NordVPN Promotion

Home / Blogs

Phishing: the Worst of Times in the DNS

The Anti-Phishing Working Group has released its latest Global Phishing Survey, written by myself and Rod Rasmussen. This report comprehensively examines a large data set of more than 250,000 confirmed phishing attacks detected in 2015 and 2016. By analyzing this cybercrime activity, we have learned more about what phishers have been doing, and how they have done it. Unfortunately, there’s more phishing than ever, and phishers are registering more domain names than ever.

Our major findings include:

1. In 2016, the number of phishing attacks, and the number of domain names used for phishing, reached an all-time high.

2. Malicious domain name registrations are also at an all-time high, indicating detection and mitigation problems at certain registrars and registries. Historically, most phishing has occurred on conpromised domains, where phishers broke into innocent registrants’ web hosting. But increasingly, phishers just go and register the domains they need. This major shift is concerning, and it means abuse detection and mitigation efforts are failing especially at certain registries and registrars.

3. Phishing in the new top-level domains (nTLDs) is rising and becoming more pervasive, but is not yet as pervasive as it is in the domain space as a whole. By the end of 2016, almost half of the nTLDs that were available for open registration had phishing in them. The nTLDs are also a place where phishers are purchasing domain names for themselves. Of the 6,549 domains used for phishing in the nTLDs in 2016, 86% (5,633) were registered maliciously.

4. New companies are constantly being targeted by phishers, while a few brands face an onslaught of thousands of attacks per year.

5. Contrary to conventional wisdom, phishers often wait up to three weeks before using domain names they have registered.

Full statistics and analysis of each of these topics—including breakdowns by TLDs and registrars—are included in the report.

In the meantime, phishers are employing another new trick that uses the domain name system. We call this “domain shadowing,” and is when a phisher manipulates an unsuspecting company’s DNS settings to insert multiple phishing sites onto the company’s servers. This often results in hundreds of new phishing sites at a time.

Our statistics under-count the total amount of phishing that occurred in the wild—more attacks were undetected by our sources, and more attacks were reported but not confirmed. The numbers are a baseline compiled through collection and counting methods that have remained consistent over the years.

Those who operate Internet resources have the responsibility to do so in a secure and wise manner. We hope this report is helpful and provides information that will make the Internet a better place.

By Greg Aaron, President, Illumintel Inc.

Filed Under

Comments

.BRAND new gTLDs are the solution... Jean Guillon  –  Jun 27, 2017 1:33 PM

Comment Title:

  Notify me of follow-up comments

We encourage you to post comments and engage in discussions that advance this post through relevant opinion, anecdotes, links and data. If you see a comment that you believe is irrelevant or inappropriate, you can report it using the link at the end of each comment. Views expressed in the comments do not represent those of CircleID. For more information on our comment policy, see Codes of Conduct.

CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

Related

Topics

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

Threat Intelligence

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

NordVPN Promotion