy for creating phishing kits that were mostly sold/shared over bargains.

 

Duo Security's study discovered over 3,200 distinct phishing kits, traced the perpetrators of those kits, located the websites where the kits had been re-used, and more. For setting up one fresh phishing website, attackers start by making a replica of the real website that they then spoof. Thereafter, they modify the login field that would connect with an uncomplicated PHP script, which garners credentials followed with e-mailing them back into attacker's account alternatively, creates one text file where they're logged in. Betanews.com posted this, October 31, 2017.

 

Having analyzed a total of 66,000 web addresses available on threat intelligence websites, Duo discovered over 7,800 phishing toolkits. This shows several URLs following separate paths, get sometimes deposited to aggregators of threat intelligence causing the same toolkit getting found several times, while certain phishing toolkits get used again and again on many websites.

 

Duo found many phishing toolkits to have one .htaccess file which disables connections on the basis of attributes to HTTP requests. The number of these disabled Internet Protocols includes those of providers of threat intelligence such as Netcraft, Phishtank and Abuse.ch. The purpose for all this is towards maintaining the activity of phishing URLs.

 

Duo further discovered that hackers were aiming attack on WordPress type of widely-used content management services that were easy to target incase not updated. The industry fashion of using more-and-more of HTTPS is as well occurring with phishing websites.

» SPAMfighter News - 11/7/2017

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page
Next