Examining the Impact of Website Take-down on Phishing

From Cybersecurity Wiki
Revision as of 14:57, 3 June 2010 by WikiSysop (talk | contribs) (New page: ==Examining the Impact of Website Take-down on Phishing== ==Full Citation== Tyler Moore and Richard Clayton.. "Examining the Impact of Website Take-down on Phishing." (PDF). APWG eCrime ...)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Examining the Impact of Website Take-down on Phishing

Full Citation

Tyler Moore and Richard Clayton.. "Examining the Impact of Website Take-down on Phishing." (PDF). APWG eCrime Researcher's Summit, ACM Press, pp. 1-13 Web

BibTeX

Categorization

Issues: Cybercrime

Issues: Economics of Cybercrime

Key Words

Association For Computing Machinery, ACM, phishing, Internet, websites, cybercrime, economics, financial services, bank, security

Synopsis

Banks and other organisations deal with fraudulent phishing websites by pressing hosting service providers to remove the sites from the Internet. Until they are removed, the fraudsters learn the passwords, personal identification numbers (PINs) and other personal details of the users who are fooled into visiting them. We analyse empirical data on phishing website removal times and the number of visitors that the websites attract, and conclude that website removal is part of the answer to phishing, but it is not fast enough to completely mitigate the problem. The removal times have a good fit to a lognormal distribution, but within the general pattern there is ample evidence that some service providers are faster than others at removing sites, and that some brands can get fraudulent sites removed more quickly. We particularly examine a major subset of phishing websites (operated by the 'rock-phish' gang) which accounts for around half of all phishing activity and whose architectural innovations have extended their average lifetime. Finally, we provide a ballpark estimate of the total loss being suffered by the banking sector from the phishing websites we observed.

Additional Notes and Highlights

Slide for Presentation