'Phishing' scams explode worldwide, researchers shows

June 21, 2013

Those insidious email scams known as phishing, in which a hacker uses a disguised address to get an Internet user to install malware, rose 87 percent worldwide in the past year, a security firm said Friday.

These schemes affected some 37.3 million users around in the 12 months to April 30, according to a report by the Russian-based Kaspersky.

"The number of fraudulent websites and servers used in attacks has more than tripled since 2012, and more than 50 percent of the total number of individual targets were fake copies of the websites of banks and other credit and financial organizations," Kaspersky said.

The attackers often use emails purportedly from trusted organizations—Yahoo!, , and Amazon are top targets, according to the report.

Online game services, online payment systems, and the websites of banks and other credit and financial organizations are also commonly used to disguise phishing attempts.

Kaspersky said phishing has become a preferred method of .

"Although the specific targets of phishing attacks vary, the end goal of all engaged in this type of is ultimately the same: to make money illegally," the report said.

"This goal is achieved either by directly stealing cash from the victim, as in the case with fake online banking service pages, online storefronts, and subscriptions to online games."

But attacks may also employ a more indirect approach, including the sale of stolen databases on the black market.

"A large collection of user data may come in handy for malicious users for a number of different fraudulent schemes involving spam mailings and the spread of malware," the report said.

The countries most often hit by phishing attacks were Russia, the United States, India, Vietnam and the Britain.

The location of "hostile servers" was most frequently in the US, Britain, Germany, Russia and India, Kaspersky said.

Explore further: Spear phishing: Researchers work to counter email attacks that gain recipients' trust

Related Stories

Password breach spreads beyond LinkedIn

June 7, 2012

More websites admitted security breaches Thursday after LinkedIn said some of its members' passwords were stolen, and experts warned of email scams targeting users of the social network.

Google finds hack attempts on eve of Iran election

June 13, 2013

(AP)—Google says it has discovered and stopped a series of attempts to hack the accounts of tens of thousands of Iranian users in an effort the company believes is an attempt to influence the country's upcoming election.

China, Romania key sources of hacking, report says

April 23, 2013

China and Romania were by far the largest sources of confirmed hacking attempts last year, with China's mostly from state-controlled sources aimed at data theft, a new report said Tuesday.

Recommended for you

Your (social media) votes matter

January 24, 2017

When Tim Weninger conducted two large-scale experiments on Reddit - otherwise known as "the front page of the internet" - back in 2014, the goal was to better understand the ripple effects of malicious voting behavior and ...

Protective wear inspired by fish scales

January 24, 2017

They started with striped bass. Over a two-year period the researchers went through about 50 bass, puncturing or fracturing hundreds of fish scales under the microscope, to try to understand their properties and mechanics ...

'Droneboarding' takes off in Latvia

January 22, 2017

Skirted on all sides by snow-clad pine forests, Latvia's remote Lake Ninieris would be the perfect picture of winter tranquility—were it not for the huge drone buzzing like a swarm of angry bees as it zooms above the solid ...

Singapore 2G switchoff highlights digital divide

January 22, 2017

When Singapore pulls the plug on its 2G mobile phone network this year, thousands of people could be stuck without a signal—digital have-nots left behind by the relentless march of technology.

Making AI systems that see the world as humans do

January 19, 2017

A Northwestern University team developed a new computational model that performs at human levels on a standard intelligence test. This work is an important step toward making artificial intelligence systems that see and understand ...

0 comments

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.