|
The new Anti-Phishing Working Group (APWG) Global Phishing Survey has just been released. Written by myself and Rod Rasmussen of IID, the report is the “who, what, where, when, and why” look at phishing, examining the second half of 2014. The report has many findings, but here I’ll concentrate on the new gTLDs.
The second half of 2014 was when an appreciable number of new gTLDs entered general availability and started to gain market share. Phishing in the new gTLDs started slowly and is rising. We expect to see phishing levels in them rise further, and predict that a small number of these new TLDs will attract significant numbers of malicious registrations.
Phishing can be on domain names registered by phishers, and can be on compromised (hacked) domains, where the phishers broke into the web servers. As of December 2014, the new gTLDs had less phishing relative to the legacy gTLDs and ccTLDs. But this was to be expected, since the new gTLDs are very young and didn’t have a lot of web sites that can be compromised by phishers. As they mature and garner more adoption, more new gTLDs will inevitably see more of their domains compromised for phishing, and phishing levels in the new gTLDs as a group may approach levels see in ccTLDs and the legacy gTLDs.
From 1 July to 31 December 2014:
The expansion of the TLD space is creating new locations where phishing occurs in the DNS. Cyber-criminals have always moved from TLD to TLD over time, especially when they find low prices or vulnerable registries. What it means is that monitoring and mitigation efforts by registries and registrars matter, and all new gTLD operators need to remain vigilant about phishing.
Two important notes:
The new report contains statistics for all TLDs, including number of domains used, uptimes, and more.
Sponsored byIPv4.Global
Sponsored byDNIB.com
Sponsored byCSC
Sponsored byVerisign
Sponsored byVerisign
Sponsored byWhoisXML API
Sponsored byRadix