New Monthly Fraud Intelligence Report Now Available

Staff Writer
By Staff Writer

Brand Protection | malware | botnet |

Beginning this month, MarkMonitor will be sharing a new, monthly Fraud Intelligence Report with customers and other interested parties in our blog. The goal of the report is to provide timely analysis of developing trends and new threats in the fraud landscape. The Fraud Intelligence Report will complement the current MarkMonitor analysis as provided in the semi-annual Brandjacking Indexå¨ reports and customer reports.

The headline findings of the April 2010 Fraud Intelligence Report are:

Phishing Attack Volume Continues to Grow

Phishing attack volume increased 33% to 36,557 attacks in April, continuing the growth trend from March; however, phishing attack volume has not returned to the level seen in April 2009.

Fewer Organizations Targeted

The number of targeted organizations decreased 9% to 270 in April, reversing a growth trend that began after December 2009, but the current level has returned to the level seen in April 2009.

Attacks per Organization Grow

Monthly attacks per organization grew 27% to 135 in April, suggesting a return to concentrated attacks on lucrative targets.

Payment Services Sector Continues as Most Popular Phishing Sector

The Payment Services sector was the primary sector favored by phishers, accounting for 41% of phish attacks in April. The Financial sector, historically the most popular phishing sector, accounted for 33% of phish attacks.

Social Network Phish Volume Declines

Phish targeting social networks declined 24% to 1,379 attacks in April, reversing the steep growth observed in March.

The US Continues to be Most Popular Phish Hosting Country

The US continued as the predominant country hosting phishing sites, accounting for 52% of phishing attacks in April. A notable new development was that Bulgaria grew almost 9,600% to jump from the #47 position to #2 and accounted for 6% of total phish.

An important major trend underlying the above points is that phishers have shifted their primary attack vector from fast-flux botnets to hacked websites. Phishing attacks hosted on fast-flux botnets hide behind a cloud of rapidly changing proxies but ultimately present a single point of failure the malicious domain. Cybercriminals registered domains for multiple fast-flux phishing attacks targeting many brands. But these domains, and the multiple phishing attacks they hosted, could be detected (often preemptively), Fraudcasted, and shut down in high volumes.

In the meantime, hacked website-based phishing attacks became more prevalent. In these attacks, cybercriminals compromise legitimate domains and host their phish attacks on the subdomains. This effectively removes the single point of failure in fast-flux phishing attacks now there is no malicious domain to detect, Fraudcast, and shut down. From the fourth quarter of 2009 onwards, the MarkMonitor Security Operations Center observed a dramatic decline in phishing attacks hosted on fast-flux botnets and an equally dramatic rise in phishing attacks hosted on hacked websites.

Download the report here: MarkMonitor Fraud Intelligence Report, April 2010

Brand Protection, malware, botnet,

 

Related Post

Branddy Spence 3 min read 09 Sep, 2020

The Evolution of E-Commerce amid COVID-19

OpSec Connect: The evolution of e-commerce amid COVID-19

In the second webinar of the...

Online Brand Protection, Brand Protection

Branddy Spence 5 min read 08 Aug, 2020

Leadership in licensing: A conversation with Maura Regan

A fun-filled and insightful conversation on modern leadership in the licensing...

Licensing, Brand Protection,

Stefanie Wood Ellis 3 min read 08 Aug, 2020

Why SSL Certificates Have Become the New Frontier of Phishing

In 2020 so far, over half of all phishing sites the OpSec Online AntiFraud Security...

Brand Protection, consumer protection,

Get All News Updated to your inbox