.IN Domain--most sought after for Indian phishing attacks

  •  BY
  •  In
  •  Dec 12, 2013
  •  801
  •  0

Symantec Intelligence observes a 187 percent rise in phishing on Indian brands in May 2012, all targeting banks.

Symantecs latest analysis of the cyber threat landscape has revealed the rise of .in URLs in spam. Last year, the India domain (.in) ranked 10th in the distribution list, while it has now jumped to the 5th position. Furthermore, 25 percent of phishing attacks on Indian brands used the .in domain.

In May 2012, Symantec Intelligence also observed a whopping 187 percent rise over the previous month in phishing attacks on Indian brands, all of which were in the banking sector. While these originated around the world, Hyderabad hosted the second highest number of phishing attacks on Indian brands. Hyderabad also tops the list of cities for this month that hosted phishing sites in India of non-Indian brands followed by Nashik, New Delhi and Bangalore on the 3rd and 4th place respectively. Hyderabad was at 7th place in April and Thanjavur has featured in this list for the first time.

Top threats to your bank balance

Banking threats are not new; they have been around as far back as 2003. However, even as electronic banking channels have evolved and grown, banking threats have reached a considerable level of sophistication. Particularly in India and emerging nations where banks are encouraging e-transactions as a new stream of revenue, banking threats are widely prevalent. Sality, for instance, the most prevalent malcode in India for the past two years, has the capability of spreading through a variety of means and stealing banking information.

The majority of cyber attacks today are motivated by financial gain. Today there is an underground economy where information and identities are stolen, traded and exploited in an organised manner by the cyber mafia. Unsurprisingly, credit card and bank account information have been the top most actively traded items in the online black market worth billions of dollars - for the past two years. In fact, the latest Symantec Internet Security Threat Report XVII revealed that finance was the third-most targeted sector is 2011 for cyber attacks.

The good news is that the Reserve Bank of India has proactively directed banks to beef up their information security and risk management posture, outlining 225 checks in seven categories to protect users information and money from cyber threats.

Here are some of the threats used by cyber attackers to wipe out your bank account:
* Zues: This is the most prevalent and ubiquitous banking threat, in circulation and evolving since 2006. Zeus infects PCs, waits for their users to log on to a list of targeted banks and financial institutions, and then steals their credentials and sends them to a remote server in real-time. Today Zeus also has its own mobile version, affecting most of the popular mobile operating systems.
* Silentbanker: This trojan targeted over 400 banks around the world, intercepted transactions; silently changes the user-entered destination bank account details to the attacker's account details instead. The trojan ensures that the user does not notice this change by presenting the user with the details they expect to see, while all the time sending the bank the attacker's details instead.
* Tatanarg: Kills not only security processes, but also other banking threats, enables the attacker to access your computer remotely, intercepts communication between the user and the bank, and effectively controls the infected computer. It also encrypts communication to lull the user into believing that the transaction is secure, since they will see https in the URL and the padlock symbol.
* Infostealer.Bancos: One of the earliest banking threats, it gathers confidential financial information from the users computer. The trojan is most often spread by way of an email containing a social engineering trick such as a fake email from a bank.

Jordan Release Dates 2016


Add new comment