Phishing Trends Report

Size: px
Start display at page:

Download "Phishing Trends Report"

Transcription

1 Phishing Trends Report Analysis of Online Financial Fraud Threats Second Quarter, 2009 For more information, please contact: Internet Identity and the Internet Identity logo are trademarks of Internet Identity. All other registered trademarks are property of their respecitve owners. Copyright 2009, Internet Identity. All rights reserved

2 HIGHLIGHTS Avalanche kit phish attacks account for 28% of all phishing o 16 new companies targeted with Avalanche kit o 8 of top 10 phishing targets victimized by Avalanche Phishing Activity increased 17% from April to June o Non Avalanche attack volume increased 22% from April 1 to June 30 o Avalanche attack volume increased 6% from April 1 to June 30 Top countries hosting phishing attacks (by IP address location) o US - 38% o Germany - 5% o Russia - 5% 18 of the top 50 attacked brands were non-us banks o PayPal still the number one target, but outpaced by top 10 banks o Commercial banking platforms are increasingly targeted Registrars that harden themselves against abuse see sharp reductions in volume o Policies and procedures enacted to suspend domain names within 24 hours of registration o Strengthened account sign-up and initial domain registration verification requirements Internet Identity - Phishing Trends Report - Second Quarter 2009 Page 2

3 THE DOMINANT THREAT TACTIC: AVALANCHE Avalanche sites are the latest in mass-production phishing and malware distribution techniques. Phishing sites on Avalanche domains are targeting commercial banking platforms of over 30 financial institutions, major on-line services, and job search providers. Social engineered malware downloads are also being distributed from these same domains. These attacks involve fraudulent domain names, set up on fraudulent name servers, with the hosting locations of the sites constantly fluctuating ( Fast-Flux ). The Fast-Flux technique makes a mitigation effort more complex than calling the Internet Service Provider to get a site or IP blocked; in Fast-Flux attacks, the domain name itself must be suspended at the registrar or registry level. The Avalanche phish kit accounted for 28% of all phishing activity seen during Q2. Regardless of the current spam target, Avalanche domains are registered targeting over 30 companies, 16 of which joined the targeted group in Q2. Included in the group is malware from spam X-Files ~ The truth is out there? Who Killed Michael Jackson? Malware download attacks were also launched against Microsoft with a bogus Windows Update. Avalanche in Focus Each fraudulent domain contains unique phishing URL paths for several of over 30 targets in total Several fraudulent domains registered per day Targets commercial banking platforms, e-commerce providers, malware drops DNS set-ups are also fraudulent Fast-flux site hosting Spam barrages rotating between targets Cash-out attempts typically occur within 10 minutes of credential harvest At the end of Q2, a given Avalanche site supports 34 distinguishable standard paths in the URL. An Avalanche attack wave consists of many such domain names that appear almost identical next to each other, (e.g. 11fjfhi.com, 11fjfhj.com, 11fjfh1.com, 11fjfhl.com). These domains may denote a pattern by a criminal group that intends to confuse staff members at registrars, providers, and security firms. Interestingly, software systems are not at all flummoxed by this kind of subterfuge, and these domain name groupings become easy to single out for security analysts at registrars and registries who know what to look for and are actively looking. While only one or two brands are typically spammed at any one time during an Avalanche attack, the miscreants rotate back to older targets frequently. If an Avalanche domain remains active over a long period of time, spam for other targets may be sent using it. This makes it necessary to go after Avalanche domains even with a lack of current spam you can knock them down prior to an attack against your brand. The Avalanche attackers are also extremely good at cashing out accounts. They have detailed knowledge of commercial banking platforms, particularly treasury management systems and the ACH system. They are also performing successful real-time man-in-the-middle attacks that defeat two- Internet Identity - Phishing Trends Report - Second Quarter 2009 Page 3

4 factor security tokens. Reports indicate that very serious losses are likely when you are targeted by this group. GEOGRAPHIC BREAKDOWN: WHERE PHISH LIVED Historically, approximately 40% of all worldwide phishing has been hosted in the United States. This trend held in the second quarter of 2009, with compromised webservers and fraudulent virtual hosting account setups in Germany, Russia, and Spain comprising the next largest block. The rate of Avalanche domain names set up with registrars in the U.S. has been as low as 9% of the total volume of Avalanche domains. Instead, they have been focusing on specific domain registrars in European countries, along with South Korea, Pakistan, India, Turkey, and Mexico. The criteria for choosing a registrar to victimize seem to depend on the registrar s account verification procedures and the responsiveness of its abuse department. DOMAIN REGISTRARS AND AVALANCHE The pattern seen with Avalanche involves targeting one to three providers for the bulk of an attack set, but also targeting a small number of other providers to test their suitability for future attacks. Once the provider(s) carrying the majority of the domain names starts to actively take down sites and implement other security procedures discussed below, Avalanche will move on to one or two of the previously tested providers, seemingly based on the results of their previous tests. To illustrate, on April 30, Avalanche registered domains with five different providers, among them were Enom and DomainTheNet (shown on Avalanche Provider Rotation graph below in orange and purple). Deactivation times directly impacted the subsequent attack set, as the sites that were registered through Enom for the test had a very short life May 4 and 5. Consequently, the next attack group on May 6 singled out DomainTheNet, the provider with slower anti-abuse practices. Enom was later targeted for a larger attack set of approximately 30 domains per day, along with all of the other providers tested for domain registrations. Many times a provider will be tested repeatedly or will not see an Avalanche domain for months, as was the case with Interdomain.es. They were first tested in January, but did not experience a wave of attacks until March 17, almost two months after their first test. Once a large-scale attack struck Interdomain, active site times dramatically increased and the attacks continued for over a month (see Interdomain below). One point is clear: with any provider, the faster Avalanche sites are taken down, the faster that provider exits the business of registering these malicious domains. Internet Identity - Phishing Trends Report - Second Quarter 2009 Page 4

5 TARGETED INDUSTRIES Phishing and malware related attacks targeted 412 distinguishable brands during Q2. Of the top 50 attacked brands, which make up 93% of phishing for the quarter, 18 were non-us banks, making up 24% of phishing. Other notable phishing targets include Twitter, Facebook, Friendster, Hi5, PhotoBucket, Skype, the Internet Identity - Phishing Trends Report - Second Quarter 2009 Page 5

6 IRS, and Match.com. Additionally, eight of the top 10, and over half of the top 50, most attacked brands are included in the Avalanche kit. The trend shows a decrease in the share of phishing for e-commerce and money transfer, as there has been a shift towards commercial banking platforms. Criminals have likely realized that there can be more money to steal from a small business account than a personal bank account or payment service account. Criminals have also identified new ways to move money from these accounts, primarily through ACH transfer often to bogus payroll set-ups that pay their money mules directly. However, phishing for personal credentials of e-commerce or money transfer sites are not declining, there is simply faster growth in other areas. As seen previously, phishing volume overall continues to increase. TOP LEVEL DOMAIN (TLD) TRENDS As usual, the.com TLD was used in nearly half of all phish. The beginning of Q2 saw.eu at 11%, but.net was observed at 18% in June with.eu dropping below 2% - largely attributable to Avalanche patterns. Other notable TLDs that have been vigilant against phishing, and therefore were little used by phishers, are.info,.biz, and.mobi. Avalanche phishing will often use the same secondary label but under different TLDs. It is common practice for them to register.com,.net,.org, and other cctlds for a domain. Restricted cctlds, which generally require documentation and proof of residency before granting registrations, have been successful in avoiding fraudulent registrations. Internet Identity - Phishing Trends Report - Second Quarter 2009 Page 6

7 Front Line Report: Interdomain Beats Back the Avalanche by C. Sills, Anti-Phishing Operations Manager In March 2009 our team started working with Interdomain in Spain as the latest target for domain registrations by the Avalanche group. Our team reached out to them, explained how the Avalanche group attacks registrars, and offered to report the fraudulent domains in whatever method helped them best so that we could make the Avalanche move away as soon as possible. Unfortunately, the policies at Interdomain were not proving to be effective at suspending domains. As April began we continued high-level contacts with Interdomain about what needed to change in their policies in order to have domains suspended quicker. Usually these situations end in the registrar adding language to their Acceptable Use Policy about having the authority to disable a domain or an account if they determine fraudulent activity is taking place. Sometimes the policy change is for immediate suspension of a domain if false WHOIS data is provided (instead of following a much lengthier ICANN reporting procedure). Interdomain had a different plan though, one that we had not encountered before. They started requiring a Cell Phone number during account creation, to which they would send a text message with a confirmation code needed to then verify the creation of the new account. This function effectively broke the process that the Avalanche group was using for their automated registrations. Interdomain implemented their new verification process on April 22, The next day, the Avalanche ceased using Interdomain to register its fraudulent domains. Interdomain s increased verification efforts forced the Avalanche to move to a new registrar since they could not abuse the services of Interdomain any further. We applaud Interdomain for their innovation and commitment to fighting fraud! Internet Identity - Phishing Trends Report - Second Quarter 2009 Page 7

PHISHING IN SEASON TAX TIME MALWARE, PHISHING AND FRAUD

PHISHING IN SEASON TAX TIME MALWARE, PHISHING AND FRAUD PHISHING IN SEASON TAX TIME MALWARE, PHISHING AND FRAUD April 2013 As cybercriminals will have it, phishing attacks are quite the seasonal trend. It seems that every April, after showing a slight decline

More information

WHITE PAPER. The Cost of Phishing: Understanding the True Cost Dynamics Behind Phishing Attacks

WHITE PAPER. The Cost of Phishing: Understanding the True Cost Dynamics Behind Phishing Attacks WHITE PAPER The Cost of Phishing: Understanding the True Cost Dynamics Behind Phishing Attacks A Cyveillance Report October 2008 EXECUTIVE SUMMARY How much do phishing attacks really cost organizations?

More information

CYBERSECURITY INESTIGATION AND ANALYSIS

CYBERSECURITY INESTIGATION AND ANALYSIS CYBERSECURITY INESTIGATION AND ANALYSIS The New Crime of the Digital Age The Internet is not just the hotspot of all things digital and technical. Because of the conveniences of the Internet and its accessibility,

More information

ACCEPTABLE USE AND TAKEDOWN POLICY

ACCEPTABLE USE AND TAKEDOWN POLICY ACCEPTABLE USE AND TAKEDOWN POLICY This Acceptable Use and Takedown Policy ( Acceptable Use Policy ) of Wedding TLD2, LLC (the Registry ), is to be read together with the Registration Agreement and words

More information

Evaluating DMARC Effectiveness for the Financial Services Industry

Evaluating DMARC Effectiveness for the Financial Services Industry Evaluating DMARC Effectiveness for the Financial Services Industry by Robert Holmes General Manager, Email Fraud Protection Return Path Executive Summary Email spoofing steadily increases annually. DMARC

More information

BEST SECURITY PRACTICES IN ONLINE BANKING PLATFORMS

BEST SECURITY PRACTICES IN ONLINE BANKING PLATFORMS BEST SECURITY PRACTICES IN ONLINE BANKING PLATFORMS TABLE OF CONTENTS BEST SECURITY PRACTICES Home banking platforms have been implemented as an ever more efficient 1 channel through for banking transactions.

More information

Measures to Protect (University) Domain Registrations and DNS Against Attacks. Dave Piscitello, ICANN [email protected]

Measures to Protect (University) Domain Registrations and DNS Against Attacks. Dave Piscitello, ICANN dave.piscitello@icann.org Measures to Protect (University) Domain Registrations and DNS Against Attacks Dave Piscitello, ICANN [email protected] Why are we talking about Domain names and DNS? Domain names and URLs define

More information

2009 Phishing Monthly Report, May. The State of Phishing A Monthly Report May 2009. Compiled by Symantec Security Response Anti-Fraud Team

2009 Phishing Monthly Report, May. The State of Phishing A Monthly Report May 2009. Compiled by Symantec Security Response Anti-Fraud Team The State of Phishing A Monthly Report May 2009 Compiled by Symantec Security Response Anti-Fraud Team Sainarayan Nambiar Principal Author Security Response Suyog Sainkar Principal Author Security Response

More information

Phishing Activity Trends Report for the Month of December, 2007

Phishing Activity Trends Report for the Month of December, 2007 Phishing Activity Trends Report for the Month of December, 2007 Summarization of December Report Findings The total number of unique phishing reports submitted to APWG in December 2007 was 25,683, a decrease

More information

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015 The Cost of Phishing Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015 Executive Summary.... 3 The Costs... 4 How To Estimate the Cost of an Attack.... 5 Table

More information

Acceptable Use Policy and Terms of Service

Acceptable Use Policy and Terms of Service Acceptable Use Policy and Terms of Service Vox Populi Registry Ltd. 3-110 Governors Square 23 Lime Tree Bay Ave. Grand Cayman, Cayman Islands PO Box 1361, George Town, KY1-1108 www.nic.sucks Version 1.0

More information

Anti-Phishing Best Practices for ISPs and Mailbox Providers

Anti-Phishing Best Practices for ISPs and Mailbox Providers Anti-Phishing Best Practices for ISPs and Mailbox Providers Version 2.01, June 2015 A document jointly produced by the Messaging, Malware and Mobile Anti-Abuse Working Group (M 3 AAWG) and the Anti-Phishing

More information

.IBM TLD Registration Policy

.IBM TLD Registration Policy I. Introduction These registration conditions govern the rights and obligations of the Registry Operator, International Business Machines Corporation ( Registry Operator or IBM ), and the accredited registrars,

More information

Fast Flux Hosting and DNS ICANN SSAC

Fast Flux Hosting and DNS ICANN SSAC Fast Flux Hosting and DNS ICANN SSAC What is Fast Flux Hosting? An evasion technique Goal Avoid detection and take down of web sites used for illegal purposes Technique Host illegal content at many sites

More information

Acceptable Use (Anti-Abuse) Policy

Acceptable Use (Anti-Abuse) Policy Acceptable Use (Anti-Abuse) Policy This document describes the Acceptable Use Policy for the Rightside registry. Copyright 2014 Rightside Registry Copyright 2014 Rightside Domains Europe Ltd. Rightside

More information

QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY

QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY EXPLOIT KITS UP 75 PERCENT The Infoblox DNS Threat Index, powered by IID, stood at 122 in the third quarter of 2015, with exploit kits up 75 percent

More information

Review of.au domain name policy framework Submission to.auda

Review of.au domain name policy framework Submission to.auda Review of.au domain name policy framework Submission to.auda 15 June 2007 Background AusCERT is the national Computer Emergency Response Team (CERT) for Australia and a leading CERT in the Asia/Pacific

More information

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks White paper Phishing, Vishing and Smishing: Old Threats Present New Risks How much do you really know about phishing, vishing and smishing? Phishing, vishing, and smishing are not new threats. They have

More information

OIG Fraud Alert Phishing

OIG Fraud Alert Phishing U.S. EQUAL EMPLOYMENT OPPORTUNITY COMMISSION Washington, D.C. 20507 Office of Inspector General Aletha L. Brown Inspector General July 22, 2005 OIG Fraud Alert Phishing What is Phishing? Phishing is a

More information

EMAIL ACCOUNT TAKEOVER TO IDENTITY TAKEOVER

EMAIL ACCOUNT TAKEOVER TO IDENTITY TAKEOVER EMAIL ACCOUNT TAKEOVER TO IDENTITY TAKEOVER March 2013 Phishing attacks are notorious for their potential harm to online banking and credit card users who may fall prey to phishers looking to steal information

More information

Fraud Threat Intelligence

Fraud Threat Intelligence About ERM About The Speaker Safe Browsing, Monitoring Services Product Manager, Easy Solutions Inc. 8+ years anti-fraud, fraud risk, and security intelligence programs Previously licensed Securities Principle

More information

Internet Security and Resiliency: A Collaborative Effort

Internet Security and Resiliency: A Collaborative Effort Internet Security and Resiliency: A Collaborative Effort Baher Esmat Manager, Regional Relations Middle East MENOG 4 Manama, 9 April 2009 1 WHAT IS THIS PRESENTATION ABOUT? ICANN s effort in enhancing

More information

How To Protect Your Online Banking From Fraud

How To Protect Your Online Banking From Fraud DETECT MONITORING SERVICES AND DETECT SAFE BROWSING: Empowering Tools to Prevent Account Takeovers SUMMARY The Federal Financial Institutions Examination Council (FFIEC) is planning to update online transaction

More information

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking Today s bank customers can perform most of their financial activities online. According to a global survey

More information

Making Waves in the Phisher s Safest Harbor: Exposing the Dark Side of Subdomain Registries. An APWG Industry Advisory

Making Waves in the Phisher s Safest Harbor: Exposing the Dark Side of Subdomain Registries. An APWG Industry Advisory Making Waves in the Phisher s Safest Harbor: Exposing the Dark Side of Subdomain Registries An APWG Industry Advisory Committed to Wiping Out Internet Scams and Fraud SUMMARY 3 WHAT IS A SUBDOMAIN REGISTRY?

More information

Domain Name Management for Professionals

Domain Name Management for Professionals Domain Name Management for Professionals Specialists for domain names As domain name management specialists with more than 14 years of experience as a registrar, we provide registration and management

More information

Gladiator NetTeller Enterprise Security Monitoring Online Fraud Detection INFORMATION SECURITY & RISK MANAGEMENT

Gladiator NetTeller Enterprise Security Monitoring Online Fraud Detection INFORMATION SECURITY & RISK MANAGEMENT Gladiator NetTeller Enterprise Security Monitoring Online Fraud Detection INFORMATION SECURITY & RISK MANAGEMENT Gladiator NetTeller Enterprise Security Monitoring Online Fraud Detection Foreword The consumerization

More information

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave

More information

Phishing Activity Trends Report. 4 th Quarter 2014. Unifying the. To Cybercrime. October December 2014

Phishing Activity Trends Report. 4 th Quarter 2014. Unifying the. To Cybercrime. October December 2014 4 th Quarter 2014 Unifying the Global Response To Cybercrime October December 2014 Published April 29, 2015 Phishing Report Scope The APWG analyzes phishing attacks reported to the APWG by its member companies,

More information

NATIONAL CREDIT UNION ADMINISTRATION 1775 Duke Street, Alexandria, VA 22314

NATIONAL CREDIT UNION ADMINISTRATION 1775 Duke Street, Alexandria, VA 22314 NATIONAL CREDIT UNION ADMINISTRATION 1775 Duke Street, Alexandria, VA 22314 DATE: December 2002 LETTER NO.: 02-CU-16 TO: All Federally-Insured Credit Unions SUBJ: Protection of Credit Union Internet Addresses

More information

THE DOMAIN NAME INDUSTRY BRIEF VOLUME 11 ISSUE 2 AUGUST 2014

THE DOMAIN NAME INDUSTRY BRIEF VOLUME 11 ISSUE 2 AUGUST 2014 THE DOMAIN NAME INDUSTRY BRIEF VOLUME 11 ISSUE AUGUST 1 THE VERISIGN DOMAIN REPORT AS A GLOBAL LEADER IN DOMAIN NAMES AND INTERNET SECURITY, VERISIGN REVIEWS THE STATE OF THE DOMAIN NAME INDUSTRY THROUGH

More information

Protect Your Brand Investment with. Brand Monitoring. from DomainTools DOMAINTOOLS SOLUTION BRIEF WWW.DOMAINTOOLS.COM WWW.DOMAINTOOLS.

Protect Your Brand Investment with. Brand Monitoring. from DomainTools DOMAINTOOLS SOLUTION BRIEF WWW.DOMAINTOOLS.COM WWW.DOMAINTOOLS. 1 Protect Your Brand Investment with Brand Monitoring from DomainTools DOMAINTOOLS SOLUTION BRIEF 2 INTRODUCTION: A BRAVE NEW BRANDED WORLD Apple, Coca- Cola, Louis Vuitton. According to a recent report

More information

LASTLINE WHITEPAPER. Using Passive DNS Analysis to Automatically Detect Malicious Domains

LASTLINE WHITEPAPER. Using Passive DNS Analysis to Automatically Detect Malicious Domains LASTLINE WHITEPAPER Using Passive DNS Analysis to Automatically Detect Malicious Domains Abstract The domain name service (DNS) plays an important role in the operation of the Internet, providing a two-way

More information

CYBERCRIMINAL IN BRAZIL SHARES MOBILE CREDIT CARD STORE APP

CYBERCRIMINAL IN BRAZIL SHARES MOBILE CREDIT CARD STORE APP CYBERCRIMINAL IN BRAZIL SHARES MOBILE CREDIT CARD STORE APP August 2014 RSA agents recently traced a threat actor advertising a mobile credit card store application. The cybercriminal shared the information

More information

SAC 025 SSAC Advisory on Fast Flux Hosting and DNS

SAC 025 SSAC Advisory on Fast Flux Hosting and DNS Fast and Double Flux Attacks 1 SAC 025 SSAC Advisory on Fast Flux Hosting and DNS An Advisory from the ICANN Security and Stability Advisory Committee (SSAC) January 2008 Fast and Double Flux Attacks 2

More information

White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation

White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation White Paper Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation Table of Contents Introduction... 3 Common DDoS Mitigation Measures...

More information

ESG Brief. Overview. 2014 by The Enterprise Strategy Group, Inc. All Rights Reserved.

ESG Brief. Overview. 2014 by The Enterprise Strategy Group, Inc. All Rights Reserved. ESG Brief Webroot Delivers Enterprise-Class Threat Intelligence to Security Technology Providers and Large Organizations Date: September 2014 Author: Jon Oltsik, Senior Principal Analyst; Kyle Prigmore,

More information

KASPERSKY FRAUD PREVENTION FOR ENDPOINTS

KASPERSKY FRAUD PREVENTION FOR ENDPOINTS KASPERSKY FRAUD PREVENTION FOR ENDPOINTS www.kaspersky.com 2 Fraud Prevention for Endpoints KASPERSKY FRAUD PREVENTION 1. Ways of Attacking The prime motive behind cybercrime is making money, and today

More information

Phishing The latest tactics and potential business impacts

Phishing The latest tactics and potential business impacts WHITE PAPER: Phishing White paper Phishing The latest tactics and potential business impacts Phishing The latest tactics and potential business impacts Contents Introduction... 3 Phishing knows no limits...

More information

DNS Security Survey for National Computer Security Incident Response Teams December 2010

DNS Security Survey for National Computer Security Incident Response Teams December 2010 DNS Security Survey for National Computer Security Incident Response Teams December 2010 Summary As referenced during the ICANN meeting in Brussels, Belgium in June 2010, ICANN developed a survey on DNS

More information

OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft

OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft OVERVIEW 2 1. Cyber Crime Unit organization 2. Legal framework 3. Identity theft modus operandi 4. How to avoid online identity theft 5. Main challenges for investigation 6. Conclusions ORGANIZATION 3

More information

Microsoft Security Intelligence Report volume 7 (January through June 2009)

Microsoft Security Intelligence Report volume 7 (January through June 2009) Microsoft Security Intelligence Report volume 7 (January through June 2009) Key Findings Summary Volume 7 of the Microsoft Security Intelligence Report provides an in-depth perspective on malicious and

More information

Phishing Scams Security Update Best Practices for General User

Phishing Scams Security Update Best Practices for General User Phishing Scams Security Update Best Practices for General User hishing refers to the malicious attack Pmethod by attackers who imitate legitimate companies in sending emails in order to entice people to

More information

Protect your network: planning for (DDoS), Distributed Denial of Service attacks

Protect your network: planning for (DDoS), Distributed Denial of Service attacks Protect your network: planning for (DDoS), Distributed Denial of Service attacks Nov 19, 2015 2015 CenturyLink. All Rights Reserved. The CenturyLink mark, pathways logo and certain CenturyLink product

More information

THE DOMAIN NAME INDUSTRY BRIEF VOLUME 11 ISSUE 1 APRIL 2014

THE DOMAIN NAME INDUSTRY BRIEF VOLUME 11 ISSUE 1 APRIL 2014 THE DOMAIN NAME INDUSTRY BRIEF VOLUME 11 ISSUE 1 APRIL 2014 THE VERISIGN DOMAIN REPORT AS THE GLOBAL LEADER IN DOMAIN NAMES, VERISIGN REVIEWS THE STATE OF THE DOMAIN NAME INDUSTRY THROUGH A VARIETY OF

More information

Payment Fraud and Risk Management

Payment Fraud and Risk Management Payment Fraud and Risk Management Act Today! 1. Help protect your computer against viruses and spyware by using anti-virus and anti-spyware software and automatic updates. Scan your computer regularly

More information

SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal

SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal WHITE PAPER SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM Why Automated Analysis Tools are not Created Equal SECURITY REIMAGINED CONTENTS Executive Summary...3 Introduction: The Rise

More information

.tirol Anti-Abuse Policy

.tirol Anti-Abuse Policy Translation from German.tirol Anti-Abuse Policy This policy is based on Austrian legislation. In case of doubt the German version of this policy is in force. Page 1 Contents 1. Management Summary... 3

More information

Cloud Services. Email Anti-Spam. Admin Guide

Cloud Services. Email Anti-Spam. Admin Guide Cloud Services Email Anti-Spam Admin Guide 10/23/2014 CONTENTS Introduction to Anti- Spam... 4 About Anti- Spam... 4 Locating the Anti- Spam Pages in the Portal... 5 Anti- Spam Best Practice Settings...

More information

When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling. White Paper

When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling. White Paper When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling White Paper As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection

More information

2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security

2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security 2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security For 10 years, Microsoft has been studying and analyzing the threat landscape of exploits, vulnerabilities, and malware.

More information

THE MOST EFFICIENT DOmAIN management SERvICE IN THE WORLD

THE MOST EFFICIENT DOmAIN management SERvICE IN THE WORLD THE MOST EFFICIENT DOmAIN management SERvICE IN THE WORLD Realtime Register has been active in the web hosting and domain name industry for more than 10 years and has been IcaNN accredited since 2004.

More information

Spear Phishing Attacks Why They are Successful and How to Stop Them

Spear Phishing Attacks Why They are Successful and How to Stop Them White Paper Spear Phishing Attacks Why They are Successful and How to Stop Them Combating the Attack of Choice for Cybercriminals White Paper Contents Executive Summary 3 Introduction: The Rise of Spear

More information

How to Identify Phishing E-Mails

How to Identify Phishing E-Mails How to Identify Phishing E-Mails How to recognize fraudulent emails and avoid being phished. Presented by : Miguel Fra, Falcon IT Services ([email protected]) http://www.falconitservices.com

More information

Domain Name Abuse Detection. Liming Wang

Domain Name Abuse Detection. Liming Wang Domain Name Abuse Detection Liming Wang Outline 1 Domain Name Abuse Work Overview 2 Anti-phishing Research Work 3 Chinese Domain Similarity Detection 4 Other Abuse detection ti 5 System Information 2 Why?

More information

Protecting your business from fraud

Protecting your business from fraud Protecting your business from fraud KEY TAKEAWAYS > Understand the most common types of fraud and how to identify them. > What to do if you uncover fraudulent activity or suspect you are a victim of fraud.

More information

IANA Functions to cctlds Sofia, Bulgaria September 2008

IANA Functions to cctlds Sofia, Bulgaria September 2008 IANA Functions to cctlds Sofia, Bulgaria September 2008 Kim Davies Internet Assigned Numbers Authority Internet Corporation for Assigned Names & Numbers What is IANA? Internet Assigned Numbers Authority

More information

Corporate Account Takeover & Information Security Awareness. Customer Training

Corporate Account Takeover & Information Security Awareness. Customer Training Corporate Account Takeover & Information Security Awareness Customer Training No computer system can provide absolute security under all conditions. NO SECURITY MEASURE OR LIST OF SECURITY MEASURES CAN

More information

10 Things Every Web Application Firewall Should Provide Share this ebook

10 Things Every Web Application Firewall Should Provide Share this ebook The Future of Web Security 10 Things Every Web Application Firewall Should Provide Contents THE FUTURE OF WEB SECURITY EBOOK SECTION 1: The Future of Web Security SECTION 2: Why Traditional Network Security

More information

When Reputation is Not Enough. Barracuda Email Security Gateway s Predictive Sender Profiling. White Paper

When Reputation is Not Enough. Barracuda Email Security Gateway s Predictive Sender Profiling. White Paper When Reputation is Not Enough Barracuda Email Security Gateway s Predictive Sender Profiling White Paper As spam continues to evolve, Barracuda Networks remains committed to providing the highest level

More information

Operation Liberpy : Keyloggers and information theft in Latin America

Operation Liberpy : Keyloggers and information theft in Latin America Operation Liberpy : Keyloggers and information theft in Latin America Diego Pérez Magallanes Malware Analyst Pablo Ramos HEAD of LATAM Research Lab 7/7/2015 version 1.1 Contents Introduction... 3 Operation

More information

<.bloomberg> gtld Registration Policies

<.bloomberg> gtld Registration Policies gtld Registration Policies General Statement... 2 Definitions... 2 String Requirements... 3 Reserved Names... 3 Name Collision... 3 Acceptable Use... 4 Reservation of Rights... 4 Rapid Takedown

More information

FAQ (Frequently Asked Questions)

FAQ (Frequently Asked Questions) FAQ (Frequently Asked Questions) Specific Questions about Afilias Managed DNS What is the Afilias DNS network? How long has Afilias been working within the DNS market? What are the names of the Afilias

More information

Identity Theft and Online Fraud IRS Efforts to Protect Taxpayers. Privacy, Governmental Liaison and Disclosure May 9, 2012

Identity Theft and Online Fraud IRS Efforts to Protect Taxpayers. Privacy, Governmental Liaison and Disclosure May 9, 2012 Identity Theft and Online Fraud IRS Efforts to Protect Taxpayers Privacy, Governmental Liaison and Disclosure May 9, 2012 Today s presentation How identity theft is a threat to the taxpayer What IRS is

More information

SAS. Fraud Management. Overview. Real-time scoring of all transactions for fast, accurate fraud detection. Challenges PRODUCT BRIEF

SAS. Fraud Management. Overview. Real-time scoring of all transactions for fast, accurate fraud detection. Challenges PRODUCT BRIEF PRODUCT BRIEF SAS Fraud Management Real-time scoring of all transactions for fast, accurate fraud detection Overview Organizations around the globe lose approximately 5 percent of annual revenues to fraud,

More information

Protecting Against Online Fraud with F5

Protecting Against Online Fraud with F5 Protecting Against Online Fraud with F5 Fraud is a relentless threat to financial services organizations that offer online banking. The F5 Web Fraud Protection solution defends against malware, phishing

More information