Rock Phish

Rock Phish refers to both a phishing toolkit/technique and the group behind it.[1][2]

Rock Phish gang and techniques

At one time the Rock Phish group was stated to be behind "one-half of the phishing attacks being carried out.[2] VeriSign reports them as a group of Romanian origin,[1] but others have claimed that the group is Russian.[3] They were first identified in 2004.[4]

Their techniques were sophisticated and distinctive, as outlined in a presentation at APWG eCrime '07.[5]

History

In 2004 the first rock phishing attacks contained the folder path “/rock”, which led to the name of the attack, and group.

Attackers employed wild card DNS (domain name server) entries to create addresses that included the target’s actual address as a sub-domain. For example, in the case of a site appearing as www.thebank.com.1.cn/thebank.html, ”thebank.com” portion of the domain name is the “wild card”, meaning its presence is purely superficial – it is not required in order for the phishing page to be displayed. “1.cn” is the registered domain name, “/thebank.html” is the phishing page, and the combination of “1.cn/thebank” will display the phishing page. This allows the perpetrators to make the wild card portion the legitimate domain name, so that it appears at first glance to be a valid folder path.[6]

gollark: Which one is 6054-1 again?
gollark: * SCP-6052
gollark: Yes, SCP-60952.
gollark: In that case... I didn't want to have to do this, but I'll have to release SCP-6052.
gollark: You're infected with SCP-055.

References

  1. Compliance and Privacy (2006-12-15). "What is Rock Phish? And why is it important to know?". Compliance and Privacy. Retrieved 2006-12-15. Rock Phish is an individual or group of actors likely working out of Romania and nearby countries in the region. This group has been in operation since 2004 and is responsible for innovation in both spam and phishing attacks to date, such as pioneering image-spam (Ken Dunham, VeriSign)
  2. Robert McMillan (2006-12-12). "'Rock Phish' blamed for surge in phishing". InfoWorld. p. 2. Archived from the original on 2007-01-08. Retrieved 2006-12-13. The first thing you need to know about Rock Phish is that nobody knows exactly who, or what, they are.
  3. Dignan, Larry. "RSA finds new malware enhanced phishing technique". ZDNet. Retrieved 8 September 2018.
  4. Howard, Rick (2009-04-23). Cyber Fraud: Tactics, Techniques and Procedures. CRC Press. p. 264. ISBN 9781420091281. Rock Phish gang.
  5. Tyler Moore and Richard Clayton. "Examining the Impact of Website Take-down on Phishing" (PDF). APWG eCrime Researcher's Summit, ACM Press, pp. 1-13. Retrieved October 28, 2007.
  6. Goodin, Dan. "FBI logs its millionth zombie address". The Register. Retrieved 8 September 2018.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.