Security experts publish a list exposing over 2000 phishing sites
Have you ever thought about how much safer the web browsing would be, if there was a database that would include all the malicious domains and anyone would be able to consult it when needed? Such source of information is undoubtedly every security-oriented netizen’s dream and, apparently, there are attempts in making it a reality. Just recently, security experts at Techhelplist.com have published an article listing around 2300 phishing and scam websites that contain malicious content or store data collected via phishing attacks[1]. In fact, the experts separate the malicious domains into four main categories: 1) single-brand domains; 2) domains with crime-related content only; 3) sites that contain compromised content but also feature other information; 4) sites which are not actively oriented towards phishing but work as processors for phished data. The second category is the most voluminous of the four. If you are interested in examining this list in more detail, you can find it on TechHelpList website. We should point out, though that the list represents potentially malicious sites that were detected at the beginning of February, so it is only natural that some of the indicated domains may have already been shut down, while newly emerged threats may not be included in the list. Nevertheless, the list provides a great illustration of the growing amount of phishing content that has been observed during 2016.[2]
The experts’ choice to categorize the phishing sites suggest that these malicious domains come in a variety of different forms. Some may display fake ads, try to involve unsuspecting users into tech support scams, push various online surveys aiming to extract some sensitive information, such as logins, passwords, banking credentials, etc.[3] In fact, a number of different domains may be created to serve some particular purpose, say, download a malicious program on the victim’s computer. For instance, the developers of a banking Trojan called Qadars[4] reportedly used over 1,000 compromised websites to redirect users to a malicious domain called Arpanet1957.com where the users were urged into downloading a fake Flash Player update. Besides, phishing emails is one of the most popular ransomware delivery technique as well. It was initially popularized by Locky virus and later picked up by other ransomware developers.
Most of the phishing domains are hosted in USA and Canada[5], but are usually accessible from all over the world. Visiting such sites may put your privacy, identity, and security of your sensitive data in danger. Thus, you should stay away from them as far as possible. Malware lists can really prevent you from providing your sensitive information to the scammers or downloading malicious software on your PC. Nevertheless, sophisticated antivirus tools with a well-established real-time support will provide your with a more effective protection and automatically stop you from visiting such domains in the first place. We highly recommend investing in such a tool and ensure safer browsing in the future.
- ^ Phishing sites and php kits - February 2017 - Part 1. Techhelplist. Linux, Database, Xenserver systems admin tutorials and Virus, Malware, Phishing, and spam alerts.
- ^ Jonathan Crowe. Phishing by the numbers: must-know phishing statistics 2016. Barkly. Endpoint Protection.
- ^ Types of phishing attacks. PCworld. News, tips and reviews from the experts on PCs, Windows, and more.
- ^ Thousands of compromised websites leading to fake Flash Player update sites. Malwarebreakdown. InfoSec blog for researchers and analysts.
- ^ Miles Date. Why we need to support DMARC and fight phishing. Deliverabilitynext. Deliver on email delivery.