Phishing sites use whitelisting to keep out unwanted victims

Criminals try the Studio 54 approach...

Businesses increasingly use whitelisting to keep the bad guys out but now it turns out that criminals are employing the same tactics to target favoured victims, security firm RSA has reported.

During 2012, the company saw a small surge in the popularity of plug-in modules for phishing kits that allow their users to aim attacks at specific targets in a way that excludes unintended victims.

Dubbed the "bouncer" attack (as in club bouncers), these generate user IDs for each target on the list, serving unwanted visitors a 404 for the same phishing site.

A huge surprise is the tiny scale of some of these attacks; 3,000 recipients was an average for campaigns.

Selective phishing isn't new per se but its emergence as a more regular tactic is partly a response to the predation of security firms, who make a living from detecting, analysing and blocking attacks in real time. Keeping these researchers out buys the attackers more time.

A second motivation is simply spear phishing, campaigns that target specific enterprises with a view to setting up more complex advanced persistent threat (APTs) attacks at a later date.

"The peculiar approach is likely the work of a gang or a fraud service vendor supplying credentials to specific geographical regions and targets," said RSA cybercrime specialist, Limor S Kessem.

As with most phishing websites these days, the pages on which these attacks hide will usually be hijacked blogs using vulnerable and poorly-managed open source content management systems. Hiding on legitimate domains is a way of hiding in plain sight.

"With phishing attacks popping up like mushrooms and then quickly taken down, arriving at a 404 page for a reported phish could present a detection challenge for the industry," predicted Kessem.

Despite being one of the most established attacks, 2012 was a record year for phishing, RSA said, with recorded attacks up 59 percent over the previous year.

Global fraud damages from phishing rose to $1.5 billion (£950 million), up 22 percent on 2011.

Tags: security, rsa security

The risks of sticking with Windows XP

READ THIS ARTICLE
DO NOT SHOW THIS BOX AGAIN [ x ]
Comments are now closed.
CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Email Security and Data Protection

Encrypt your sensitive email

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).


  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.