List of phishing incidents

Last updated

The list of phishing incidents covers important or noteworthy events in the history of phishing.

Contents

1980s

1990s

The term "phishing" is said to have been coined by the well known spammer and hacker in the mid-90s, Khan C. Smith. [3] The first recorded mention of the term is found in the hacking tool AOHell (according to its creator), which included a function for attempting to steal the passwords or financial details of America Online users. [4] [5]

2000s

2010s

Unique phishing reports by year [30]
YearCampaigns
2005
173,063
2006
268,126
2007
327,814
2008
335,965
2009
412,392
2010
313,517
2011
284,445
2012
320,081
2013
491,399
2014
704,178
2015
1,413,978

2020s

Overview

Total number of unique phishing reports (campaigns) received, according to APWG [30]
Year JanFebMarAprMayJunJulAugSepOctNovDecTotal
2005 12,845 13,468 12,883 14,411 14,987 15,050 14,135 13,776 13,562 15,820 16,882 15,244 173,063
2006 17,877 17,163 18,480 17,490 20,109 28,571 23,670 26,150 22,136 26,877 25,816 23,787 268,126
2007 29,930 23,610 24,853 23,656 23,415 28,888 23,917 25,624 38,514 31,650 28,074 25,683 327,814
2008 29,284 30,716 25,630 24,924 23,762 28,151 24,007 33,928 33,261 34,758 24,357 23,187 335,965
2009 34,588 31,298 30,125 35,287 37,165 35,918 34,683 40,621 40,066 33,254 30,490 28,897 412,392
2010 29,499 26,909 30,577 24,664 26,781 33,617 26,353 25,273 22,188 23,619 23,017 21,020 313,517
2011 23,535 25,018 26,402 20,908 22,195 22,273 24,129 23,327 18,388 19,606 25,685 32,979 284,445
2012 25,444 30,237 29,762 25,850 33,464 24,811 30,955 21,751 21,684 23,365 24,563 28,195 320,081
2013 28,850 25,385 19,892 20,086 18,297 38,100 61,453 61,792 56,767 55,241 53,047 52,489 491,399
2014 53,984 56,883 60,925 57,733 60,809 53,259 55,282 54,390 53,661 68,270 66,217 62,765 704,178
2015 49,608 55,795 115,808 142,099 149,616 125,757 142,155 146,439 106,421 194,499 105,233 80,548 1,413,978
2016 99,384 229,315 229,265 121,028 96,490 98,006 93,160 66,166 69,925 51,153 64,324 95,555 1,313,771
201796,148100,932121,86087,45393,28592,65799,02499,17298,01261,32286,54785,7441,122,156
201889,25089,01084,44491,05482,54790,88293,07889,32388,15687,61964,90587,3861,040,654
201934,63035,36442,39937,05440,17734,93235,53040,45742,27345,05742,42445,072475,369

"APWG Phishing Attack Trends Reports" . Retrieved May 5, 2019.

See also

Related Research Articles

<span class="mw-page-title-main">Computer security</span> Protection of computer systems from information disclosure, theft or damage

Computer security is the protection of computer software, systems and networks from threats that may result in unauthorized information disclosure, theft of hardware, software, or data, as well as from the disruption or misdirection of the services they provide.

<span class="mw-page-title-main">Cybercrime</span> Type of crime based in computer networks

Cybercrime encompasses a wide range of criminal activities that are carried out using digital devices and/or networks. These crimes involve the use of technology to commit fraud, identity theft, data breaches, computer viruses, scams, and expanded upon in other malicious acts. Cybercriminals exploit vulnerabilities in computer systems and networks to gain unauthorized access, steal sensitive information, disrupt services, and cause financial or reputational harm to individuals, organizations, and governments.

<span class="mw-page-title-main">Phishing</span> Form of social engineering

Phishing is a form of social engineering and a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses, worms, adware, or ransomware. Phishing attacks have become increasingly sophisticated and often transparently mirror the site being targeted, allowing the attacker to observe everything while the victim navigates the site, and transverses any additional security boundaries with the victim. As of 2020, it is the most common type of cybercrime, with the FBI's Internet Crime Complaint Center reporting more incidents of phishing than any other type of computer crime.

Email fraud is intentional deception for either personal gain or to damage another individual using email as the vehicle. Almost as soon as email became widely used, it began to be used as a means to defraud people, just as telephony and paper mail were used by previous generations.

A spoofed URL involves one website masquerading as another, often leveraging vulnerabilities in web browser technology to facilitate a malicious computer attack. These attacks are particularly effective against computers that lack up-to- security patches. Alternatively, some spoofed URLs are crafted for satirical purposes.

Email spoofing is the creation of email messages with a forged sender address. The term applies to email purporting to be from an address which is not actually the sender's; mail sent in reply to that address may bounce or be delivered to an unrelated party whose identity has been faked. Disposable email address or "masked" email is a different topic, providing a masked email address that is not the user's normal address, which is not disclosed, but forwards mail sent to it to the user's real address.

<span class="mw-page-title-main">Timeline of Internet conflicts</span>

The Internet has a long history of turbulent relations, major maliciously designed disruptions, and other conflicts. This is a list of known and documented Internet, Usenet, virtual community and World Wide Web related conflicts, and of conflicts that touch on both offline and online worlds with possibly wider reaching implications.

Voice phishing, or vishing, is the use of telephony to conduct phishing attacks.

Internet fraud prevention is the act of stopping various types of internet fraud. Due to the many different ways of committing fraud over the Internet, such as stolen credit cards, identity theft, phishing, and chargebacks, users of the Internet, including online merchants, financial institutions and consumers who make online purchases, must make sure to avoid or minimize the risk of falling prey to such scams.

<span class="mw-page-title-main">Credit card fraud</span> Financial crime

Credit card fraud is an inclusive term for fraud committed using a payment card, such as a credit card or debit card. The purpose may be to obtain goods or services or to make payment to another account, which is controlled by a criminal. The Payment Card Industry Data Security Standard is the data security standard created to help financial institutions process card payments securely and reduce card fraud.

Zeus is a Trojan horse malware package that runs on versions of Microsoft Windows. It is often used to steal banking information by man-in-the-browser keystroke logging and form grabbing. Zeus is spread mainly through drive-by downloads and phishing schemes. First identified in July 2007 when it was used to steal information from the United States Department of Transportation, it became more widespread in March 2009. In June 2009 security company Prevx discovered that Zeus had compromised over 74,000 FTP accounts on websites of such companies as the Bank of America, NASA, Monster.com, ABC, Oracle, Play.com, Cisco, Amazon, and BusinessWeek. Similarly to Koobface, Zeus has also been used to trick victims of technical support scams into giving the scam artists money through pop-up messages that claim the user has a virus, when in reality they might have no viruses at all. The scammers may use programs such as Command prompt or Event viewer to make the user believe that their computer is infected.

Social hacking describes the act of attempting to manipulate outcomes of social behaviour through orchestrated actions. The general function of social hacking is to gain access to restricted information or to a physical space without proper permission. Most often, social hacking attacks are achieved by impersonating an individual or group who is directly or indirectly known to the victims or by representing an individual or group in a position of authority. This is done through pre-meditated research and planning to gain victims’ confidence. Social hackers take great measures to present overtones of familiarity and trustworthiness to elicit confidential or personal information. Social hacking is most commonly associated as a component of “social engineering”.

Cozy Bear, classified by the United States federal government as advanced persistent threat APT29, is a Russian hacker group believed to be associated with one or more intelligence agencies of Russia. The Dutch General Intelligence and Security Service (AIVD) deduced from security camera footage that it is led by the Russian Foreign Intelligence Service (SVR), a view shared by the United States. Cybersecurity firm CrowdStrike also previously suggested that it may be associated with either the Russian Federal Security Service (FSB) or SVR. The group has been given various nicknames by other cybersecurity firms, including CozyCar, CozyDuke, Dark Halo, The Dukes, Midnight Blizzard, NOBELIUM, Office Monkeys, StellarParticle, UNC2452, and YTTRIUM.

Fancy Bear is a Russian cyber espionage group. Cybersecurity firm CrowdStrike has said with a medium level of confidence that it is associated with the Russian military intelligence agency GRU. The UK's Foreign and Commonwealth Office as well as security firms SecureWorks, ThreatConnect, and Mandiant, have also said the group is sponsored by the Russian government. In 2018, an indictment by the United States Special Counsel identified Fancy Bear as GRU Unit 26165. This refers to its unified Military Unit Number of the Russian army regiments. The headquarters of Fancy Bear and the entire military unit, which reportedly specializes in state-sponsored cyberattacks and decryption of hacked data, were targeted by Ukrainian drones on July 24, 2023, the rooftop on an adjacent building collapsed as a result of the explosion.

Lazarus Group is a hacker group made up of an unknown number of individuals, alleged to be run by the government of North Korea. While not much is known about the Lazarus Group, researchers have attributed many cyberattacks to them since 2010. Originally a criminal group, the group has now been designated as an advanced persistent threat due to intended nature, threat, and wide array of methods used when conducting an operation. Names given by cybersecurity organizations include Hidden Cobra and ZINC or Diamond Sleet. According to North Korean defector Kim Kuk-song, the unit is internally known in North Korea as 414 Liaison Office.

Charming Kitten, also called APT35, Phosphorus or Mint Sandstorm, Ajax Security, and NewsBeef, is an Iranian government cyberwarfare group, described by several companies and government officials as an advanced persistent threat.

<span class="mw-page-title-main">2020 Twitter account hijacking</span> July 2020 compromise of multiple Twitter accounts to post scam tweets

On July 15, 2020, between 20:00 and 22:00 UTC, 130 high-profile Twitter accounts were reportedly compromised by outside parties to promote a bitcoin scam. Twitter and other media sources confirmed that the perpetrators had gained access to Twitter's administrative tools so that they could alter the accounts themselves and post the tweets directly. They appeared to have used social engineering to gain access to the tools via Twitter employees. Three individuals were arrested by authorities on July 31, 2020, and charged with wire fraud, money laundering, identity theft, and unauthorized computer access related to the scam.

The Nitro hacking attacks were a targeted malware campaign in 2011 suspected to be a case of corporate espionage. At least 48 confirmed companies were infected with a Trojan called Poison Ivy that transferred intellectual property to remote servers. Much of the information known about these attacks comes from a white paper published by cybersecurity company Symantec.

References

  1. Garr, Doug (March 1984). "Life in a Wired Society". Omni. 6: 56.
  2. Felix, Jerry & Hauck, Chris (September 1987). "System Security: A Hacker's Perspective". 1987 Interex Proceedings. 8: 6.
  3. "EarthLink wins $25 million lawsuit against junk e-mailer". Archived from the original on March 22, 2019. Retrieved April 11, 2014.
  4. Langberg, Mike (September 8, 1995). "AOL Acts to Thwart Hackers". San Jose Mercury News . Archived from the original on April 29, 2016. Retrieved March 14, 2012.
  5. Rekouche, Koceilah (2011). "Early Phishing". arXiv: 1106.4692 [cs.CR].
  6. Stutz, Michael (January 29, 1998). "AOL: A Cracker's Momma!". Wired News. Archived from the original on December 14, 2005.
  7. "Phishing | History of Phishing". phishing.org. Archived from the original on September 9, 2018. Retrieved September 13, 2019.
  8. "Phishing". Word Spy. Archived from the original on October 15, 2014. Retrieved September 28, 2006.
  9. "History of AOL Warez". Archived from the original on April 6, 2011. Retrieved September 28, 2006.
  10. "GP4.3 – Growth and Fraud — Case #3 – Phishing". Financial Cryptography. December 30, 2005. Archived from the original on January 22, 2019. Retrieved February 23, 2007.
  11. Sangani, Kris (September 2003). "The Battle Against Identity Theft". The Banker. 70 (9): 53–54.
  12. Kerstein, Paul (July 19, 2005). "How Can We Stop Phishing and Pharming Scams?". CSO. Archived from the original on March 24, 2008.
  13. "In 2005, Organized Crime Will Back Phishers". IT Management. December 23, 2004. Archived from the original on December 31, 2010.
  14. Abad, Christopher (September 2005). "The economy of phishing: A survey of the operations of the phishing market". First Monday. Archived from the original on November 21, 2011. Retrieved October 8, 2010.
  15. "UK phishing fraud losses double". Finextra. March 7, 2006. Archived from the original on January 19, 2009. Retrieved May 20, 2006.
  16. Richardson, Tim (May 3, 2005). "Brits fall prey to phishing". The Register. Archived from the original on June 10, 2019. Retrieved August 10, 2017.
  17. Krebs, Brian (October 13, 2007). "Shadowy Russian Firm Seen as Conduit for Cybercrime". The Washington Post . Archived from the original on June 11, 2019. Retrieved September 8, 2017.
  18. Miller, Rich (September 13, 2006). "Bank, Customers Spar Over Phishing Losses". Netcraft. Retrieved December 14, 2006.
  19. "Latest News". Archived from the original on October 7, 2008.
  20. "Bank of Ireland agrees to phishing refunds". vnunet.com. Archived from the original on October 28, 2008.
  21. "Suspicious e-Mails and Identity Theft". Internal Revenue Service. Archived from the original on February 21, 2011. Retrieved July 5, 2006.
  22. "Phishing for Clues". Indiana University Bloomington. September 15, 2005. Archived from the original on July 31, 2009. Retrieved September 15, 2005.
  23. Kirk, Jeremy (June 2, 2006). "Phishing Scam Takes Aim at MySpace.com". IDG Network. Archived from the original on June 16, 2006.
  24. "Malicious Website / Malicious Code: MySpace XSS QuickTime Worm". Websense Security Labs. Archived from the original on December 5, 2006. Retrieved December 5, 2006.
  25. McCall, Tom (December 17, 2007). "Gartner Survey Shows Phishing Attacks Escalated in 2007; More than $3 Billion Lost to These Attacks". Gartner. Archived from the original on November 18, 2012. Retrieved December 20, 2007.
  26. "A Profitless Endeavor: Phishing as Tragedy of the Commons" (PDF). Microsoft. Retrieved November 15, 2008.
  27. "Torrent of spam likely to hit 6.3 million TD Ameritrade hack victims". Archived from the original on August 21, 2008.
  28. "1-Click Hosting at RapidTec — Warning of Phishing!". Archived from the original on April 30, 2008. Retrieved December 21, 2008.
  29. APWG. "Phishing Activity Trends Report" (PDF). Archived from the original (PDF) on October 3, 2012. Retrieved November 4, 2013.
  30. 1 2 "APWG Phishing Attack Trends Reports". Archived from the original on March 21, 2021. Retrieved October 20, 2018.
  31. "Anatomy of an RSA attack". RSA.com. RSA FraudAction Research Labs. Archived from the original on October 6, 2014. Retrieved September 15, 2014.
  32. Drew, Christopher; Markoff, John (May 27, 2011). "Data Breach at Security Firm Linked to Attack on Lockheed". The New York Times. Archived from the original on July 9, 2019. Retrieved September 15, 2014.
  33. Keizer, Greg (August 13, 2011). "Suspected Chinese spear-phishing attacks continue to hit Gmail users". Computerworld. Archived from the original on March 21, 2021. Retrieved December 4, 2011.
  34. Ewing, Philip (August 22, 2011). "Report: Chinese TV doc reveals cyber-mischief". Dod Buzz. Archived from the original on January 26, 2017. Retrieved December 4, 2011.
  35. "Syrian hackers Use Outbrain to Target The Washington Post, Time, and CNN" Archived October 19, 2013, at the Wayback Machine , Philip Bump, The Atlantic Wire, August 15, 2013. Retrieved August 15, 2013.
  36. Paul, Andrew. "Phishing Emails: The Unacceptable Failures of American Express". Email Answers. Archived from the original on October 9, 2013. Retrieved October 9, 2013.
  37. O'Connell, Liz. "Report: Email phishing scam led to Target breach". Bring Me the News. Archived from the original on September 15, 2014. Retrieved September 15, 2014.
  38. Ausick, Paul. "Target CEO Sack". Archived from the original on September 15, 2014. Retrieved September 15, 2014.
  39. Kelion, Leo (December 24, 2013). "Cryptolocker ransomware has 'infected about 250,000 PCs'". BBC. Archived from the original on March 22, 2019. Retrieved December 24, 2013.
  40. "Israeli defence computer hacked via tainted email -cyber firm". Reuters. January 26, 2014. Archived from the original on September 24, 2015. Retrieved July 1, 2017.
  41. לוי, רויטרס ואליאור (January 27, 2014). "האקרים השתלטו על מחשבים ביטחוניים". Ynet. Archived from the original on March 21, 2021. Retrieved November 29, 2016.
  42. "Hackers break into Israeli defence computers, says security company". The Guardian. Archived from the original on February 9, 2014.
  43. "Israel defence computers hit by hack attack". BBC News. January 27, 2014. Archived from the original on March 22, 2019. Retrieved June 22, 2018.
  44. "Israeli Defense Computer Hit in Cyber Attack: Data Expert | SecurityWeek.Com". securityweek.com. January 27, 2014. Archived from the original on March 22, 2019. Retrieved September 13, 2019.
  45. "Israel to Ease Cyber-Security Export Curbs, Premier Says". Bloomberg. Archived from the original on March 4, 2014. Retrieved March 11, 2017.
  46. Halpern, Micah D. "Cyber Break-in @ IDF". HuffPost. Archived from the original on March 21, 2021. Retrieved February 20, 2020.
  47. Prosecutors find that ‘Fappening’ celebrity nudes leak was not Apple’s fault Archived August 18, 2017, at the Wayback Machine March 15, 2016, Techcrunch
  48. "ICANN Targeted in Spear Phishing Attack | Enhanced Security Measures Implemented". icann.org. Archived from the original on August 7, 2019. Retrieved December 18, 2014.
  49. "Eccleston Indictment". November 1, 2013. Archived from the original on January 26, 2017. Retrieved November 22, 2020.
  50. "Former U.S. Nuclear Regulatory Commission Employee Pleads Guilty to Attempted Spear-Phishing Cyber-Attack on Department of Energy Computers". February 2, 2016. Archived from the original on August 8, 2019. Retrieved November 22, 2020.
  51. Nakashima, Ellen (September 28, 2016). "Russian hackers harassed journalists who were investigating Malaysia Airlines plane crash". The Washington Post. Archived from the original on April 23, 2019. Retrieved October 26, 2016.
  52. ThreatConnect (September 28, 2016). "ThreatConnect reviews activity targeting Bellingcat, a key contributor in the MH17 investigation". ThreatConnect. Retrieved October 26, 2016.
  53. Kube, Courtney (August 7, 2015). "Russia hacks Pentagon computers: NBC, citing sources". Archived from the original on August 8, 2019. Retrieved August 7, 2015.
  54. Starr, Barbara (August 7, 2015). "Official: Russia suspected in Joint Chiefs email server intrusion". Archived from the original on August 8, 2019. Retrieved August 7, 2015.
  55. Doctorow, Cory (August 28, 2015). "Spear phishers with suspected ties to Russian government spoof fake EFF domain, attack White House". Boing Boing. Archived from the original on March 22, 2019. Retrieved November 29, 2016.
  56. Quintin, Cooper (August 27, 2015). "New Spear Phishing Campaign Pretends to be EFF". EFF. Archived from the original on August 7, 2019. Retrieved November 29, 2016.
  57. "Austria's FACC, hit by cyber fraud, fires CEO". Reuters. May 26, 2016. Archived from the original on March 21, 2021. Retrieved December 20, 2018.
  58. Sanger, David E.; Corasaniti, Nick (June 14, 2016). "D.N.C. Says Russian Hackers Penetrated Its Files, Including Dossier on Donald Trump". The New York Times. Archived from the original on July 25, 2019. Retrieved October 26, 2016.
  59. Economist, Staff of (September 24, 2016). "Bear on bear". Economist. Archived from the original on May 20, 2017. Retrieved October 25, 2016.
  60. "KU employees fall victim to phishing scam, lose paychecks". Archived from the original on March 22, 2019. Retrieved October 6, 2016.
  61. "Hackers lurking, parliamentarians told". Deutsche Welle. Retrieved September 21, 2016.
  62. Pinkert, Georg Heil; Berlin, Nicolas Richter (September 20, 2016). "Hackerangriff auf deutsche Parteien". Süddeutsche Zeitung. Retrieved September 21, 2016.
  63. Holland, Martin (September 20, 2016). "Angeblich versuchter Hackerangriff auf Bundestag und Parteien". Heise. Archived from the original on April 1, 2019. Retrieved September 21, 2016.
  64. Hemicker, Lorenz; Alto, Palo. "Wir haben Fingerabdrücke". Frankfurter Allgemeine Zeitung. Frankfurter Allgemeine. Archived from the original on March 22, 2019. Retrieved September 21, 2016.
  65. Hyacinth Mascarenhas (August 23, 2016). "Russian hackers 'Fancy Bear' likely breached Olympic drug-testing agency and DNC, experts say". International Business Times . Retrieved September 13, 2016.
  66. "What we know about Fancy Bears hack team". BBC News. September 15, 2016. Archived from the original on March 22, 2019. Retrieved September 17, 2016.
  67. Gallagher, Sean (October 6, 2016). "Researchers find fake data in Olympic anti-doping, Guccifer 2.0 Clinton dumps". Ars Technica. Archived from the original on July 14, 2017. Retrieved October 26, 2016.
  68. "Russian Hackers Launch Targeted Cyberattacks Hours After Trump's Win". November 10, 2016. Archived from the original on January 27, 2017. Retrieved November 28, 2016.
  69. European Parliament Committee on Foreign Affairs (November 23, 2016), "MEPs sound alarm on anti-EU propaganda from Russia and Islamist terrorist groups" (PDF), European Parliament , archived (PDF) from the original on August 8, 2019, retrieved November 26, 2016
  70. Lewis Sanders IV (October 11, 2016), 'Divide Europe': European lawmakers warn of Russian propaganda, Deutsche Welle, archived from the original on March 25, 2019, retrieved November 24, 2016
  71. "Qatar faced 93,570 phishing attacks in first quarter of 2017". Gulf Times (in Arabic). May 12, 2017. Archived from the original on August 4, 2018. Retrieved January 28, 2018.
  72. "Facebook and Google Were Victims of $100M Payment Scam". Fortune. Archived from the original on August 8, 2019. Retrieved January 28, 2018.
  73. "Amazon Prime Day phishing scam spreading now!". The Kim Komando Show. Archived from the original on May 27, 2019. Retrieved January 28, 2018.
  74. "Cryptocurrency Hackers Are Stealing from EOS's $4 Billion ICO Using This Sneaky Scam". Jen Wieczner. Archived from the original on March 21, 2021. Retrieved May 31, 2018.
  75. "Golden Entertainment phishing attack exposes gamblers' data". verdict.co.uk. February 3, 2020. Retrieved March 23, 2022.
  76. "How Phishing Impacts the Online Gambling Industry". sportsbetting3.com. November 9, 2021. Retrieved March 23, 2022.
  77. "Miranda et al v. Golden Entertainment (NV), Inc" (PDF). justia.com. Retrieved March 23, 2022.
  78. "Nigerian Man Sentenced 10 Years for $11 million Phishing Scam". cyberscoop.com. February 17, 2021. Retrieved March 23, 2022.
  79. "Nigerian National Sentenced to Prison for $11 Million Global Fraud Scheme". justice.gov. February 16, 2021. Retrieved March 23, 2022.
  80. "Twitter Investigation Report – Department of Financial Services". www.dfs.ny.gov. October 14, 2020. Retrieved October 11, 2020.
  81. "Three Individuals Charged For Alleged Roles In Twitter Hack". justice.gov. Retrieved March 23, 2022.