2018 APWG Symposium on Electronic Crime Research (eCrime) 2018
DOI: 10.1109/ecrime.2018.8376206
|View full text |Cite
|
Sign up to set email alerts
|

Inside a phisher's mind: Understanding the anti-phishing ecosystem through phishing kit analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
52
0
2

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 79 publications
(71 citation statements)
references
References 26 publications
1
52
0
2
Order By: Relevance
“…Thus, the attack can be launched through various impersonation forms such as legitimately-looking websites, emails, a third-party app UI, and more. Moreover, the attacker can spoof the victim user using advanced tools such as a Phishing kit [55] or Click-jacking [56]. For example, the attacker can use fake website templates and execute a server-side data collection using the Phishing Kit.…”
Section: B Phishing / Impersonation Attack (A 8 )mentioning
confidence: 99%
“…Thus, the attack can be launched through various impersonation forms such as legitimately-looking websites, emails, a third-party app UI, and more. Moreover, the attacker can spoof the victim user using advanced tools such as a Phishing kit [55] or Click-jacking [56]. For example, the attacker can use fake website templates and execute a server-side data collection using the Phishing Kit.…”
Section: B Phishing / Impersonation Attack (A 8 )mentioning
confidence: 99%
“…An approach is to replace the TLD with a different TLD [88]. UTF8 encoding can also be used to produce identical-looking characters from different languages and alphabets, such as replacing the English 'b' with the Russian 'b' [90] or using confusing character combinations such as 'rn' for 'm' [69].…”
Section: A Url Lexical Featuresmentioning
confidence: 99%
“…Since obtaining a valid certificates cost money, it made some sense that legitimate sites would be more likely to have them. However, after the introduction of LetsEncrypt, which provides free certificates to websites, support for encryption is no longer a significant phishing feature as both legitimate and phishing sites now have valid certificates [8,90].…”
Section: F Certificate-based Featuresmentioning
confidence: 99%
See 2 more Smart Citations