I want to create a new topic about phishing under HTTPS websites, But, because I found this thread, maybe better if I make a post reply to this thread. Sorry for bumping threads.
Phishing attempts increase 400%, many malicious URLs found on trusted domainsSecure Socket Layer (SSL) is considered as a secure, means to secure user data on a website. However, a hacker is not a beginner, they are always looking for ways to get victims. If a website that uses SSL (HTTPS://) used to be considered secure if accessing it from all devices, now that can't be said to be 100% correct.
Let's look at the data in the article published by helpnetsecurity.com (the reference is at the end of the post), the article data shown:
- Nearly 24% of malicious programs are found on trusted websites.
- Nearly 29% of phishing websites use HTTPS to deceive victims.
This is an irony for those of us who often use websites. Especially for novice investors or airdrop / bounty hunters. If we don't pay attention to the URL we open, we can become victims of this cyber crime.
Let's look at the thread created by
wwzsocki entitled "
What is Punycode and how to protect yourself from Homograph Phishing attacks?". In that thread, there is an example of a phishing website which is a Binance duplication. The website was created using HTTPS on the domain to convince its victims and also trick users by using a similar alphabet.
Another example, from
dkbit98, he found a
Chainlink duplication website that also uses HTTPS on the domain to convince its users. Despite the fact that the website is a phishing website that utilizes user typo.
Back to the article, the article mentioned that in 2019, phishing websites had increased by 400%. The terrible thing is, the growth of phishing takes place only in 7 months from January - July 2019. The sectors that are targeted for phishing are:
- 25% are SaaS / Webmail providers
- 19% are financial institutions
- 16% social media
- 14% retail
- 11% file hosting
- 8% payment services companies
If you are still using Windows 7 on your computer OS.
- Between January and June, the number of IPs that host Windows exploits grew 75%
- Malware samples seen on only one PC are at 95.2%, up from 91.9% in 2018
- Out of all infected PCs, 64% were home user machines, and 36% were business devices, likely because home users aren’t protected by corporate firewalls and security policies and may not be updated as regularly.
- Over 75% of malware on Windows system hides in one of three places:
41% in %temp%, 24% in %appdata% and 11% in %cache%. - Businesses can easily set policies to restrict execution of any application from the %temp% and %cache% locations, preventing more than 50% of infections.