Phishing - The Security Institute

PROTECT - INTELLIGENCE
Phishing
April 2016
1
PROTECT - INTELLIGENCE
Introduction:
The purpose of this document is to provide an analysis of the most prevalent trends and characteristics of phishing campaigns in the UK in March 2016. The
analysis is based on the information reported to Action Fraud via the Attempted Scams or Viruses (ASOV) Reporting Tool as well as on the data obtained
from the NFIB phishing inbox which consist of phishing emails reported by members of the public.
Phishing is the attempt to acquire sensitive information (e.g. usernames, passwords and credit card details) or steal money by masquerading as a
trustworthy entity in an electronic communication such as email, pop-up message, phone call or text message. Cybercriminals often use social engineering
techniques to trick the recipient into handing over their personal information, transfer money or even download malicious software onto their device.
Although some phishing scams can be poorly designed and are clearly fake, more determined criminals employ various techniques to make them appear as
genuine. These techniques can include:




Identifying the most effective phishing ‘hooks’ to use in the message to get the highest click-through rate.
Including genuine logos and other identifying information of legitimate organisations in the message.
Providing a mixture of legitimate and malicious hyperlinks to websites in the message – e.g. including authentic links to privacy policy and terms of
service information of genuine organisation. These authentic links are mixed in with links to a fake phishing website in order to make the spoof site
appear more realistic.
Spoofing the URL links of genuine websites – The most common tricks are the use of subdomains and misspelled URLs as well as hiding malicious
URLs under what appears to be a link to genuine website which can be easily revealed upon hovering the mouse over it. More sophisticated
techniques rely on homograph spoofing which allows for URLs created using different logical characters to read exactly like a trusted domain. Some
phishing scams use JavaScript to place a picture of a legitimate URL over a browser’s address bar. The URL revealed by hovering over an embedded
link can also be changed by using JavaScript.1
WARNING: THIS DOCUMENT MAY CONTAIN LINKS TO MALICIOUS WEBSITES OR EMAIL ADDRESSES, DO NOT CLICK ON
ANY HYPERLINKS CONTAINED IN THIS DOCUMENT.
1
http://searchsecurity.techtarget.com/definition/phishing
2
PROTECT - INTELLIGENCE
1. Action Fraud: Attempted Scams or Viruses (ASOV) Reporting Tool
The ASOV reporting tool, which is operated by Action Fraud, allows members of the public to report instances of phishing where someone has been
approached with a scam message (via email/text/or phone) but has not suffered a financial loss as a result of it and has not exposed their personal details
to a scammer. The analysis in this section is based on the data received by Action Fraud in the month of April 2016.
1.1 Volume of Phishing Reports Received
April 2016 saw the highest ever level of ASOV reporting with a total of 16,451 phishing reports submitted. This is on average 548 reports made per day,
which is a 136% increase compared to April 2015 and a 73% increase compared to March 2016.
Average Number of Phishing Reports Received per Day: Apr 2015 - Apr 2016
600
548
500
468
382
400
300
315
299
232
270
255
200
205
210
181
100
317
270
0
Apr-15
May-15
Jun-15
Jul-15
Aug-15
Sep-15
Oct-15
Nov-15
Dec-15
Jan-16
Feb-16
Mar-16
Apr-16
3
PROTECT - INTELLIGENCE
1.2 Communication Channels for Phishing
1.3 Types of Phishing Request
In April 2016, the most common communication channel used for phishing
distribution continued to be email (78.4%) followed by landline phone
calls (10.4%) and text message (6.3%).
Similarly to the previous months, a request to click on a malicious hyperlink
contained in the message was stated in over one third of all ASOV phishing
reports. The second most common type of request was to transfer money
(16%), which is an increase compared to March (9%) and February (8%).
Requests to provide personal information or to reply to an email appeared in
11% of reported cases each, which is 3 to 4 percentage points lower than in
the previous months. There has also been a drop in a number of requests to
provide banking details by ‘would be’ victims, from an average of 11% in the
past months to 9% in April 2016.
Email 78.4%
Text
Message
6.3%
Landline
Phone
Call
10.4%
Landline Phone Call 10.4%
Text Message 6.3%
Mobile Phone Call 1.5%
6%
Other 1.3%
Click weblink 38%
2%
7%
Transfer money 16%
Post 1.1%
Email
78.4%
Social Media 0.8%
Provide personal information 11%
9%
Weblink
38%
Popup 0.3%
Instant Messaging 0.09%
Fax 0.02%
Reply to the message 11%
Provide banking details 9%
Reply
11%
Other 7%
Personal
Information
11%
Transfer
Money
16%
Open attachment 6%
Make contact 2%
4
PROTECT - INTELLIGENCE
1.4 Phishing ‘Hooks’
Phishing ‘hook’ is a social engineering method which is used to masquerade as a trustworthy entity in communication in order to trick the potential victim
to follow an instruction or request contained in the message for malicious reasons. Throughout April 2016, the most prevalent phishing ‘hooks’ identified in
the reported data continued to be within ‘Other hooks’ category, followed by ‘hooks’ which referred to HM Revenue and Customs (HMRC) and retail banks.
The phishing hooks impersonating banks most commonly referred to Barclays, NatWest and Santander.
Phishing Hooks: April 2016
10000
8078
8000
6000
4000
2866
1714
2000
803
688
549
526
369
202
186
141
77
65
IT Company
Paypal
Mobile
Government
Agency
Lottery
Job Offers
Charity
Amazon
Medical
Ebay
64
59
35
29
DWP
Student
Loan
Company
0
Other
HMRC
Bank
Social Media Facebook
Top 10 'Banking Hooks': April 2016
350
300
289
250
205
200
188
150
90
100
47
50
39
25
Tesco Bank
Halifax
18
10
8
0
Barclays
NatWest
Santander
Lloyds TSB
HSBC
Royal Bank of Scotland Nationwide
Capital 1
5
PROTECT - INTELLIGENCE
The analysis of the ‘Other phishing hooks’ shows that, as in the previous months, the most reported individual hook was Talk Talk, followed by Apple/iTunes
and BT.2 The highest number of reports in this category was associated with a collection of hooks which impersonated various debt collection firms.
Top 10 'Other Hooks': April 2016
500
434
355
400
300
196
200
154
119
100
87
68
58
48
43
Microsoft
Marks and
Spencer
Morrisons
DHL
Virgin Media
0
Debt collection
firms
TalkTalk
Apple/iTunes
BT
Telephone
Preference
Service
2
It should be noted that the level of analysis of the ‘Other phishing hooks’ is limited due to the presence of free text fields in relation this category within the ASOV reporting tool. Although
the best possible effort has been made to calculate and identify the trends in this category, the figures presented below may be understated.
6
PROTECT - INTELLIGENCE
2. NFIB Phishing Inbox
The findings presented below are based on the analysis of nearly 24,000 phishing emails reported to the NFIB phishing inbox during the period of 1st to 30th
April 2016.3
2.1 Subject Headings of Phishing Campaigns – Top 15
The below table represents the Top 15 most prevalent subject headings which appeared, in exactly the same form, in the phishing emails forwarded to the
NFIB phishing inbox by members of the public during April 2016. The analysis shows that the most popular phishing campaigns in circulation referred to
claims for money due to a recipient with the top scam being HMRC tax return claims, as well as to loyalty rewards available to customers of such retailers as
Morrisons and Aldi.
A new type of phishing campaign entitled ‘University Grant Information’ has been identified in the Top 15 dataset, which specifically targeted students
from at least four different universities in the UK, by informing them that they have been awarded a grant by the Department for Education. The campaign
has been designed to obtain students’ personal details including online banking credentials, NIN, driving licence number and mother’s maiden name.
Message Title
1
2
3
4
5
6
7
8
Self Assessment Tax Return
Your Morrisons giftcard
You Have Been Chosen
SANTANDER ALERTS SERVICE UPDATE
University Grant Information
Open your M&S Complimentary Prizes
UN Office Of International Oversight Services
We here at ARGOS have an important message for you!
Number of
emails
reported
108
106
81
58
57
47
46
45
Message Title
9
10
11
12
13
14
15
Click for your M&S Complimentary Prizes
Your reservation # BH0-0089-UK
We need your confirmation for this ALDI surprise treat
Aldi Rewards Giveaway
your package order # BHX-74647-UK dispatched
FROM THE FEDERAL BUREAU OF INVESTIGATION (FBI).
Your Aldi reward is ready for pickup
Number of
emails
reported
38
37
37
34
33
32
31
3
Once the reporting person submits their online ASOV form to Action Fraud, they are directed to forward the phishing email to a dedicated phishing inbox of HMRC, DWP, all major banks,
PayPal, eBay, Amazon, Facebook or Student Loans Company if the scam message purports to be originating from one of these organisations, or to the NFIB phishing inbox in all other cases
7
PROTECT - INTELLIGENCE
2.2. Email Addresses of Phishing Scammers – Top 15
The table below represents the Top 15 most prevalent email addresses used to send out phishing emails to different members of the public. Email spoofing
to impersonate well known companies continued to be the method of choice in phishing campaigns circulated in April 2016. It has been an ongoing trend
that email addresses of companies such as PayPal, Barclays and NatWest are the most prone to forgery.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Email address
*[email protected]*
*[email protected]*;*[email protected]*;
*[email protected]* and other variations
*[email protected]*
*[email protected]*
*[email protected]*
*[email protected]*
*[email protected]*
*[email protected]*
*[email protected]*
*[email protected]*
*[email protected]*
*[email protected]*
*[email protected]*
*[email protected]*
*[email protected]*
Number of emails
reported
120
57
18
18
17
17
16
16
15
15
15
13
13
12
12
Phishing campaign theme
Various scams
University Grant Information scam
Compensation payment scam
Various scams
Compensation payment scam
Service scheduled for disconnection scam
Barclays online banking suspension scam
Credit card application scam
PayPal account suspension scam
Inheritance payout scam
Santander account summary scam
NatWest online banking suspension scam
PayPal account overview scam
Fake invoice scam
Tax return notification
8
PROTECT - INTELLIGENCE
2.3.
Malicious URLs Contained in Phishing Emails – Top 15
The below table represents the Top 15 most prevalent URLs which appeared, in exactly the same form, in the phishing emails forwarded to the NFIB
phishing inbox by different members of the public during April 2016. Of the Top 15, seven URLs were identified as malicious vectors in phishing scams
purporting to be from banks, with Santander and NatWest being the most popular hooks. The recipients were asked to click on them in order to reactivate,
verify or check their banking services.
At least two URLs have been utilised in the ‘University Grant Information’ scam, which upon clicking redirected the students to a webpage containing a
form to fill out with their personal and bank account details.
Malicious URLs
1
2
3
4
5
6
7
8
9
ht*p://googlsar.com/loo
ht*p://sciencebasedhealth.com/images/MySubscriptions.php
ht*p://latosensuac.com.br/UPtarefas/index.php
ht*p://erdelyikopo.com/com_inc/stopeign
ht*p://googlosar.com/goo
ht*p://isasutweb.com/wp-content/com_inc/poltre
ht*p://presentedosanjos.com.br/kj.htm
ht*p://imbecile.me/mp.htm
ht*p://livin.hk/MBT-sko-salg/index/www/clarinet1.htm;
ht*p://livin.hk/MBT-sko-salg/index/www/clarinet4.htm;
ht*p://livin.hk/MBT-sko-salg/index/www/clarinet5.htm;
Number of
emails reported
20
20
17
16
13
12
11
11
Phishing campaign theme
Apple invoice scam
Santander account summary scam
NatWest closed account scam
University Grant Application scam
Fake Apple/iTunes invoice scam
University Grant Information scam
Santander online banking scam
NatWest online banking scam
11
HMRC tax refund scam
10 ht*p://ow.ly/4n5oeL
11 ht*p://alcanfor.cl/hav.htm
12 ht*p://bit.ly/1UEZWUH
10
10
10
13 ht*p://poonjiaji.com//wp-includes/js/ID.php
14 ht*p://ranbiz.com/wp-content/themes/twentyfifteen/inc/index.php
15 ht*p://www.tien-chang.com/mz.htm
9
9
9
DHL parcel delivery scam
Barclays online banking scam
Utility Warehouse service
disconnection scam
DHL parcel delivery scam
Santander online banking scam
Santander online banking scam
9
PROTECT - INTELLIGENCE
Notes & Guidance
This report may be circulated in accordance with the protective security marking shown below and caveats included within the report. The information contained in this
report is supplied by the City of London Police in confidence and may not be shared other than with the agreed readership/handling code without prior reference to the
City of London Police. Onward disclosure without prior authority may be unlawful, for example, under the Data Protection Act 1998.
The cover sheets must not be detached from the report to which they refer.
Protective Marking:
FOIA Exemption:
Suitable for Publication Scheme:
Version:
Storage File Location:
Purpose:
Owner:
Author:
Review By:
PROTECT
No
No
Cyber Crime Phishing_V1.0
G:\OPERATIONAL\Fraud_Intel\CYBER_PROTECT_TEAM\Phishing_Analysis
To inform strategy
ECD
Analyst -103804
Senior Analyst
Practical Guidance for PROTECT documents
This document is classified PROTECT. In government and law enforcement this determines the security measures that are required to protect it. This means:

Only permit members of your staff who have a genuine ‘Need to Know’ to see the contents of the document;

Do not copy the document or any of its pages without written approval of the City of London Police Head of Research and Analysis;

Do not pass on the document, or disclose any information contained in it, to any third party (outside of your business) without written approval of the City of
London Police Head of Research and Analysis;

Do not read or work on this document in public areas;

Lock the document in a secure cabinet when it is not being used;

Only dispose of this product by shredding, pulping or incineration.
10