Feeds

DIY kits dumb down phishing

9 out of 10 crooks use ready-made code

Choosing a cloud hosting partner with confidence

Phishing kits are helping to dumb down the process of creating fraudulent websites. Back in the day, setting up a bogus facsimile of a banking site required a modicum of programming skills. No more.

Now the increasing prevalence of DIY fraud website creation kits means setting up a snare for unwary surfers takes about as much effort as setting up a personal website. Nine in ten (92 per cent) of 3,544 new phishing websites identified by IBM's X-Force security research team last week (something of a slow week, incidentally) were the product of phishing kits.

Phishing kits, which first arrived on the scene around two years ago, allow attackers with little technical skill to rapidly set up multiple phishing websites on a single host. Requiring only a small installation footprint, and capable of being seeded with off-the-shelf botnet agents, these phishing kits create a means for hackers to serve up multiple bogus banking websites on a single compromised host.

IBM compares the phenomenon of phishing websites to the appearance of virus creation toolkits in the late 1990s. The infamous Anna Kournikova worm of 2001, for example, was created by 20-year-old Dutch s'kiddie Jan de Wit, using a virus creation toolkit.

Hook, line and stinker

The widespread use of phishing kits comes as no great surprise. However, IBM's improved analytical techniques have yielded an added insight into cybercrime activity and helped to quantify the problem.

For example, IBM discovered that the 3,256 phishing kit sites tied back to 100 registered domains, almost a half (44 per cent) of which were registered in Hong Kong. This compares to the 276 registered domains used by the 288 custom-made phishing websites. More in an entry in IBM's X-Force blog here. ®

Internet Security Threat Report 2014

More from The Register

next story
FYI: OS X Yosemite's Spotlight tells Apple EVERYTHING you're looking for
It's on by default – didn't you read the small print?
Russian hackers exploit 'Sandworm' bug 'to spy on NATO, EU PCs'
Fix imminent from Microsoft for Vista, Server 2008, other stuff
Edward who? GCHQ boss dodges Snowden topic during last speech
UK spies would rather 'walk' than do 'mass surveillance'
Microsoft pulls another dodgy patch
Redmond makes a hash of hashing add-on
NOT OK GOOGLE: Android images can conceal code
It's been fixed, but hordes won't have applied the upgrade
Apple grapple: Congress kills FBI's Cupertino crypto kybosh plan
Encryption would lead us all into a 'dark place', claim G-Men
'LulzSec leader Aush0k' found to be naughty boy not worthy of jail
15 months home detention leaves egg on feds' faces as they grab for more power
China is ALREADY spying on Apple iCloud users, claims watchdog
Attack harvests users' info at iPhone 6 launch
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.