Skip to main content

Anti-Phishing Working Group Report from Q2 2023

 The Anti-Phishing Working Group (APWG) is an international coalition focused on unifying the global response to cybercrime, particularly phishing and e-mail fraud. Established in 2003, APWG brings together businesses, government entities, law enforcement, and non-governmental organizations to combat phishing, crimeware, and e-mail spoofing.They create regular reports on the nature of phishing "in the wild" and share trends in this report. You can download the report here

I wanted to report on a more recent trend report, but at the time of writing I haven't seen a newer one. It being in the middle of 2023, I believe the report is recent enough. 

I found a few areas of interest, and questioned a few pieces.

  1. There was a reported downward trend in phishing. Despite the high numbers, there was a notable downward trend in phishing by the end of the quarter, indicating a possible shift in tactics or improved countermeasures. I have doubt that phishing is occurring less, I believe this indicator is that we're having a harder time detecting phishing. However, I will note that the previous report was in Q1 of 2023 and it had the highest record report.
    Additionally, the report also states there's an increase in social media attacks. With this increase, it has me doubting that BEC or otherwise is on the way out. 
  2. I found a new phrase "Hybrid Vishing Attacks" which is as straightforward as it sounds, vishing mixed with something else like traditional phishing emails or SMS messages. The report believes this is an evolution of attacks, but from the wild it seems like these attacks have been happening for years. Maybe the intention was to indicate that these attacks are so on the rise that they are almost novel in nature. 
  3. Financial Institutions are the most targeted industry at 23.5% and social media sites at 22.3%. That didn't seem all that surprising to me, but what I was interested in was the low amount of other attacked industries in the report. Gaming was at only 1.7%, and maybe people aren't scamming for RS gold these days, but I highly doubt that. The research is sited by a few different organizations that put the report together, but I can't help but think they aren't drilling into these more niche attacks. Payment processing at only 5.8% seems low as well, with plenty of sites pretending to be Zelle related, or otherwise about personal payment processing like Venmo. 
  4. The most popular gift cards in gift card scams are Amazon and Apple Store cards. The Amazon one makes sense to me, due to the versatility of use and demand for Amazon. I'm not surprised to see Apple Store cards on the list because I've seen this trend before. I can recall attackers asking for App Store cards and even Sephora cards in the past. I guess my takeaway is that I never understood why the Apple Store. Is it because they are in demand and easier to launder? The report doesn't go into detail into this topic. 

I found a few other points interesting, like how scammers are still using AOL (which was only 2% of webmail accounts used for BEC) but mostly the report wasn't all too surprising. I look forward to the next trends and reports to see what's other there. Maybe some of my suspicions will be answered.

Comments

Popular posts from this blog

Phishing Kits

Let's make a phishing attack (just kidding). The easiest way to do so is obtaining a pre-made phishing kit. Phishing kits represent a significant and growing danger. These tools, readily available in the darker corners of the internet, empower even technically unsophisticated criminals to launch effective phishing campaigns. This post aims to demystify phishing kits, explore their dangers, and provide practical advice on safeguarding against these insidious threats.  Phishing kits are pre-packaged sets of tools and resources designed to facilitate phishing attacks. The parts of a phishing kit can be broken down into the following components: Email templates Webpage clones (usually scraped from the legit site) Scripts and code repositories  Hosting Platforms Delivery Systems Readme & docs Premium services Real-time data analysis tools Customer service* Social engineering tools These kits are designed for ease of use, allowing attackers to launch phishing campaigns with mini...

How to program a NTAG215 NFC Tag

Hi! Did you just acquire a NTAG215 NFC tag? Very cool. Maybe you scanned it and it brought you here. Here's how to edit the content on the tag to make it do what you want.  Easy Steps Download an NFC writing app on a smartphone like this one for Android or this one for iPhone. I assume you might have this app already if you're reading this tag. Done Decide what type of data you want to save. If you picked up more than one of the NFC tags, you may have a variety of data saved to them like the ones below: Plain text URL/URI Link to a search Social networks Video File Application Mail Contact Phone number SMS Location Address Proximity search Street View Emergency info Bitcoin address Bluetooth connection WiFi network settings other custom fields Make sure if you select the correct format to make it easier to scan, save the write data, and re-scan the tag. Switch back to the read function and test your tag! Next Method The above method doesn't cover making everything, such a...