Skip to Main Content
Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails
book

Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails

by Robin Dreeke, Michele Fincher, Christopher Hadnagy
April 2015
Intermediate to advanced content levelIntermediate to advanced
224 pages
5h 13m
English
Wiley
Content preview from Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails

Chapter 8Phish Like a Boss

“I will miss our conversations.”

—Nathan Algren, The Last Samurai

In the short time that it took Chris and me to write this book, the world has moved on. There have been a number of additional high-profile breaches reported, including eBay, The Home Depot, Sony, Chick-fil-A, and JPMorgan Chase & Co. I think it's safe to say that we haven't begun to see all of the fallout that will surely come in the form of stolen credit cards or identities or further attempts to perpetrate theft or infiltration through phishing.

The most recent report published from the Anti-Phishing Working Group (APWG), released August 29, 2014,1 reveals that the second ­quarter of 2014 had the second highest number of unique phishing websites reported—128,378. In addition, the number of unique phish reported in this same time frame was 171,801. These are just the numbers reported to the APWG, so I don't think it's a leap of logic to assume that this is only a fraction of phish and malicious websites circulating in the wild. The trend has been a continual increase over the last decade that the APWG has been reporting.

What's worse, phishers are becoming quicker, smarter, and more adaptive. In a recent study2 on manual account hijacking conducted by Google and the University of California, San Diego, it was determined that an attacker attempted to access 20 percent of accounts with harvested credentials within 30 minutes and 50 percent within 7 hours. In addition, attackers spent ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Detecting and Combating Malicious Email

Detecting and Combating Malicious Email

Julie JCH Ryan, Cade Kamachi
Tribe of Hackers Red Team

Tribe of Hackers Red Team

Marcus J. Carey, Jennifer Jin

Publisher Resources

ISBN: 9781118958483Purchase book