Skip to main content
Elsevier - PMC COVID-19 Collection logoLink to Elsevier - PMC COVID-19 Collection
. 2020 Sep 22;2020(9):15–19. doi: 10.1016/S1361-3723(20)30098-1

Why is phishing still successful?

Akashdeep Bhardwaj 1, Varun Sapra 1, Aman Kumar 1, Naman Kumar 1, S Arthi 1
PMCID: PMC7508510

Abstract

In recent times, there has been a dramatic shift from bulk spam emails to targeted email phishing campaigns. Such attacks have started to cause huge brand, financial and operational damage to organisations globally. Phishing attacks involve simple, straightforward, masquerading methodology.1 The aim is to lure and trick an unsuspecting victim in order to elicit as much information as possible, using SMS, email, WhatsApp and other messaging services, or phone calls that have been spoofed to appear is if they are from known, reliable friends or colleagues.2


The intent is to get the victims to click and log into cloned web portals such as company intranet or bank sites and social networking sites such as Facebook, Instagram, Twitter or even Yahoo and Gmail sites.3 Once the unsuspecting victims click on the URL sent by the attacker, instead of the original site they are directed to the attacker's fake site. On trying to log in or submitting information on that website, victims provide the attacker with sensitive information. This can include user ID, email, password, address, mobile number, date of birth and payment card details, among other things.4

Cyber attackers have enhanced their methodologies to include personalised attacks. Targeting senior-level, high-value personnel such as the head of HR, C-level executives such as CISO, CTO, CFO or board members is an advanced form of phishing attack against individuals, known as whaling.5 Spear-phishing attacks, on the other hand, target specific individuals within the organisation, and are highly personalised.6 Such individuals include finance team members, IT security team members or even new hires. Apart from using cloned web portals, attackers also target two-factor authentication by cloning one-time passwords (OTPs) as well as creating fake QR codes which, if scanned by mobile phones, respond by offering huge discounts at restaurants, grocery stores or household service stores in return for online payment, which obviously goes to the attacker's account.

Such new age phishing attacks are effective and difficult to detect, as the malicious email or message is convincing and impersonates a trusted source known to the target. Although many organisations provide cyber awareness training for their staff, attackers are able to bypass human defences in various ways. This has to do with employee workloads and expectations, which have become ever greater and more complex. Due to this, employees – even experienced staff – make mistakes and can be deceived. No amount of training will be able to change this. Traditional email security systems are unable to detect spam and stop only the most basic level of phishing attacks. For cyber criminals, whaling and spear-phishing are the perfect means for performing a broad array of damaging attacks.

Alarming trends

As per the latest phishing statistics from Security Boulevard, by mid-2020 the trends have become alarming as phishing attacks have become highly creative, exploiting the Covid-19 global pandemic.7 The phishing stats indicate that targeted victims are phished on a regular basis. A few disturbing highlights of the report are:

  • Verizon's ‘Data Beach Investigations Report’ claimed that attacks involving only phishing showed an increase of 32%, and this covered nearly a third of all data breaches.8

  • Some 86% of email attacks involved ‘malwareless’ emails; in place of malware, they increasingly used new sophisticated attacks such as spear-phishing, whaling, CEO fraud or impersonation tactics.9

  • Over 88% of organisations across verticals reported facing spear-phishing attacks in 2019, which resulted in 46% receiving ransomware demands and 25% of small and medium-size businesses (SMBs) suffering phishing attacks.

  • Around 60% of enterprises reported mobile phishing attacks via SMS and WhatsApp (Smishing) as well as voice phone calls (Vishing) using messaging, social media and even gaming apps.

  • Every 20 seconds a new phishing portal is registered and launched, which now also includes Covid-19 related phishing attacks. Between January and March 2020, 51,000 coronavirus-themed domains were registered globally.

  • Nearly three-quarters (74%) of phishing attacks involved the HTTPS protocol, using SSL/TLS certificates, as compared to 51% in 2019. Of these, webmail or software-as-a-service were involved in 31% of phishing attacks.

  • In April 2020, cyber criminals sent 18 million phishing mails related to Covid-19. Google reported blocking over 250 million Covid-19 spam and phishing emails.

  • Nearly 60% of the data breaches are due mainly to human error. These include trained and untrained insiders who fell prey to phishing attacks. This resulted in $3.5m in losses in 2019 alone.

  • Overall phishing is down by 42% compared to 2019, yet the success rate of whaling and spear-phishing is higher than ever before, suggesting that attackers are going for quality over quantity.

  • An alarming 40% of employees with little or no phishing awareness training regularly failed during simulated phishing campaign and assessment tests.

  • Most (90%) phishing emails were actually caught and verified by email security gateways, yet the 10% that remained accounted for over 170,000 incidents inside organisations' premises. This caused losses of over $26bn in the period July 2016 to July 2019 in the US alone.

  • Apple is the most imitated commercial organisation for cloned and phishing websites, while Facebook is the number one emulated portal among social networking sites.

  • Microsoft Office and Adobe Acrobat files represented 94% of malware attachments in emails; this is up from just 15% in 2018 or 25% in 2019.

  • Venezuela had the dubious honour of having 31.6% of phishing victims in 2019, followed by Brazil at 30.5%, Greece at 25% and Australia at 20%.

  • The biggest source of spammers came from China (over 22%), followed by the US at 15% and Russia at 6%.

  • In Brazil, phishing attacks increased by 232% in just 10 months in 2019.

Although the overall number of phishing attacks is on the decline, it is important to look beyond the phishing statistics. Cyber attackers are not giving up. In fact attackers keep coming up with new attack tactics, focusing on effectiveness, higher success percentage and attack quality, instead of blasting out bulk phishing messages with the hope that one in 1,000 might work. This is the core difference in targeting victims with a laser-guided rifle instead of a machine gun.

Phishing taxonomy

The authors classified phishing attacks based on new and upcoming tactics adopted by cyber attackers while luring victims and performing fraudulent activities to obtain personal and sensitive information. Tactical and social engineering techniques are detailed in Figure 1 .

Figure 1.

Figure 1

Proposed unique phishing taxonomy.

Cyber criminals perform phishing activities for money, and to ensure that their scheme is effective and evades detection, they do not make rational or ethical decisions. To combat phishing, this research presents the phisher's mindset and methodology of attack. The authors designed and developed a phishing toolkit using Kali Linux and Python. As shown in Figure 2 , the attacker's toolkit has options to choose from, including using cloned social media sites, gathering two-factor authentication OTP code or using a QR code in the form of pre-designed templates. To generate the cloned forged Twitter link, the authors set up a reverse tunnel using an Ngrok proxy on the attacker's command and control (C&C) server. This proxy application launches multiple virtual tunnels as local network services. These capture the network traffic for detailed inspection. This helps gather the victim's sensitive details, using one unique phishing method from three options to maximise success.

Figure 2.

Figure 2

The initial unique phishing toolkit options.

If the attacker starts with the social media sites option, this is followed with options to choose between cloned Instagram, Facebook, Snapchat or Twitter sites, as illustrated in Figure 3 .

Figure 3.

Figure 3

Social media site options.

Assuming the attacker chooses the Twitter social media template (option 4), a reverse proxy server is started on the attacker's system. This generates a forged Twitter link and presents the spoofed social media website to the victim. In our attack, the forged link is https://e89e09404a68.ngrok.io as shown in Figure 4 .

Figure 4.

Figure 4

The Twitter link to send to the victim.

Trained and aware employees can detect this link as an incorrect URL or forged link. The motivation for this research is to increase phishing awareness and not actual phishing, so DNS spoofing is not applied here. That would easily provide a legitimate link or a similar one to those used by Twitter. The attacker disguises the Ngrok link as shown in Figure 5 and then sends it to the victim using social engineering attacks.

Figure 5.

Figure 5

Disguising the forged phishing link.

When the disguised link is clicked, the attacker's command and control system starts to gather the victim's details. These include hostname, location, IP address, ISP, country and currency, as shown in Figure 6 .

Figure 6.

Figure 6

Spoofed Twitter login page with the attacker's C&C dashboard.

The attacker's C&C server waits for the victim to log in and enter the email address and credentials on the forged Twitter login page. These details are also captured by the attacker's C&C server, as illustrated in Figure 7 .

Figure 7.

Figure 7

Victim's Twitter credentials on the attacker's C&C server.

These credentials are saved in the /sites/Twitter/Saved.IP.txt file for advanced future attacks such as identity spoofing and lateral movement on the victim's network and other systems. More victims can be trapped as and when they click the disguised link, as illustrated in Figure 8 .

Figure 8.

Figure 8

More credentials gathered from other victims on the attacker's C&C server.

The attacker has options to use enhanced phishing methods, a two-factor authentication attack to grab the victim's OTP or even lure the victim to send Paytm, Google or WhatsApp money by scanning a QR Code, as illustrated in Figure 9 .

Figure 9.

Figure 9

OPT and QR code attack.

Features for phishing detection

Creating phishing awareness generally involves having end users attend a course, read documents related to ‘good practices’ and ‘Dos & Don'ts’. However, it is human nature to forget and focus on the micro task when going about daily chores. The authors reviewed over 300 phishing mails received by Gmail and Yahoo. The top 15 unique tactics and phishing features adopted by cyber attackers are presented in Table 1 . The authors propose creating anti-phishing rules by IT security teams to check and validate these phishing features. These can easily help detect and block phishing attacks.

Table 1.

Features for phishing detection.

Phishing Features Description
Content embedding Images, video, contents implanted in phishing page & sharing the same domain.

Shortening service To hide the spoofed URL, a shortening service redirects to the phishing page.

@ symbol Alphanumeric characters are ignored after the @ symbol.

- prefix or suffix Adding a prefix or suffix separated by a ‘-’ indicates phishing subdomains.

Length of URL Spoofed subdomains or long URLs are used to hide the spoofed phishing sites.

IP address Use of an IP Address instead of the spoofed URL.

Double ‘.’ Phishing sites typically have more than one ‘.’ Subdomain URLs

HTTPS token & port Use of HTTPS token and non-standard ports (8081, 8090…) indicates phishing.

Double slash redirection Use of ‘//’ in URL for redirection.

No Google index or rank Phishing websites do not have Google indexing or rank.

Popup windows Phishing sites usually open popup windows, seeking user submissions.

Mouseover disabled Mouseover() command is kept disabled so URL cannot be seen by end users.

Rightclick disabled Rightclick() function is disabled for most phishing pages.

Abnormal URLs Use of non-standard and abnormal URLs instead of original host domain.

Domain age Phishing sites are newly hosted domains and do not last long.

The Internet of Things

Bio-wearable, body sensors, Internet of Things (IoT) devices or smart systems in our homes, offices and buildings have changed our lives for the better. These devices have become an intrinsic part of our work and lives, found everywhere in our offices, houses, schools, vehicles, hospitals, manufacturing industries and even on our bodies.

However, each IoT device communicates and connects via the insecure Internet and this is a major concern when we consider the increasing development of smart cities, integrated with multiple automation systems, IoT devices and ‘things’ inside homes. Such ‘things’ include televisions, web cams, music systems, washing machines and air conditioners, among other devices, and all this adds up to an insecure environment. Every connected device increases the threat surface and probability of an attack on our privacy.

This gets amplified more as these ‘things on the Internet’ are actually inside our houses, controlled and connected remotely by the user's smartphone or user systems. Malware deployed via phishing is capable of controlling these devices, which may well cause more harm than benefit. IoT devices and sensors usually collect data and are mostly connected to various networks and the Internet. This leads to an individual's personally identifiable information (PII), location and voice being stored in these devices. This PII can range from personal details such as name, age, location, email password credentials or even health data. Thus for any cyber attacker, there are easy, low-hanging assets with value information, making any individual – not just high-value executives – potential targets.

Conclusion

Phishing attacks are the number one threat vector against untrained and unaware employees. Cyber attackers continue to evolve malicious attacks that are becoming difficult to differentiate from real emails and authentic communication. Cyber attackers carrying out phishing attacks, whaling or spear-phishing are difficult to track. Only by increasing employee awareness and proper training can we hope to add proactive mechanisms to detect and block phishing.

The innovative and increasing use of the Internet of Things (IoT), wearable devices and smart cities have also presented huge opportunities to cyber criminals. It has become imperative to balance the use of the insecure Internet in our daily lives with new age devices if we are to securely communicate with others and realise the benefits of these technologies without being exploited by phishing attacks.

Biographies

About the authors

Dr Akashdeep Bhardwaj is a professor (cyber security & digital forensics) at the University of Petroleum & Energy Studies (UPES), Dehradun, India. He is an eminent IT industry expert with over 25 years of experience in cyber security, digital forensics and IT management operations. He mentors graduate, masters and doctoral students as well as leading several projects. He has a PhD in computer science, has published several research papers, co-authored books and has a patent. He has worked as technology leader and head for various multinational organisations.

Varun Sapra is an assistant professor senior scale working at the University of Petroleum & Energy Studies. His area of specialisation is machine learning and web applications and he is currently pursuing his PhD in computer science. He has published several research papers at conferences and in international journals, and co-authored books and a patent.

Aman Kumar, Naman Kumar and Arthi S are third-year students pursuing their bachelors of technology in computer science, specialising in cyber security and digital forensics at the University of Petroleum & Energy Studies. They are budding cyber security enthusiasts and have won and participated in several cyber security hackathons and competitions.

References


Articles from Computer Fraud & Security are provided here courtesy of Elsevier

RESOURCES