Scam Pandemic: How Attackers Exploit Public Fear through Phishing

被引:25
作者
Bitaab, Marzieh [1 ]
Cho, Haehyun [1 ]
Oestt, Adam [1 ,2 ]
Zhang, Penghui [1 ]
Sun, Zhibo [1 ]
Pourmohamad, Rana [1 ]
Kimt, Doowon [3 ]
Bao, Tiffany [1 ]
Wang, Ruoyu [1 ]
Shoshitaishvili, Yan [1 ]
Doupe, Adam [1 ]
Ahn, Gail-Joon [1 ,4 ]
机构
[1] Arizona State Univ, Tempe, AZ 85287 USA
[2] PayPal Inc, San Jose, CA USA
[3] Univ Tennessee, Knoxville, TN USA
[4] Samsung Res, Tempe, AZ USA
来源
2020 APWG SYMPOSIUM ON ELECTRONIC CRIME RESEARCH (ECRIME) | 2020年
关键词
D O I
10.1109/eCrime51433.2020.9493260
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the COVID-19 pandemic started triggering widespread lockdowns across the globe, cybercriminals did not hesitate to take advantage of users' increased usage of the Internet and their reliance on it. In this paper, we carry out a comprehensive measurement study of online social engineering attacks in the early months of the pandemic. By collecting, synthesizing, and analyzing DNS records, TLS certificates, phishing URLs, phishing website source code, phishing emails, web traffic to phishing websites, news articles, and government announcements, we track trends of phishing activity between January and May 2020 and seek to understand the key implications of the underlying trends. We find that phishing attack traffic in March and April 2020 skyrocketed up to 220% of its pre-COVID-19 rate, far exceeding typical seasonal spikes. Attackers exploited victims' uncertainty and fear related to the pandemic through a variety of highly targeted scams, including emerging scam types against which current defenses are not sufficient as well as traditional phishing which outpaced the ecosystem's collective response.
引用
收藏
页数:10
相关论文
共 45 条
[11]  
Canali D., 2013, P 22 INT C WORLD WID, P177
[12]  
Edgecombe Graham., 2020, GOOGLE ROCKETEER CER
[13]  
Google, Google Safe Browsing Transparency Report
[14]  
Gorter J., 2020, J EMPLOYEE ASSISTANC, V2, P32
[15]   PhishEye: Live Monitoring of Sandboxed Phishing Kits [J].
Han, Xiao ;
Kheir, Nizar ;
Balzarotti, Davide .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :1402-1413
[16]  
Hiscox, 2019, Hiscox Cyber Readiness Report 2019
[17]  
Ho G, 2019, PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, P1273
[18]   A SVM-based technique to detect phishing URLs [J].
Huang, Huajun ;
Qian, Liang ;
Wang, Yaojun .
Information Technology Journal, 2012, 11 (07) :921-925
[19]  
Khonji M., 2011, 2011 IEEE GCC Conference and Exhibition (GCC), P221, DOI 10.1109/IEEEGCC.2011.5752505
[20]  
Korolov Maria., 2014, SCAMMERS MOVE EBOLA