The number of unique phishing reports submitted to the APWG during H2 2011 climbed to a high of 32,979 in December, some 19 percent lower than the all-time high of 40,621 reports recorded in August 2009.
“As expected, during the second half of 2011, phishing attack campaigns continued to increase as we approached the holiday season,” said Ihab Shraim, CISO and VP, AntiFraud Operations and Engineering, MarkMonitor. “We detected 23 percent more phishing attacks in the second half of 2011 than we saw in the first half of 2011.”
However, the techniques used to obscure the true source of those phishing communications changed markedly over the half, as cybercrime gangs apparently had to work harder to fool consumers into falling for their scams.
Carl Leonard from Websense Security Labs said, "Over the last half of 2011 there was a visible trend of phishers and scammers seeking to hide their intentions. Even fewer phishing websites are using the oh-so-obvious IP host to host their fake login pages, instead preferring to host on a compromised domain.
"There has been a 16 percent drop in the number of phishing URLs containing the spoofed company name in the URL. These combined trends show how phishers are adapting to users becoming more informed and knowledgeable about the traits of a typical phish," Leonard said.
Luis Corrons, PandaLabs Technical Director, said the growth of Trojans, in fact, were substantial during the half, growing to 73 percent of all malware sampled by the end of 2011, up from 60 percent in 2009 and 56 percent in 2010. Corrons added that all other malware categories have lost ground with respect to Trojans during H2 2011.
The focus for many cybercrime technology developers in H2 2011 has been on malware targeting mobile devices, according to Websense’s Leonard.
“A great many of us use our mobile phones to check our bank account balances using the plethora of applications available. We saw malware authors seeking to exploit this in 2011, and it could turn out to be an increasingly attractive attack vector in 2012 as tablets and smartphones are adopted not just for personal use but for corporate use also," Leonard said.
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.