1 min read

Phishing Campaigns Boosting Success with Google Analytics

Silviu STAHIE

November 07, 2019

Ad One product to protect all your devices, without slowing them down.
Free 90-day trial
Phishing Campaigns Boosting Success with Google Analytics

Cybercriminals behind phishing campaigns are using Google analytics for their websites, enabling attackers to gather relevant data that can boost their success, an Akamai study found.

Phishing kit developers have integrated web analytics into the software sold on the dark web, which gives attackers a wealth of data and reports that include page views, geographical location for users, and a lot of other information.

According to Akamai researcher Tomer Shlomo, the platform phishing kit developers most commonly use is Google Analytics. The analytics even tracks the user’s behavior on websites, the time people spend on page, the number of users, the number of people that fill out the forms, what they clicked on to get to the website, and much more.

“Akamai scanned 62,627 active phishing URLs of which 54,261 are non-blank pages that belong to 28,906 unique domains. We discovered 874 domains with UIDs and 396 of the UIDs were unique Google Analytic accounts. Moreover, 75 of the UIDs were used in more than one website,” explained Tomer Shlomo. “Analytics are just another brick in the phishing industry wall, representing the operational side used by developers to improve kits, and gather stats on campaign effectiveness. Overall, what we’ve shown here is another instance where criminals abuse legitimate services for malicious purposes.”

Phishing campaigns show no sign of slowing down, and the latest data indicates an opposite trend. 2019 saw the most significant number of phishing emails in the past three years aimed at companies and individuals, and the forecast is not optimistic.

Phishing is also referred to as social engineering. Attackers prompt users to enter their data into fraudulent websites that resemble authentic ones, allowing criminals to compromise other systems using real credentials. A good rule of thumb is that online services, financial institutions and other companies never ask for personal information over the Internet or the phone.

tags


Author



Right now

Top posts

August Spam Debrief: Bitdefender Labs Warns of Fraud Campaigns Exploiting the Russia-Ukraine War

August Spam Debrief: Bitdefender Labs Warns of Fraud Campaigns Exploiting the Russia-Ukraine War

August 31, 2022

4 min read
Snake Keylogger Returns in Malspam Campaign Disguised as Business Portfolio from IT Vendor

Snake Keylogger Returns in Malspam Campaign Disguised as Business Portfolio from IT Vendor

August 30, 2022

2 min read
What is medical identity theft and how to protect against it

What is medical identity theft and how to protect against it

July 27, 2022

2 min read
Curious about Omegle? Here’s how the roulette-style chat platform can threaten your online privacy and security

Curious about Omegle? Here’s how the roulette-style chat platform can threaten your online privacy and security

July 07, 2022

5 min read
Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside

Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside

June 28, 2022

2 min read
Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online

Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online

June 28, 2022

3 min read

FOLLOW US ON

SOCIAL MEDIA


You might also like

Prison for ex-eBay staff who aggressively cyberstalked company's critics with Craigslist sex party ads and funeral wreaths Prison for ex-eBay staff who aggressively cyberstalked company's critics with Craigslist sex party ads and funeral wreaths
Graham CLULEY

September 30, 2022

2 min read
Honolulu Man Sabotaged Former Employer’s Network and Business Using Still-Active Credentials Honolulu Man Sabotaged Former Employer’s Network and Business Using Still-Active Credentials
Silviu STAHIE

September 30, 2022

1 min read
North Korean Gang Uses Compromised Open Source Software to Distribute Malware, Researchers Find North Korean Gang Uses Compromised Open Source Software to Distribute Malware, Researchers Find
Silviu STAHIE

September 30, 2022

1 min read