Phishing scams are on the rise and becoming increasingly sophisticated, but with vigilance and the right security tools, tech-savvy individuals can protect themselves online. In this comprehensive guide, we’ll delve into the shadowy world of phishing, show you how even novice hackers can execute phishing campaigns, and provide pro tips to keep your data safe.
Contents
- Phishing 101 – Understanding the Threat
- The Phishing-as-a-Service Phenomenon
- The Evolution of PhaaS
- Just How Easy is it to Phish?
- Why PhaaS is So Dangerous
- Inside the PhaaS Underbelly
- Inside a Phishing Attack
- You’ve Got Phish! How to Spot Phishing Attacks
- How Companies Can Defend Against Phishing
- Battling the Phishers
- The Ongoing Phishing Arms Race
- Take Control of Your Online Security
Phishing 101 – Understanding the Threat
Before we dive into the shady world of phishing-as-a-service, let’s quickly recap what phishing is and why we should be worried about it.
Phishing is a type of social engineering cyberattack that uses deceptive emails, texts, calls or websites to manipulate users into handing over sensitive personal data – account credentials, credit card numbers, social security numbers, and more.
As you can see in the chart above, phishing attacks are on the rise across the board. Over the last 5 years phishing links increased an average of over 15% year over year.
And these attacks are very effective – up to 45% of phishing emails successfully trick users according to Verizon’s 2020 Data Breach Investigations Report. Even tech-savvy individuals can be fooled.
The impact is massive, with the FBI reporting $1.7 billion in losses to phishing in 2019. By some estimates, actual losses could be over $50 billion annually when accounting for unreported cases.
With so much easy money on the table, an entire underground industry has emerged to make phishing simple, cheap and very profitable.
The Phishing-as-a-Service Phenomenon
Phishing-as-a-service (PhaaS) refers to ready-made phishing kits and campaigns sold through dark web marketplaces and forums.
For as little as $50, an aspiring cybercriminal can gain instant access to everything needed to orchestrate a phishing attack:
- Hundreds of professional email templates mimicking leading brands
- Turnkey website clones of popular sites to host phishing pages
- Malware packages to infect victim computers
- Web hosting optimized for phishing
- Tools to harvest credentials
- Friendly customer service
Some providers even offer “full phishing services” where they do everything – from sending the emails to cashing out accounts. The buyer simply profits off a percentage of the stolen funds.
This pay-to-phish model has opened the floodgates for novice scammers to launch attacks that were once the exclusive domain of highly technical hackers.
The Evolution of PhaaS
Phishing itself has been around for decades, but commoditized phishing-as-a-service offerings first started gaining traction around 2015.
Businesses like Fraud-Crew and Scam-Guard began selling basic phishing kits and tools in dark web forums. But the real explosion in PhaaS came in 2020 when a group called BulletProofLink emerged.
BulletProofLink significantly lowered pricing for kits and introduced convenient customer service. Competing PhaaS providers followed suit, turning phishing into a user-friendly service.
Today PhaaS makes up a majority of phishing attacks. Analysts found that over 80% of domains used for phishing in 2021 were provided by toolkits or PhaaS platforms.
Just How Easy is it to Phish?
With PhaaS, running a phishing scam is frighteningly simple:
1. Purchase – The attacker buys a low cost PhaaS kit from any number of dark web vendors. Kits are ready to deploy out of the box.
2. Customize – Templates are customized with the target brand logo and styling. Email content and phishing pages are configured.
3. Host – The phishing site is deployed on hosting optimized to avoid detection. Links are obfuscated.
4. Send – Malicious emails are blasted out to thousands of potential victims. Messages convey urgency.
5. Reel In – Recipients who click the link are funneled to the phishing site and prompted to enter info.
6. Profit – The phisher can now leverage stolen data for financial gain through fraud or accounts theft.
For an investment of less than $100, an individual with no technical skill can compromise accounts and make big money. It’s a lucrative proposition for criminals.
Why PhaaS is So Dangerous
The PhaaS model has dramatically lowered barriers for cybercrime. Some worrying implications include:
-
Accessibility – Now anyone can phish regardless of technical expertise. All you need is a few bucks.
-
Scalability – Pre-made kits allow attacks to be launched at massive scale with little effort.
-
Anonymity – PhaaS sites anonymize and protect criminals to avoid prosecution. Customers take the fall.
-
Reselling Data – Many PhaaS vendors secretly resell access to stolen accounts for additional profit.
-
Funding Bigger Crimes – Money from small phishing scams can ultimately enable more damaging attacks.
-
Evading Detection – PhaaS tools make it easy for criminals to conceal phishing sites and avoid blacklists.
As long as these commercial phishing services operate in the shadows, they will continue to turn phishing into a turnkey business for an expanding population of criminals.
Inside the PhaaS Underbelly
PhaaS may simplify phishing for the end user, but behind the scenes it is quite a complex ecosystem. These criminal enterprises closely mirror legitimate tech businesses:
-
Segments and Specialization – Kits target specific industries like banking, webmail, ecommerce, and more.
-
R&D and Innovation – Providers compete on novel phishing techniques and evasion tactics. Updates are continually released.
-
Hosting and Infrastructure – Dedicated servers and hosting options optimized for phishing.
-
Customer Service – Surprisingly robust support via chat, email and forums.
-
Reviews and Reputation – Customers rate and review providers and products. Market forces improve quality.
-
Affiliate Programs – Commission structures incentivize free users to become paying customers.
-
Branding and Marketing – Logos, taglines, ads – just like any tech company marketing its wares.
Understanding the depth of the PhaaS landscape reveals just how much investment cybercriminals are making into phishing and its long term viability as an attack vector.
Inside a Phishing Attack
To really understand the threats users face from phishing kits, let’s walk through an example attack from start to finish.
John Doe purchases the Grandma’s Apple Pie Phishing Kit from a provider called YummyPhish. This kit specializes in impersonating Apple to steal App Store credentials.
YummyPhish sets up a staging server and configures the phishing site to evade blacklists. John customizes the templates and finalizes the content.
Thousands of emails are blasted out spoofing the Apple support address. The email conveys urgency around a compromised Apple ID.
Recipients who click the link are taken to the phishing site mimicking Apple’s messaging. It shows a “locked account” notice.
To unlock their account, users are prompted to enter their Apple ID email and password. These credentials are harvested by John.
John logs into victim accounts and purchases expensive app and media content through fraudulent transactions.
This entire process took very little time and technical skill thanks to the ready-made PhaaS kit. And it netted John thousands in stolen funds.
For the victims, accounts were compromised and payments had to be disputed. Some customers didn’t catch the scam in time and suffered financial loss.
You’ve Got Phish! How to Spot Phishing Attacks
The best way to avoid phishing scams is to recognize and avoid them before they cause damage. Here are tips to spot phishy behavior:
Check Sender Address – Email addresses can be spoofed. Verify the actual domain name matches the company.
Review Urgency Language – Phishers want to panic you into clicking without thinking. Be wary of dire threats and consequences. Legitimate companies generally avoid such tactics.
Hover Over Links – Before clicking, hover to preview the destination URL. Is it odd or completely unrelated? Big red flag.
Verify Security – Real banking and webmail sites should show HTTPS and the green padlock icon. Non-secure imposter sites won’t.
Match Branding – Phishing sites often have slightly off branding. Compare to the real site. Any inconsistencies?
Request Makes Sense? – Ask yourself if it makes sense for the company to request this info from you. Does the story check out?
Isolate and Verify – Don’t click email links. Instead manually open a new browser and type the real corporate site to verify any notifications.
Staying vigilant and questioning everything are crucial to avoid being duped. Well-crafted phishing emails can fool even experts on occasion, so a little paranoia goes a long way.
How Companies Can Defend Against Phishing
For organizations, aggressive defenses are needed to protect employees from phishing risks:
-
Security Awareness Training – Employees are the last line of defense, so continuous education is essential. Reinforce phishing red flags.
-
Simulated Phishing Tests – Test employee responses to dummy phishing emails to identify vulnerable users in need of coaching.
-
Email Security Tools – Solutions like Microsoft Defender for Office 365 can detect malicious links and attachments before employees see them.
-
Web Proxies – Managed proxies analyze site content and can block access to known phishing sites.
-
Multi-factor Authentication – MFA stops 99.9% of phishing login attempts by requiring a second form of verification.
-
Incident Response Prep – Have an IR plan ready for containment and recovery when (not if) an incident occurs.
With proactive planning and training, companies can significantly harden security and reduce breach risk from phishing.
Battling the Phishers
Stemming the tide of phishing requires a joint effort by individuals, corporations and authorities:
-
Individual Vigilance – Staying alert and using secure practices goes a long way. Make yourself a hard target.
-
Corporate Defense – Hardened infrastructure, training and response plans prevent breaches. Starve phishers of targets.
-
Improved Legislation – Laws and regulations lag behind tech innovations. Close loopholes that protect phishing services.
-
Law Enforcement Action – Increased pressure via takedowns of PhaaS networks and arrests of masterminds.
-
Industry Information Sharing – Companies sharing data on tactics, tools and threats to enhance community defenses.
-
Secure Design – Building robust authentication and fraud detection into platforms to resist attacks.
With combined efforts on these fronts, the ecosystem supporting phishing can be dismantled.
The Ongoing Phishing Arms Race
Phishing techniques will continue to evolve as our digital lives expand across devices, platforms and services. Criminals eagerly follow the money and adapt attacks accordingly.
Some emerging techniques we are seeing more of lately include:
-
Vishing – Voice phishing using phone calls to manipulate victims.
-
Smishing – Phishing via SMS text taking advantage of our trust in text comms.
-
Pharming – DNS hacking to redirect users to fake sites without needing them to click links.
-
OTP Interception – Tricking users into installing apps that intercept one-time passcodes for account takeover.
-
Real-time Adaptation – Using chatbots on phishing sites to dynamically respond to targets.
Fending off these new variants will require constant education and innovation. We all have a role to play in this ongoing cybersecurity arms race against phishing.
Take Control of Your Online Security
While phishers operate in the shadows, their exploitation of human trust and gullibility relies on apathy and lack of awareness.
By taking time to learn their tricks of manipulation and arming yourself with the right tools and defenses, individuals have the power to protect their data and make life harder for the scammers. A few simple precautions go a long way.
Stay vigilant out there!