Security

The Impact of Public Information on Phishing Attack and Defense

Download Now Free registration required

Executive Summary

Attackers compromise web servers in order to host fraudulent content, such as malware and phishing websites. While the techniques used to compromise websites are widely discussed and categorized, analysis of the methods used by attackers to identify targets has remained anecdotal. In this paper, the authors study the use of search engines to locate potentially vulnerable hosts. They present empirical evidence from the logs of websites used for phishing to demonstrate attackers' widespread use of search terms which seek out susceptible web servers. They establish that at least 18% of website compromises are triggered by these searches. Many websites are repeatedly compromised however the root cause of the vulnerability is not addressed.

  • Format: PDF
  • Size: 505.73 KB