Phishers continue to target legitimate websites
Posted on 19 September 2012.
Attackers confidently exploit legitimate websites with the same methods and that they succeed because victims are not implementing recommended best practices, countermeasures and responses, according to the APWG.

“Phishers continue to target legitimate websites because they are much harder for interveners to take down. They remain confident that they’ll be able to identify and exploit sites, and for good reason. Victims are not taking measures to secure their sites from attack, and they remain lax in monitoring against and mitigating attacks,” said APWG Research Fellow Dave Piscitello of ICANN.

From August 2009 through July 2012, the APWG’s Internet Policy Committee (IPC) surveyed managers of websites of websites that had been compromised and subsequently used to host phishing pages. The report compares two sampling periods to study change in attacker methodology, victim hosting environments, and incident response by victims or their hosting providers.

The survey results indicate that LAMP - Linux, Apache, MySQL, PHP - remains the most frequently targeted hosting environment. However, closer examination of the responses reveals that attackers most frequently leave PHP shell code (i.e., a backdoor written in the PHP scripting language), phishing kits (web pages or scripts that are used to execute the phishing attack itself), or a mechanism to send email to animate a phishing attack.

“The high frequency of PHP exploits underscores our previous recommendations: you must keep all components of your website - OS, web server, applications, and especially active content - patch current and configured securely,” concluded Mr. Piscitello.

The majority of victims continue to report that they were unaware that their website had been compromised until an external party notified them. “More than 80 percent of incidents are being detected by third parties, and that percentage increased over the past year,” reports APWG IPC Co-Chair Rod Rasmussen of Internet Identity. “We are concerned that hosting providers and site owners are becoming more complacent and vulnerable, and we urge administrators to be more proactive.”

Take down time for phishing pages remains unchanged. Victims report that forty percent of phishing pages are taken down within a day and nearly sixty percent within 2-3 days, but nearly one in four victims could not say with accuracy when pages were removed. The report examines this and other disturbingly high incidences where victims reported they had insufficient data to answer survey questions.

“Take the frequency of ‘I don’t know’ responses in the survey and factor in that the majority of attacks are reported by external parties,” said IPC Co-Chair Greg Aaron of Illumintel, Inc. “Too little time or talent is invested to monitor and analyze web traffic and visitor behavior.”





Spotlight

How security analytics help identify and manage breaches

Posted on 30 July 2014.  |  Steve Dodson, CTO at Prelert, illustrates the importance of security analytics in today's complex security architectures, talks about the most significant challenges involved in getting usable information from massive data sets, and much more.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Thu, Jul 31st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //