The Anti-Phishing Working Group is reporting that phishingattack frequency dropped 20% from late 2012 to early 2013.

|

Unique phishing attacks also continued the drop in the firstquarter of 2013, falling 31% from January through March.

|

Phishing, a fraudster favorite, usually involves sending outmass emails aimed at inducing victims to visit a scamster websitewhere they are asked to reveal personal details (such as financialaccount log ins). This has long been a staple in onlinefraud.

|

According to the APWG, the drop in phishing is due to a drop in virtual serverphishing attacks, where a criminal seizes control of a Web serverthat hosts many unique domains and then creates phishing pages forthose domains.

|

This accordingly constituted mass attacks on domains. That thereare fewer virtual server based phishing attacks does notnecessarily mean criminals are having less luck breaking throughthose defenses.

|

“The drastic decrease likely indicates that cybercriminals areutilizing the servers they compromise not for phishingattacks, but rather for more malware or distributed denial ofservice attacks,” said Rod Rasmussen, CTO of Internet Identity, inan APWG press release.

|

Payment services constituted the most phished kind of businessin Q1 2013, with roughly 45% of attacks. Financial servicesplaced second with 24% of attacks.

|

The full text of the APWG report is here.

Complete your profile to continue reading and get FREE access to CUTimes.com, part of your ALM digital membership.

  • Critical CUTimes.com information including comprehensive product and service provider listings via the Marketplace Directory, CU Careers, resources from industry leaders, webcasts, and breaking news, analysis and more with our informative Newsletters.
  • Exclusive discounts on ALM and CU Times events.
  • Access to other award-winning ALM websites including Law.com and GlobeSt.com.
NOT FOR REPRINT

© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.