SlideShare a Scribd company logo
1 of 11
Download to read offline
1st
Quarter
2016
January – March 2016
Published May 23, 2016
Phishing Activity Trends Report
	
Unifying the
Global Response
To Cybercrime
Phishing Activity Trends Report
1st Quarter 2016
w w w . a p w g . o r g • i n f o @ a p w g . o r g 	
	
2	
Phishing Activity Trends Report, 1st Quarter 2016
!
	
Table of Contents
Statistical Highlights for 1st Quarter 2016 3
Phishing E-mail Reports and Phishing Site Trends 4
Brand-Domain Pairs Measurement 5
Brands & Legitimate Entities Hijacked by
E-mail Phishing Attacks 6
Most Targeted Industry Sectors 7
Countries Hosting Phishing Sites 7
Top Malware Infected Countries 8
Measurement of Detected Crimeware 9
Phishing-based Trojans & Downloader’s Host
Countries (by IP address) 10
Phishing by Top-Level Domain 10
APWG Phishing Trends Report Contributors 11
Phishing Report Scope
The APWG Phishing Activity Trends Report analyzes
phishing attacks reported to the APWG by its member
companies, its Global Research Partners, through the
organization’s website at http://www.apwg.org, and by
e-mail submissions to reportphishing@antiphishing.org.
APWG also measures the evolution, proliferation, and
propagation of crimeware by drawing from the research
of our member companies.
Phishing Defined
Phishing is a criminal mechanism employing both social
engineering and technical subterfuge to steal consumers’
personal identity data and financial account credentials.
Social engineering schemes use spoofed e-mails
purporting to be from legitimate businesses and
agencies, designed to lead consumers to counterfeit
websites that trick recipients into divulging financial
data such as usernames and passwords. Technical
subterfuge schemes plant crimeware onto PCs to steal
credentials directly, often using systems to intercept
consumers online account user names and passwords --
and to corrupt local navigational infrastructures to
misdirect consumers to counterfeit websites (or authentic
websites through phisher-controlled proxies used to
monitor and intercept consumers’ keystrokes).
1st Quarter 2016 Phishing Activity Trends Summary
• The number of phishing websites observed by
APWG increased 250% from the last quarter of
2015 through the first quarter of 2016. [p. 4]
• The Retail/Service sector remained the most-
targeted industry sector during the first quarter
of 2016, with 42.71% of attacks. [p. 7]	
• The number of brands targeted by phishers in
the first quarter remained constant – ranging
from 406 to 431 brands each month. [p. 6]
• The United States continued its position at top
on the list of nations hosting phishing websites.
[p. 7]
• In Q1 2016, 20 million new malware samples
were captured. [p. 8]
• The world's most-infected countries are led by
China, where 57.24% of computers are infected,
followed by Taiwan (49.15%) and Turkey at
42.52%. [p. 8]
	
Phishing attacks rose in the Christmas 2015 season, and
have continued to climb in the new year.
Phishers Ramp Up into 2016
With Major Increase in Attacks
Phishing Activity Trends Report
1st Quarter 2016
w w w . a p w g . o r g • i n f o @ a p w g . o r g 	
	
3	
Phishing Activity Trends Report, 1st Quarter 2016
!
	
The APWG continues to refine its tracking and reporting methodology and to incorporate new data sources into our
reports. APWG tracks and reports the number of unique phishing reports (email campaigns) it receives, in addition
to the number of unique phishing sites found. An e-mail campaign is a unique e-mail sent out to multiple users,
directing them to a specific phishing web site (multiple campaigns may point to the same web site). APWG counts
unique phishing report e-mails as those found in a given month that have the same subject line in the e-mail.
The APWG also tracks the number of unique phishing websites. This is now determined by the unique base URLs of
the phishing sites. (A single phishing site may be advertised as thousands of customized URLS, all leading to
basically the same attack destination.) APWG additionally tracks crimeware instances (unique software applications
as determined by MD5 hash of the crimeware sample), as well as unique sites that are distributing crimeware
(typically via browser drive-by exploits). The APWG Phishing Activity Trends Report also includes statistics on rogue
anti-virus software, desktop infection rates, and related topics.
January February March
Number of unique phishing websites detected
86,557 79,259 123,555
Number of unique phishing e-mail reports (campaigns) received
by APWG from consumers
99,384 229,315 229,265
Number of brands targeted by phishing campaigns
431 406 418
Country hosting the most phishing websites
USA USA USA
Phishing URL contains some form of target name
59.39% 54.60% 55.13%
Percentage of sites not using port 80
5.95% 5.25% 4.26%
Methodology and Instrumented Data Sets
Statistical Highlights for 1st Quarter 2016
Phishing Activity Trends Report
1st Quarter 2016
w w w . a p w g . o r g • i n f o @ a p w g . o r g 	
	
4	
Phishing Activity Trends Report, 1st Quarter 2016
!
	
The total number of unique phishing websites observed in Q1 was 289,371. The number observed per month rose
steadily from the 48,114 detected in October 2015 to the 123,555 detected in March 2016 – a 250 percent increase over
six months. The increase in December 2015 was expected, since there is usually a spate of spamming and online
fraud during the holiday shopping season. The continuing increase into 2016 is cause for concern.
The number of unique phishing reports submitted to APWG during Q4 was 557,964. The number of unique phishing
reports submitted to APWG saw a notable increase of nearly 130,000 from January to March:
	
Phishing E-mail Reports and Phishing Site Trends – 1st Quarter 2016
Phishing Activity Trends Report
1st Quarter 2016
w w w . a p w g . o r g • i n f o @ a p w g . o r g 	
	
5	
Phishing Activity Trends Report, 1st Quarter 2016
!
	
The following chart combines statistics based on brands phished, unique domains, unique domain/brand pairs, and
unique URLs. Brand/domain pairs count the unique instances of a domain being used to target a specific brand.
(Example: if several URLs are targeting a brand – but are hosted on the same domain – this brand/domain pair
would be counted as one instead of several.) Forensic utility of this metric: If the number of unique URLs is greater
than the number of brand/domain pairs, it indicates many URLs are being hosted on the same domain to target the
same brand. Knowing how many URLs occur with each domain indicates the approximate number of attacking
domains a brand-holding victim needs to locate and neutralize. Since phishing-prevention technologies (like
browser and e-mail blocking) require the full URL in order to prevent over-blocking, it is useful to understand the
general number of unique URLs that occur per domain.
January February March
Number of Unique Phishing Web Sites Detected 86,557 79,259 123,555
Unique Domains 21,131 17,438 21,394
Unique Brand-Domain Pairs 26,789 21,476 26,968
Unique Brands 431 406 418
URLs Per Brand 200 195 295
Brand-Domain Pairs Measurement – 1st Quarter 2016
Phishing Activity Trends Report
1st Quarter 2016
w w w . a p w g . o r g • i n f o @ a p w g . o r g 	
	
6	
Phishing Activity Trends Report, 1st Quarter 2016
!
	
The number of brands targeted by phishers in in the first quarter remained fairly constant – ranging from 406 to 431
brands each month. Across 2015 and into 2016, phishers targeted between 391 and 442 unique brands in any given
month of that year.
	
Brands and Legitimate Entities Targeted by E-mail Phishing Attacks – 1st Quarter 2016
Phishing Activity Trends Report
1st Quarter 2016
w w w . a p w g . o r g • i n f o @ a p w g . o r g 	
	
7	
Phishing Activity Trends Report, 1st Quarter 2016
!
	
The Retail/Service sector remained the most-targeted industry sector, with 42.71 percent of attacks, followed again
by Financial Services. According to Stefanie Ellis, AntiFraud Product Marketing Manager at MarkMonitor:
“MarkMonitor continues to detect a high volume of attacks targeting cloud-based or SAAS companies, driving
significant increases in the Retail Service sector. Financial and Payment targets are still heavily targeted.”
	
The United States continued to top the list of the countries hosting phishing sites. Phishers often break into
vulnerable web hosting networks to provision phishing sites, and the United States hosts a large number
of web sites.
January February March
United States 75.10% United States 81.90% United States 75.62%
Belize 4.79% United
Kingdom
2.20% China 4.16%
Netherlands 3.59% Germany 2.15% Hong Kong 3.05%
Germany 2.13% Belgium 1.83% Netherlands 3.02%
Belgium 1.79% Netherlands 1.55% Germany 2.24%
United Kingdom 1.57% Canada 0.63% United
Kingdom
1.31%
China 1.46% Russian
Federation
0.59% Russian
Federation
0.75%
Russian Federation 1.28% Kazakhstan 0.56% Italy 0.74%
Australia 0.64% Australia 0.56% Australia 0.71%
France 0.60% Chile 0.52% France 0.56%
Countries Hosting Phishing Sites – 1st Quarter 2016	
Most-Targeted Industry Sectors – 4th Quarter 2015
Phishing Activity Trends Report
1st Quarter 2016
w w w . a p w g . o r g • i n f o @ a p w g . o r g 	
	
8	
Phishing Activity Trends Report, 1st Quarter 2016
!
	
The APWG’s Crimeware statistics categorize crimeware attacks as follows, though the taxonomy will grow as
variations in attack code are spawned. Definition: Crimeware is code designed with the intent of collecting
information on the end-user in order to steal the user’s credentials. Unlike most generic keyloggers, phishing-based
keyloggers have tracking components, which attempt to monitor specific actions (and specific organizations, such as
financial institutions, retailers, and e-commerce merchants) in order to target specific information. The most
common types of information are access to financial-based websites, e-commerce sites, and web-based mail sites.
APWG member PandaLabs started the year by detecting more than 20 million new malware samples, at an average
of 227,000 a day. This is a figure slightly higher than discovered in the same quarter in 2015, where the average new
samples were 225,000 a day. Trojans were the most common type of malware, as they have been for years.
Ransomware is counted in the trojan category, and that kind of malware has increased markedly.
According to Luis Corrons, PandaLabs Technical Director and Trends Report contributing analyst, trojans comprised
66.81 percent of the malware samples observed during the quarter, an increase from 53 percent in the fourth quarter of
2015. Most infections are also caused by trojans, in 65.89 percent of cases.
Asia and Latin America were the regions that registered the highest infection rates. The countries with the lowest
infection rates are generally in Europe, with Japan also appearing in the bottom ten.
Crimeware Taxonomy and Samples According to Classification
Malware Infected Countries – 4th Quarter 2015	
New Malware Strains in Q1 % of malware samples
Trojans 66.81%
Virus 15.98%
Worms 11.01%
Adware / Spyware 1.98%
PUPs 4.22%
	
Ranking Country Infection rate
36 The Netherlands 26.15%
37 Denmark 25.43%
38 Japan 24.99%
39 Germany 23.64%
40 United Kingdom 23.61%
41 Belgium 22.87%
42 Switzerland 21.43%
43 Finland 20.45%
44 Norway 20.33%
45 Sweden 19.80%
	
Ranking Country Infection Rate
1 China 51.35%
2 Turkey 48.02%
3 Taiwan 41.24%
4 Ecuador 39.59%
5 Guatemala 38.01%
6 Russia 37.98%
7 Mexico 36.32%
8 Peru 36.02%
9 Poland 35.55%
10 Brazil 34.00%
Malware Infections by Type % of malware samples
Trojans 65.89%
Virus 1.95%
Worms 3.03%
Adware / Spyware 4.01%
PUPs 25.12%
Phishing Activity Trends Report
1st Quarter 2016
w w w . a p w g . o r g • i n f o @ a p w g . o r g 	
	
9	
Phishing Activity Trends Report, 1st Quarter 2016
!
	
Using data contributed from APWG founding member Forcepoint regarding the proliferation of malevolent
software, this metric measures proportions of three genera of malevolent code:
1. Crimeware (data-stealing malicious code designed specifically to be used to victimize financial institutions’
customers and to co-opt those institutions’ identities); 	
2. Data Stealing and Generic Trojans (code designed to send information from the infected machine, control it,
and open backdoors on it); and
3. Other (the remainder of malicious code commonly encountered in the field such as auto-replicating worms,
dialers for telephone charge-back scams, etc.)
Accoring to Carl Leonard, Principal Security Analyst at Forcepoint: “The onslaught from ransomware has not
abated in 2016. Ransomware authors exhibited a willingness to change their scare tactics and algorithms in Q1 2016
as they sought to scam end-users. The Jigsaw ransomware displayed imagery from a horror film to its victims and
gave them an exceptionally short payment deadline – just one hour to pay the criminals or have their files deleted.”
“Malware authors were also able to adjust their algorithms in an attempt to keep under the radar. The authors of the
Locky ransomware changed their Domain Generation Algorithm in less than five days in order to reach out to a new
set of command-and-control domains. The takeaway is clear – ransomware authors are more determined and
aggressive in 2016. End-users should be aware of the danger and take preventative measures.”
Measurement of Detected Crimeware – 4th Quarter 2015
Phishing Activity Trends Report
1st Quarter 2016
w w w . a p w g . o r g • i n f o @ a p w g . o r g 	
	
10	
Phishing Activity Trends Report, 1st Quarter 2016
!
	
The United States remained the top country hosting phishing-based Trojans and downloaders during the three-
month period. The United States uses a notable percentage of the world’s IP addresses and hosts a significant
percentage of the world’s web sites.
January February March
United States 77.73% United States 71.50% United States 62.36%
China 5.00% Iceland 4.91% China 13.71%
Rep. of Korea 3.41% United Kingdom 3.50% Iceland 3.28%
Germany 2.27% Canada 2.80% Russian Federation 1.93%
Iceland 1.82% France 2.80% United Kingdom 1.74%
Netherlands 1.82% Russian Federation 2.34% Canada 1.74%
Russian Federation 1.14% Germany 2.10% Germany 1.74%
France 1.14% Italy 1.17% Netherlands 1.74%
Canada 0.91% Netherlands 0.93% France 1.16%
Ukraine 0.45% Turkey 0.93% Turkey 0.97%
Phishing-based Trojans and Downloader’s Hosting Countries (by IP address)
Phishing Activity Trends Report
1st Quarter 2016
w w w . a p w g . o r g • i n f o @ a p w g . o r g 	
	
11	
Phishing Activity Trends Report, 1st Quarter 2016
!
	
	
	
	
APWG Phishing Activity Trends Report Contributors
An Infoblox company, IID is a US-
based provider of technology and
services that help organizations
secure their Internet presence.
Panda Security’s mission is to
keep our customers' information
and IT assets safe from security
threats, providing the most
effective protection with
minimum resource consumption.	
MarkMonitor, a global leader in
enterprise brand protection, offers
comprehensive solutions and
services that safeguard brands,
reputation and revenue from
online risks.
	
	
iThreat provides risk data,
intelligence tools, and analysis to
help its clients protect their
intellectual & Internet properties.
	
About the APWG
Founded in 2003, the Anti-Phishing Working Group (APWG) is a 501(c)6 not-for-profit industry association
focused on eliminating the identity theft and frauds that result from the growing problem of phishing,
crimeware, and e-mail spoofing. Membership is open to qualified financial institutions, retailers, ISPs, solutions
providers, the law enforcement community, government agencies, multi-lateral treaty organizations, and NGOs.
There are more than 2,000 enterprises worldwide participating in the APWG. APWG’s first meeting was in
November 2003 in San Francisco, and it was incorporated in 2004 as an independent corporation controlled by
its board of directors, its executives and its steering committee. Because electronic crime is a sensitive subject,
APWG maintains a policy of confidentiality of member organizations.
Websites of APWG include its main site <http://www.antiphishing.org>; the STOP. THINK. CONNECT.
Messaging Convention public awareness program <http://www.stopthinkconnect.org> , the APWG’s research
website <http://www.ecrimeresearch.org>, and the APWG’s European chapter < http://www.apwg.eu>. These
serve as resources about the problem of phishing and electronic frauds perpetrated against Internet users – and
resources for countering these threats.
The APWG Phishing Activity Trends Report is published by the APWG. For further information about the APWG,
please contact APWG Deputy Secretary General Foy Shiver at 404.434.7282 or foy@apwg.org. For media inquiries
related to the content of this report, please contact APWG Secretary General Peter Cassidy at 617.669.1123; Te Smith
of MarkMonitor at 831.818.1267 or Te.Smith@markmonitor.com; Luis Corrons of Panda at
lcorrons@pandasoftware.es; Carl Leonard at Forcepoint CLeonard@forcepoint.com
PWG thanks its contributing members, above, for the data and analyses in this report0.
Analysis by Greg Aaron, iThreat Cyber Group; editing by Ronnie Manning, Mynt Public Relations.
Forcepoint brings a fresh
approach to address the
constantly evolving cybersecurity
challenges and regulatory
requirements facing businesses
and government agencies.

More Related Content

What's hot

Symantec (ISTR) Internet Security Threat Report Volume 22
Symantec (ISTR) Internet Security Threat Report Volume 22Symantec (ISTR) Internet Security Threat Report Volume 22
Symantec (ISTR) Internet Security Threat Report Volume 22CheapSSLsecurity
 
Hi-Tech Crime Trends 2015
Hi-Tech Crime Trends 2015Hi-Tech Crime Trends 2015
Hi-Tech Crime Trends 2015Group-IB
 
Are There Any Domains Impersonating Your Company For Phishing?
Are There Any Domains Impersonating Your Company For Phishing?Are There Any Domains Impersonating Your Company For Phishing?
Are There Any Domains Impersonating Your Company For Phishing?NormShield
 
Hi-Tech Crime Trends 2014
Hi-Tech Crime Trends 2014Hi-Tech Crime Trends 2014
Hi-Tech Crime Trends 2014Group-IB
 
Trafficking fraudulent accounts : the role of the underground market in twitt...
Trafficking fraudulent accounts : the role of the underground market in twitt...Trafficking fraudulent accounts : the role of the underground market in twitt...
Trafficking fraudulent accounts : the role of the underground market in twitt...Romain Fonnier
 
Digital marketing Introduction webinar
Digital marketing Introduction webinarDigital marketing Introduction webinar
Digital marketing Introduction webinarHusam Algaladi
 
Normshield 2018 Airlines Phishing Report
Normshield 2018 Airlines Phishing ReportNormshield 2018 Airlines Phishing Report
Normshield 2018 Airlines Phishing ReportNormShield
 
Insurance Industry: Social Media Impact and Benchmarks Report
Insurance Industry: Social Media Impact and Benchmarks ReportInsurance Industry: Social Media Impact and Benchmarks Report
Insurance Industry: Social Media Impact and Benchmarks ReportTrackMaven
 
Phishing Report Gennaio 2010
Phishing Report Gennaio 2010Phishing Report Gennaio 2010
Phishing Report Gennaio 2010Symantec Italia
 
Phishing Report Novembre 2009
Phishing Report Novembre 2009Phishing Report Novembre 2009
Phishing Report Novembre 2009Symantec Italia
 
GroupM Thailand POV on Coronavirus in Thailand
GroupM Thailand POV on Coronavirus in ThailandGroupM Thailand POV on Coronavirus in Thailand
GroupM Thailand POV on Coronavirus in ThailandGroupM THailand
 
2016 Digital Yearbook
2016 Digital Yearbook2016 Digital Yearbook
2016 Digital YearbookB Olivia Le
 

What's hot (18)

Symantec (ISTR) Internet Security Threat Report Volume 22
Symantec (ISTR) Internet Security Threat Report Volume 22Symantec (ISTR) Internet Security Threat Report Volume 22
Symantec (ISTR) Internet Security Threat Report Volume 22
 
Hi-Tech Crime Trends 2015
Hi-Tech Crime Trends 2015Hi-Tech Crime Trends 2015
Hi-Tech Crime Trends 2015
 
Are There Any Domains Impersonating Your Company For Phishing?
Are There Any Domains Impersonating Your Company For Phishing?Are There Any Domains Impersonating Your Company For Phishing?
Are There Any Domains Impersonating Your Company For Phishing?
 
Hi-Tech Crime Trends 2014
Hi-Tech Crime Trends 2014Hi-Tech Crime Trends 2014
Hi-Tech Crime Trends 2014
 
Trafficking fraudulent accounts : the role of the underground market in twitt...
Trafficking fraudulent accounts : the role of the underground market in twitt...Trafficking fraudulent accounts : the role of the underground market in twitt...
Trafficking fraudulent accounts : the role of the underground market in twitt...
 
Digital marketing Introduction webinar
Digital marketing Introduction webinarDigital marketing Introduction webinar
Digital marketing Introduction webinar
 
Normshield 2018 Airlines Phishing Report
Normshield 2018 Airlines Phishing ReportNormshield 2018 Airlines Phishing Report
Normshield 2018 Airlines Phishing Report
 
Fraud investigation - apps loading pages
Fraud investigation -  apps loading pagesFraud investigation -  apps loading pages
Fraud investigation - apps loading pages
 
Programmatic reach analysis 2021
Programmatic reach analysis 2021Programmatic reach analysis 2021
Programmatic reach analysis 2021
 
DPM in Pictures
DPM in PicturesDPM in Pictures
DPM in Pictures
 
Mobile display fraud is rampant beyond belief
Mobile display fraud is rampant beyond beliefMobile display fraud is rampant beyond belief
Mobile display fraud is rampant beyond belief
 
Insurance Industry: Social Media Impact and Benchmarks Report
Insurance Industry: Social Media Impact and Benchmarks ReportInsurance Industry: Social Media Impact and Benchmarks Report
Insurance Industry: Social Media Impact and Benchmarks Report
 
Phishing Report Gennaio 2010
Phishing Report Gennaio 2010Phishing Report Gennaio 2010
Phishing Report Gennaio 2010
 
Phishing Report Novembre 2009
Phishing Report Novembre 2009Phishing Report Novembre 2009
Phishing Report Novembre 2009
 
Cb Threat Report
Cb Threat ReportCb Threat Report
Cb Threat Report
 
Checking abnormal referrer traffic in google analytics
Checking abnormal referrer traffic in google analyticsChecking abnormal referrer traffic in google analytics
Checking abnormal referrer traffic in google analytics
 
GroupM Thailand POV on Coronavirus in Thailand
GroupM Thailand POV on Coronavirus in ThailandGroupM Thailand POV on Coronavirus in Thailand
GroupM Thailand POV on Coronavirus in Thailand
 
2016 Digital Yearbook
2016 Digital Yearbook2016 Digital Yearbook
2016 Digital Yearbook
 

Viewers also liked

Event4u company profile 2012
Event4u company profile 2012Event4u company profile 2012
Event4u company profile 2012Praveen Singh
 
Organic Farming for Bees - The Xerces Society
Organic Farming for Bees - The Xerces SocietyOrganic Farming for Bees - The Xerces Society
Organic Farming for Bees - The Xerces Societyx3G9
 
xy-ar.ch cert. de travail
xy-ar.ch cert. de travailxy-ar.ch cert. de travail
xy-ar.ch cert. de travailMike Jones
 
Manual lubricantes romao istprs
Manual lubricantes romao istprsManual lubricantes romao istprs
Manual lubricantes romao istprsRomao Alleri Cruz
 
DB2 10 Webcast #1 - Overview And Migration Planning
DB2 10 Webcast #1 - Overview And Migration PlanningDB2 10 Webcast #1 - Overview And Migration Planning
DB2 10 Webcast #1 - Overview And Migration PlanningLaura Hood
 
Mujeres Libres Spanish Writers Women4353
Mujeres Libres Spanish Writers Women4353Mujeres Libres Spanish Writers Women4353
Mujeres Libres Spanish Writers Women4353Gloria Osuna Velasco
 
Research on it products
Research on it productsResearch on it products
Research on it productsKamran Arshad
 
Long Run Drivers of Current Account Imbalances: the role of trade openness
Long Run Drivers of Current Account Imbalances: the role of trade opennessLong Run Drivers of Current Account Imbalances: the role of trade openness
Long Run Drivers of Current Account Imbalances: the role of trade opennessGiuseppe Caivano
 
Cómo ha evolucionado y qué obstáculos deben superar las Comunicaciones Unific...
Cómo ha evolucionado y qué obstáculos deben superar las Comunicaciones Unific...Cómo ha evolucionado y qué obstáculos deben superar las Comunicaciones Unific...
Cómo ha evolucionado y qué obstáculos deben superar las Comunicaciones Unific...Mundo Contact
 
See3 at Civi User Group at 10NTC
See3 at Civi User Group at 10NTCSee3 at Civi User Group at 10NTC
See3 at Civi User Group at 10NTCSee3 Communications
 
La estrategia PPC dentro del plan de marketing global.
La estrategia PPC dentro del plan de marketing global.La estrategia PPC dentro del plan de marketing global.
La estrategia PPC dentro del plan de marketing global.Semmantica
 
Análisis de programas infantiles
Análisis de programas infantilesAnálisis de programas infantiles
Análisis de programas infantileskaren2714
 
SEOGuardian - Ecommerce Muebles - segmento Colchones en España - Actualización
SEOGuardian - Ecommerce Muebles - segmento Colchones en España - ActualizaciónSEOGuardian - Ecommerce Muebles - segmento Colchones en España - Actualización
SEOGuardian - Ecommerce Muebles - segmento Colchones en España - ActualizaciónBint
 
Energía renovables y no renovables ana castro
Energía renovables y no renovables  ana castroEnergía renovables y no renovables  ana castro
Energía renovables y no renovables ana castroanicf
 

Viewers also liked (20)

Event4u company profile 2012
Event4u company profile 2012Event4u company profile 2012
Event4u company profile 2012
 
Organic Farming for Bees - The Xerces Society
Organic Farming for Bees - The Xerces SocietyOrganic Farming for Bees - The Xerces Society
Organic Farming for Bees - The Xerces Society
 
xy-ar.ch cert. de travail
xy-ar.ch cert. de travailxy-ar.ch cert. de travail
xy-ar.ch cert. de travail
 
AR-in-VET
AR-in-VETAR-in-VET
AR-in-VET
 
Lectura de apoyo evaluación del servicio
Lectura de apoyo evaluación del servicioLectura de apoyo evaluación del servicio
Lectura de apoyo evaluación del servicio
 
Manual lubricantes romao istprs
Manual lubricantes romao istprsManual lubricantes romao istprs
Manual lubricantes romao istprs
 
Diari del 13 de gener de 2013
Diari del 13 de gener de 2013Diari del 13 de gener de 2013
Diari del 13 de gener de 2013
 
Web como estrategia online
Web como estrategia onlineWeb como estrategia online
Web como estrategia online
 
DB2 10 Webcast #1 - Overview And Migration Planning
DB2 10 Webcast #1 - Overview And Migration PlanningDB2 10 Webcast #1 - Overview And Migration Planning
DB2 10 Webcast #1 - Overview And Migration Planning
 
Mujeres Libres Spanish Writers Women4353
Mujeres Libres Spanish Writers Women4353Mujeres Libres Spanish Writers Women4353
Mujeres Libres Spanish Writers Women4353
 
Research on it products
Research on it productsResearch on it products
Research on it products
 
Long Run Drivers of Current Account Imbalances: the role of trade openness
Long Run Drivers of Current Account Imbalances: the role of trade opennessLong Run Drivers of Current Account Imbalances: the role of trade openness
Long Run Drivers of Current Account Imbalances: the role of trade openness
 
4 s313 pvcf
4 s313 pvcf4 s313 pvcf
4 s313 pvcf
 
Cómo ha evolucionado y qué obstáculos deben superar las Comunicaciones Unific...
Cómo ha evolucionado y qué obstáculos deben superar las Comunicaciones Unific...Cómo ha evolucionado y qué obstáculos deben superar las Comunicaciones Unific...
Cómo ha evolucionado y qué obstáculos deben superar las Comunicaciones Unific...
 
See3 at Civi User Group at 10NTC
See3 at Civi User Group at 10NTCSee3 at Civi User Group at 10NTC
See3 at Civi User Group at 10NTC
 
La estrategia PPC dentro del plan de marketing global.
La estrategia PPC dentro del plan de marketing global.La estrategia PPC dentro del plan de marketing global.
La estrategia PPC dentro del plan de marketing global.
 
Análisis de programas infantiles
Análisis de programas infantilesAnálisis de programas infantiles
Análisis de programas infantiles
 
SEOGuardian - Ecommerce Muebles - segmento Colchones en España - Actualización
SEOGuardian - Ecommerce Muebles - segmento Colchones en España - ActualizaciónSEOGuardian - Ecommerce Muebles - segmento Colchones en España - Actualización
SEOGuardian - Ecommerce Muebles - segmento Colchones en España - Actualización
 
Energía renovables y no renovables ana castro
Energía renovables y no renovables  ana castroEnergía renovables y no renovables  ana castro
Energía renovables y no renovables ana castro
 
Revista Natura Digital Ciclo 17/2010
Revista Natura Digital Ciclo 17/2010Revista Natura Digital Ciclo 17/2010
Revista Natura Digital Ciclo 17/2010
 

Similar to Apwg trends report_q1_2016

Spam and Phishing Report - Marzo 2010
Spam and Phishing Report - Marzo 2010Spam and Phishing Report - Marzo 2010
Spam and Phishing Report - Marzo 2010Symantec Italia
 
Fraud & Abuse Report 2020 by Arkose LabsFraud report q1 2020
Fraud & Abuse Report 2020 by Arkose LabsFraud report q1 2020Fraud & Abuse Report 2020 by Arkose LabsFraud report q1 2020
Fraud & Abuse Report 2020 by Arkose LabsFraud report q1 2020Jeff Martinez
 
Anti Phishing Working Group Report 1H 2009
Anti Phishing Working Group Report 1H 2009Anti Phishing Working Group Report 1H 2009
Anti Phishing Working Group Report 1H 2009Kim Jensen
 
Symantec Physhing Report Aprile 2009
Symantec Physhing Report Aprile 2009Symantec Physhing Report Aprile 2009
Symantec Physhing Report Aprile 2009Freedata Labs
 
Kaspersky lab financial_cyberthreats_in_2017
Kaspersky lab financial_cyberthreats_in_2017Kaspersky lab financial_cyberthreats_in_2017
Kaspersky lab financial_cyberthreats_in_2017malvvv
 
Symantec Intelligence Report: February 2015
Symantec Intelligence Report: February 2015Symantec Intelligence Report: February 2015
Symantec Intelligence Report: February 2015Symantec
 
Security troubles in e commerce website
Security troubles in e commerce websiteSecurity troubles in e commerce website
Security troubles in e commerce websiteDr. Raghavendra GS
 
Ksn report ransomware-and-malicious-cryptominers
Ksn report ransomware-and-malicious-cryptominersKsn report ransomware-and-malicious-cryptominers
Ksn report ransomware-and-malicious-cryptominersmalvvv
 
Intelligence report-06-2015.en-us[1]
Intelligence report-06-2015.en-us[1]Intelligence report-06-2015.en-us[1]
Intelligence report-06-2015.en-us[1]Sergey Ulankin
 
Website Security Threats - January 2014 Update
Website Security Threats - January 2014 Update Website Security Threats - January 2014 Update
Website Security Threats - January 2014 Update Symantec Website Security
 
Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015Symantec
 
The Executive's Guide to the 2016 Global Threat Intelligence Report
The Executive's Guide to the 2016 Global Threat Intelligence ReportThe Executive's Guide to the 2016 Global Threat Intelligence Report
The Executive's Guide to the 2016 Global Threat Intelligence ReportSimona Franciosi
 
RSA Monthly Online Fraud Report -- October 2013
RSA Monthly Online Fraud Report -- October 2013RSA Monthly Online Fraud Report -- October 2013
RSA Monthly Online Fraud Report -- October 2013EMC
 
New fraud protection solutions
New fraud protection solutionsNew fraud protection solutions
New fraud protection solutionsLaurent Pacalin
 
The Year in Phishing - RSA Fraud Report: January 2013
The Year in Phishing - RSA Fraud Report: January 2013The Year in Phishing - RSA Fraud Report: January 2013
The Year in Phishing - RSA Fraud Report: January 2013EMC
 
Malwarebytes labs 2019 - state of malware report 2
Malwarebytes labs 2019 - state of malware report 2Malwarebytes labs 2019 - state of malware report 2
Malwarebytes labs 2019 - state of malware report 2Felipe Prado
 
Symantec Intelligence Report September 2014
Symantec Intelligence Report September 2014Symantec Intelligence Report September 2014
Symantec Intelligence Report September 2014Symantec
 
Most notable apt_ attacks_of_2015_and_2016 predictions
Most notable apt_ attacks_of_2015_and_2016 predictionsMost notable apt_ attacks_of_2015_and_2016 predictions
Most notable apt_ attacks_of_2015_and_2016 predictionsCyphort
 
2014 Cybercrime Roundup: The Year of the POS Breach
2014 Cybercrime Roundup: The Year of the POS Breach2014 Cybercrime Roundup: The Year of the POS Breach
2014 Cybercrime Roundup: The Year of the POS BreachEMC
 

Similar to Apwg trends report_q1_2016 (20)

Spam and Phishing Report - Marzo 2010
Spam and Phishing Report - Marzo 2010Spam and Phishing Report - Marzo 2010
Spam and Phishing Report - Marzo 2010
 
Fraud & Abuse Report 2020 by Arkose LabsFraud report q1 2020
Fraud & Abuse Report 2020 by Arkose LabsFraud report q1 2020Fraud & Abuse Report 2020 by Arkose LabsFraud report q1 2020
Fraud & Abuse Report 2020 by Arkose LabsFraud report q1 2020
 
Anti Phishing Working Group Report 1H 2009
Anti Phishing Working Group Report 1H 2009Anti Phishing Working Group Report 1H 2009
Anti Phishing Working Group Report 1H 2009
 
Symantec Physhing Report Aprile 2009
Symantec Physhing Report Aprile 2009Symantec Physhing Report Aprile 2009
Symantec Physhing Report Aprile 2009
 
Kaspersky lab financial_cyberthreats_in_2017
Kaspersky lab financial_cyberthreats_in_2017Kaspersky lab financial_cyberthreats_in_2017
Kaspersky lab financial_cyberthreats_in_2017
 
Symantec Intelligence Report: February 2015
Symantec Intelligence Report: February 2015Symantec Intelligence Report: February 2015
Symantec Intelligence Report: February 2015
 
Security troubles in e commerce website
Security troubles in e commerce websiteSecurity troubles in e commerce website
Security troubles in e commerce website
 
Ksn report ransomware-and-malicious-cryptominers
Ksn report ransomware-and-malicious-cryptominersKsn report ransomware-and-malicious-cryptominers
Ksn report ransomware-and-malicious-cryptominers
 
Intelligence report-06-2015.en-us[1]
Intelligence report-06-2015.en-us[1]Intelligence report-06-2015.en-us[1]
Intelligence report-06-2015.en-us[1]
 
Website Security Threats - January 2014 Update
Website Security Threats - January 2014 Update Website Security Threats - January 2014 Update
Website Security Threats - January 2014 Update
 
Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015
 
The Executive's Guide to the 2016 Global Threat Intelligence Report
The Executive's Guide to the 2016 Global Threat Intelligence ReportThe Executive's Guide to the 2016 Global Threat Intelligence Report
The Executive's Guide to the 2016 Global Threat Intelligence Report
 
RSA Monthly Online Fraud Report -- October 2013
RSA Monthly Online Fraud Report -- October 2013RSA Monthly Online Fraud Report -- October 2013
RSA Monthly Online Fraud Report -- October 2013
 
New fraud protection solutions
New fraud protection solutionsNew fraud protection solutions
New fraud protection solutions
 
The Year in Phishing - RSA Fraud Report: January 2013
The Year in Phishing - RSA Fraud Report: January 2013The Year in Phishing - RSA Fraud Report: January 2013
The Year in Phishing - RSA Fraud Report: January 2013
 
Malwarebytes labs 2019 - state of malware report 2
Malwarebytes labs 2019 - state of malware report 2Malwarebytes labs 2019 - state of malware report 2
Malwarebytes labs 2019 - state of malware report 2
 
Software fails 2016
Software fails 2016Software fails 2016
Software fails 2016
 
Symantec Intelligence Report September 2014
Symantec Intelligence Report September 2014Symantec Intelligence Report September 2014
Symantec Intelligence Report September 2014
 
Most notable apt_ attacks_of_2015_and_2016 predictions
Most notable apt_ attacks_of_2015_and_2016 predictionsMost notable apt_ attacks_of_2015_and_2016 predictions
Most notable apt_ attacks_of_2015_and_2016 predictions
 
2014 Cybercrime Roundup: The Year of the POS Breach
2014 Cybercrime Roundup: The Year of the POS Breach2014 Cybercrime Roundup: The Year of the POS Breach
2014 Cybercrime Roundup: The Year of the POS Breach
 

More from Andrey Apuhtin

Shadow pad technical_description_pdf
Shadow pad technical_description_pdfShadow pad technical_description_pdf
Shadow pad technical_description_pdfAndrey Apuhtin
 
Ftc cdt-vpn-complaint-8-7-17
Ftc cdt-vpn-complaint-8-7-17Ftc cdt-vpn-complaint-8-7-17
Ftc cdt-vpn-complaint-8-7-17Andrey Apuhtin
 
Hutchins redacted indictment
Hutchins redacted indictmentHutchins redacted indictment
Hutchins redacted indictmentAndrey Apuhtin
 
Dr web review_mob_july_2017
Dr web review_mob_july_2017Dr web review_mob_july_2017
Dr web review_mob_july_2017Andrey Apuhtin
 
Nexusguard d do_s_threat_report_q1_2017_en
Nexusguard d do_s_threat_report_q1_2017_enNexusguard d do_s_threat_report_q1_2017_en
Nexusguard d do_s_threat_report_q1_2017_enAndrey Apuhtin
 
Pandalabs отчет за 1 квартал 2017
Pandalabs   отчет за 1 квартал 2017Pandalabs   отчет за 1 квартал 2017
Pandalabs отчет за 1 квартал 2017Andrey Apuhtin
 
Lookout pegasus-android-technical-analysis
Lookout pegasus-android-technical-analysisLookout pegasus-android-technical-analysis
Lookout pegasus-android-technical-analysisAndrey Apuhtin
 
News berthaume-sentencing-jan2017
News berthaume-sentencing-jan2017News berthaume-sentencing-jan2017
News berthaume-sentencing-jan2017Andrey Apuhtin
 
Windows exploitation-2016-a4
Windows exploitation-2016-a4Windows exploitation-2016-a4
Windows exploitation-2016-a4Andrey Apuhtin
 

More from Andrey Apuhtin (20)

Shadow pad technical_description_pdf
Shadow pad technical_description_pdfShadow pad technical_description_pdf
Shadow pad technical_description_pdf
 
Ftc cdt-vpn-complaint-8-7-17
Ftc cdt-vpn-complaint-8-7-17Ftc cdt-vpn-complaint-8-7-17
Ftc cdt-vpn-complaint-8-7-17
 
Hutchins redacted indictment
Hutchins redacted indictmentHutchins redacted indictment
Hutchins redacted indictment
 
Dr web review_mob_july_2017
Dr web review_mob_july_2017Dr web review_mob_july_2017
Dr web review_mob_july_2017
 
Dmarc
DmarcDmarc
Dmarc
 
Nexusguard d do_s_threat_report_q1_2017_en
Nexusguard d do_s_threat_report_q1_2017_enNexusguard d do_s_threat_report_q1_2017_en
Nexusguard d do_s_threat_report_q1_2017_en
 
Pandalabs отчет за 1 квартал 2017
Pandalabs   отчет за 1 квартал 2017Pandalabs   отчет за 1 квартал 2017
Pandalabs отчет за 1 квартал 2017
 
Sel03129 usen
Sel03129 usenSel03129 usen
Sel03129 usen
 
Cldap threat-advisory
Cldap threat-advisoryCldap threat-advisory
Cldap threat-advisory
 
Lookout pegasus-android-technical-analysis
Lookout pegasus-android-technical-analysisLookout pegasus-android-technical-analysis
Lookout pegasus-android-technical-analysis
 
Rand rr1751
Rand rr1751Rand rr1751
Rand rr1751
 
Browser history
Browser historyBrowser history
Browser history
 
Software
SoftwareSoftware
Software
 
Antivirus
AntivirusAntivirus
Antivirus
 
Https interception
Https interceptionHttps interception
Https interception
 
Wilssc 006 xml
Wilssc 006 xmlWilssc 006 xml
Wilssc 006 xml
 
News berthaume-sentencing-jan2017
News berthaume-sentencing-jan2017News berthaume-sentencing-jan2017
News berthaume-sentencing-jan2017
 
Windows exploitation-2016-a4
Windows exploitation-2016-a4Windows exploitation-2016-a4
Windows exploitation-2016-a4
 
Mw stj 08252016_2
Mw stj 08252016_2Mw stj 08252016_2
Mw stj 08252016_2
 
150127iotrpt
150127iotrpt150127iotrpt
150127iotrpt
 

Recently uploaded

Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...OnePlan Solutions
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)jennyeacort
 
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfInnovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfYashikaSharma391629
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsChristian Birchler
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Rob Geurden
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfDrew Moseley
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfMarharyta Nedzelska
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringHironori Washizaki
 
Large Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLarge Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLionel Briand
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfStefano Stabellini
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odishasmiwainfosol
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Matt Ray
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprisepreethippts
 
Understanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM ArchitectureUnderstanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM Architecturerahul_net
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 

Recently uploaded (20)

Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
 
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfInnovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...
 
Advantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your BusinessAdvantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your Business
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdf
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdf
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their Engineering
 
Large Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLarge Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and Repair
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdf
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprise
 
Understanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM ArchitectureUnderstanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM Architecture
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva
 

Apwg trends report_q1_2016

  • 1. 1st Quarter 2016 January – March 2016 Published May 23, 2016 Phishing Activity Trends Report Unifying the Global Response To Cybercrime
  • 2. Phishing Activity Trends Report 1st Quarter 2016 w w w . a p w g . o r g • i n f o @ a p w g . o r g 2 Phishing Activity Trends Report, 1st Quarter 2016 ! Table of Contents Statistical Highlights for 1st Quarter 2016 3 Phishing E-mail Reports and Phishing Site Trends 4 Brand-Domain Pairs Measurement 5 Brands & Legitimate Entities Hijacked by E-mail Phishing Attacks 6 Most Targeted Industry Sectors 7 Countries Hosting Phishing Sites 7 Top Malware Infected Countries 8 Measurement of Detected Crimeware 9 Phishing-based Trojans & Downloader’s Host Countries (by IP address) 10 Phishing by Top-Level Domain 10 APWG Phishing Trends Report Contributors 11 Phishing Report Scope The APWG Phishing Activity Trends Report analyzes phishing attacks reported to the APWG by its member companies, its Global Research Partners, through the organization’s website at http://www.apwg.org, and by e-mail submissions to reportphishing@antiphishing.org. APWG also measures the evolution, proliferation, and propagation of crimeware by drawing from the research of our member companies. Phishing Defined Phishing is a criminal mechanism employing both social engineering and technical subterfuge to steal consumers’ personal identity data and financial account credentials. Social engineering schemes use spoofed e-mails purporting to be from legitimate businesses and agencies, designed to lead consumers to counterfeit websites that trick recipients into divulging financial data such as usernames and passwords. Technical subterfuge schemes plant crimeware onto PCs to steal credentials directly, often using systems to intercept consumers online account user names and passwords -- and to corrupt local navigational infrastructures to misdirect consumers to counterfeit websites (or authentic websites through phisher-controlled proxies used to monitor and intercept consumers’ keystrokes). 1st Quarter 2016 Phishing Activity Trends Summary • The number of phishing websites observed by APWG increased 250% from the last quarter of 2015 through the first quarter of 2016. [p. 4] • The Retail/Service sector remained the most- targeted industry sector during the first quarter of 2016, with 42.71% of attacks. [p. 7] • The number of brands targeted by phishers in the first quarter remained constant – ranging from 406 to 431 brands each month. [p. 6] • The United States continued its position at top on the list of nations hosting phishing websites. [p. 7] • In Q1 2016, 20 million new malware samples were captured. [p. 8] • The world's most-infected countries are led by China, where 57.24% of computers are infected, followed by Taiwan (49.15%) and Turkey at 42.52%. [p. 8] Phishing attacks rose in the Christmas 2015 season, and have continued to climb in the new year. Phishers Ramp Up into 2016 With Major Increase in Attacks
  • 3. Phishing Activity Trends Report 1st Quarter 2016 w w w . a p w g . o r g • i n f o @ a p w g . o r g 3 Phishing Activity Trends Report, 1st Quarter 2016 ! The APWG continues to refine its tracking and reporting methodology and to incorporate new data sources into our reports. APWG tracks and reports the number of unique phishing reports (email campaigns) it receives, in addition to the number of unique phishing sites found. An e-mail campaign is a unique e-mail sent out to multiple users, directing them to a specific phishing web site (multiple campaigns may point to the same web site). APWG counts unique phishing report e-mails as those found in a given month that have the same subject line in the e-mail. The APWG also tracks the number of unique phishing websites. This is now determined by the unique base URLs of the phishing sites. (A single phishing site may be advertised as thousands of customized URLS, all leading to basically the same attack destination.) APWG additionally tracks crimeware instances (unique software applications as determined by MD5 hash of the crimeware sample), as well as unique sites that are distributing crimeware (typically via browser drive-by exploits). The APWG Phishing Activity Trends Report also includes statistics on rogue anti-virus software, desktop infection rates, and related topics. January February March Number of unique phishing websites detected 86,557 79,259 123,555 Number of unique phishing e-mail reports (campaigns) received by APWG from consumers 99,384 229,315 229,265 Number of brands targeted by phishing campaigns 431 406 418 Country hosting the most phishing websites USA USA USA Phishing URL contains some form of target name 59.39% 54.60% 55.13% Percentage of sites not using port 80 5.95% 5.25% 4.26% Methodology and Instrumented Data Sets Statistical Highlights for 1st Quarter 2016
  • 4. Phishing Activity Trends Report 1st Quarter 2016 w w w . a p w g . o r g • i n f o @ a p w g . o r g 4 Phishing Activity Trends Report, 1st Quarter 2016 ! The total number of unique phishing websites observed in Q1 was 289,371. The number observed per month rose steadily from the 48,114 detected in October 2015 to the 123,555 detected in March 2016 – a 250 percent increase over six months. The increase in December 2015 was expected, since there is usually a spate of spamming and online fraud during the holiday shopping season. The continuing increase into 2016 is cause for concern. The number of unique phishing reports submitted to APWG during Q4 was 557,964. The number of unique phishing reports submitted to APWG saw a notable increase of nearly 130,000 from January to March: Phishing E-mail Reports and Phishing Site Trends – 1st Quarter 2016
  • 5. Phishing Activity Trends Report 1st Quarter 2016 w w w . a p w g . o r g • i n f o @ a p w g . o r g 5 Phishing Activity Trends Report, 1st Quarter 2016 ! The following chart combines statistics based on brands phished, unique domains, unique domain/brand pairs, and unique URLs. Brand/domain pairs count the unique instances of a domain being used to target a specific brand. (Example: if several URLs are targeting a brand – but are hosted on the same domain – this brand/domain pair would be counted as one instead of several.) Forensic utility of this metric: If the number of unique URLs is greater than the number of brand/domain pairs, it indicates many URLs are being hosted on the same domain to target the same brand. Knowing how many URLs occur with each domain indicates the approximate number of attacking domains a brand-holding victim needs to locate and neutralize. Since phishing-prevention technologies (like browser and e-mail blocking) require the full URL in order to prevent over-blocking, it is useful to understand the general number of unique URLs that occur per domain. January February March Number of Unique Phishing Web Sites Detected 86,557 79,259 123,555 Unique Domains 21,131 17,438 21,394 Unique Brand-Domain Pairs 26,789 21,476 26,968 Unique Brands 431 406 418 URLs Per Brand 200 195 295 Brand-Domain Pairs Measurement – 1st Quarter 2016
  • 6. Phishing Activity Trends Report 1st Quarter 2016 w w w . a p w g . o r g • i n f o @ a p w g . o r g 6 Phishing Activity Trends Report, 1st Quarter 2016 ! The number of brands targeted by phishers in in the first quarter remained fairly constant – ranging from 406 to 431 brands each month. Across 2015 and into 2016, phishers targeted between 391 and 442 unique brands in any given month of that year. Brands and Legitimate Entities Targeted by E-mail Phishing Attacks – 1st Quarter 2016
  • 7. Phishing Activity Trends Report 1st Quarter 2016 w w w . a p w g . o r g • i n f o @ a p w g . o r g 7 Phishing Activity Trends Report, 1st Quarter 2016 ! The Retail/Service sector remained the most-targeted industry sector, with 42.71 percent of attacks, followed again by Financial Services. According to Stefanie Ellis, AntiFraud Product Marketing Manager at MarkMonitor: “MarkMonitor continues to detect a high volume of attacks targeting cloud-based or SAAS companies, driving significant increases in the Retail Service sector. Financial and Payment targets are still heavily targeted.” The United States continued to top the list of the countries hosting phishing sites. Phishers often break into vulnerable web hosting networks to provision phishing sites, and the United States hosts a large number of web sites. January February March United States 75.10% United States 81.90% United States 75.62% Belize 4.79% United Kingdom 2.20% China 4.16% Netherlands 3.59% Germany 2.15% Hong Kong 3.05% Germany 2.13% Belgium 1.83% Netherlands 3.02% Belgium 1.79% Netherlands 1.55% Germany 2.24% United Kingdom 1.57% Canada 0.63% United Kingdom 1.31% China 1.46% Russian Federation 0.59% Russian Federation 0.75% Russian Federation 1.28% Kazakhstan 0.56% Italy 0.74% Australia 0.64% Australia 0.56% Australia 0.71% France 0.60% Chile 0.52% France 0.56% Countries Hosting Phishing Sites – 1st Quarter 2016 Most-Targeted Industry Sectors – 4th Quarter 2015
  • 8. Phishing Activity Trends Report 1st Quarter 2016 w w w . a p w g . o r g • i n f o @ a p w g . o r g 8 Phishing Activity Trends Report, 1st Quarter 2016 ! The APWG’s Crimeware statistics categorize crimeware attacks as follows, though the taxonomy will grow as variations in attack code are spawned. Definition: Crimeware is code designed with the intent of collecting information on the end-user in order to steal the user’s credentials. Unlike most generic keyloggers, phishing-based keyloggers have tracking components, which attempt to monitor specific actions (and specific organizations, such as financial institutions, retailers, and e-commerce merchants) in order to target specific information. The most common types of information are access to financial-based websites, e-commerce sites, and web-based mail sites. APWG member PandaLabs started the year by detecting more than 20 million new malware samples, at an average of 227,000 a day. This is a figure slightly higher than discovered in the same quarter in 2015, where the average new samples were 225,000 a day. Trojans were the most common type of malware, as they have been for years. Ransomware is counted in the trojan category, and that kind of malware has increased markedly. According to Luis Corrons, PandaLabs Technical Director and Trends Report contributing analyst, trojans comprised 66.81 percent of the malware samples observed during the quarter, an increase from 53 percent in the fourth quarter of 2015. Most infections are also caused by trojans, in 65.89 percent of cases. Asia and Latin America were the regions that registered the highest infection rates. The countries with the lowest infection rates are generally in Europe, with Japan also appearing in the bottom ten. Crimeware Taxonomy and Samples According to Classification Malware Infected Countries – 4th Quarter 2015 New Malware Strains in Q1 % of malware samples Trojans 66.81% Virus 15.98% Worms 11.01% Adware / Spyware 1.98% PUPs 4.22% Ranking Country Infection rate 36 The Netherlands 26.15% 37 Denmark 25.43% 38 Japan 24.99% 39 Germany 23.64% 40 United Kingdom 23.61% 41 Belgium 22.87% 42 Switzerland 21.43% 43 Finland 20.45% 44 Norway 20.33% 45 Sweden 19.80% Ranking Country Infection Rate 1 China 51.35% 2 Turkey 48.02% 3 Taiwan 41.24% 4 Ecuador 39.59% 5 Guatemala 38.01% 6 Russia 37.98% 7 Mexico 36.32% 8 Peru 36.02% 9 Poland 35.55% 10 Brazil 34.00% Malware Infections by Type % of malware samples Trojans 65.89% Virus 1.95% Worms 3.03% Adware / Spyware 4.01% PUPs 25.12%
  • 9. Phishing Activity Trends Report 1st Quarter 2016 w w w . a p w g . o r g • i n f o @ a p w g . o r g 9 Phishing Activity Trends Report, 1st Quarter 2016 ! Using data contributed from APWG founding member Forcepoint regarding the proliferation of malevolent software, this metric measures proportions of three genera of malevolent code: 1. Crimeware (data-stealing malicious code designed specifically to be used to victimize financial institutions’ customers and to co-opt those institutions’ identities); 2. Data Stealing and Generic Trojans (code designed to send information from the infected machine, control it, and open backdoors on it); and 3. Other (the remainder of malicious code commonly encountered in the field such as auto-replicating worms, dialers for telephone charge-back scams, etc.) Accoring to Carl Leonard, Principal Security Analyst at Forcepoint: “The onslaught from ransomware has not abated in 2016. Ransomware authors exhibited a willingness to change their scare tactics and algorithms in Q1 2016 as they sought to scam end-users. The Jigsaw ransomware displayed imagery from a horror film to its victims and gave them an exceptionally short payment deadline – just one hour to pay the criminals or have their files deleted.” “Malware authors were also able to adjust their algorithms in an attempt to keep under the radar. The authors of the Locky ransomware changed their Domain Generation Algorithm in less than five days in order to reach out to a new set of command-and-control domains. The takeaway is clear – ransomware authors are more determined and aggressive in 2016. End-users should be aware of the danger and take preventative measures.” Measurement of Detected Crimeware – 4th Quarter 2015
  • 10. Phishing Activity Trends Report 1st Quarter 2016 w w w . a p w g . o r g • i n f o @ a p w g . o r g 10 Phishing Activity Trends Report, 1st Quarter 2016 ! The United States remained the top country hosting phishing-based Trojans and downloaders during the three- month period. The United States uses a notable percentage of the world’s IP addresses and hosts a significant percentage of the world’s web sites. January February March United States 77.73% United States 71.50% United States 62.36% China 5.00% Iceland 4.91% China 13.71% Rep. of Korea 3.41% United Kingdom 3.50% Iceland 3.28% Germany 2.27% Canada 2.80% Russian Federation 1.93% Iceland 1.82% France 2.80% United Kingdom 1.74% Netherlands 1.82% Russian Federation 2.34% Canada 1.74% Russian Federation 1.14% Germany 2.10% Germany 1.74% France 1.14% Italy 1.17% Netherlands 1.74% Canada 0.91% Netherlands 0.93% France 1.16% Ukraine 0.45% Turkey 0.93% Turkey 0.97% Phishing-based Trojans and Downloader’s Hosting Countries (by IP address)
  • 11. Phishing Activity Trends Report 1st Quarter 2016 w w w . a p w g . o r g • i n f o @ a p w g . o r g 11 Phishing Activity Trends Report, 1st Quarter 2016 ! APWG Phishing Activity Trends Report Contributors An Infoblox company, IID is a US- based provider of technology and services that help organizations secure their Internet presence. Panda Security’s mission is to keep our customers' information and IT assets safe from security threats, providing the most effective protection with minimum resource consumption. MarkMonitor, a global leader in enterprise brand protection, offers comprehensive solutions and services that safeguard brands, reputation and revenue from online risks. iThreat provides risk data, intelligence tools, and analysis to help its clients protect their intellectual & Internet properties. About the APWG Founded in 2003, the Anti-Phishing Working Group (APWG) is a 501(c)6 not-for-profit industry association focused on eliminating the identity theft and frauds that result from the growing problem of phishing, crimeware, and e-mail spoofing. Membership is open to qualified financial institutions, retailers, ISPs, solutions providers, the law enforcement community, government agencies, multi-lateral treaty organizations, and NGOs. There are more than 2,000 enterprises worldwide participating in the APWG. APWG’s first meeting was in November 2003 in San Francisco, and it was incorporated in 2004 as an independent corporation controlled by its board of directors, its executives and its steering committee. Because electronic crime is a sensitive subject, APWG maintains a policy of confidentiality of member organizations. Websites of APWG include its main site <http://www.antiphishing.org>; the STOP. THINK. CONNECT. Messaging Convention public awareness program <http://www.stopthinkconnect.org> , the APWG’s research website <http://www.ecrimeresearch.org>, and the APWG’s European chapter < http://www.apwg.eu>. These serve as resources about the problem of phishing and electronic frauds perpetrated against Internet users – and resources for countering these threats. The APWG Phishing Activity Trends Report is published by the APWG. For further information about the APWG, please contact APWG Deputy Secretary General Foy Shiver at 404.434.7282 or foy@apwg.org. For media inquiries related to the content of this report, please contact APWG Secretary General Peter Cassidy at 617.669.1123; Te Smith of MarkMonitor at 831.818.1267 or Te.Smith@markmonitor.com; Luis Corrons of Panda at lcorrons@pandasoftware.es; Carl Leonard at Forcepoint CLeonard@forcepoint.com PWG thanks its contributing members, above, for the data and analyses in this report0. Analysis by Greg Aaron, iThreat Cyber Group; editing by Ronnie Manning, Mynt Public Relations. Forcepoint brings a fresh approach to address the constantly evolving cybersecurity challenges and regulatory requirements facing businesses and government agencies.