www.akamai.com
Open in
urlscan Pro
2a02:26f0:1700:38e::b63
Public Scan
Submitted URL: https://akamai.voicestorm.com/Article/Redirect/40bfd72a-825f-485a-878e-bd660ca60e84?uc=32642&g=73657a96-571d-40fc-9ed1-a910026...
Effective URL: https://www.akamai.com/blog/security/phishing-oldest-wisest-attack-vector?utm_campaign=F-MC-59103&utm_source=Twitter&ut...
Submission: On May 24 via api from US — Scanned from DE
Effective URL: https://www.akamai.com/blog/security/phishing-oldest-wisest-attack-vector?utm_campaign=F-MC-59103&utm_source=Twitter&ut...
Submission: On May 24 via api from US — Scanned from DE
Form analysis
2 forms found in the DOM<form role="combobox" aria-expanded="false" aria-haspopup="listbox" aria-labelledby="downshift-0-label">
<div class="sui-search-box">
<div class="sui-search-box__wrapper"><input aria-autocomplete="list" aria-labelledby="downshift-0-label" autocomplete="off" id="downshift-0-input" placeholder="Search" class="sui-search-box__text-input " aria-label="Search"
value=""><label></label></div>
</div>
</form>
<form role="combobox" aria-expanded="false" aria-haspopup="listbox" aria-labelledby="downshift-1-label">
<div class="sui-search-box">
<div class="sui-search-box__wrapper"><input aria-autocomplete="list" aria-labelledby="downshift-1-label" autocomplete="off" id="downshift-1-input" placeholder="Search" class="sui-search-box__text-input " aria-label="Search"
value=""><label></label></div>
</div>
</form>
Text Content
Twitter LinkedIn Email Close X Skip to main content Akamai announces intent to acquire Noname Security, extending comprehensive API protection for customers across all environments. Read more Close Button +49-8994006308 Login Control Center Access the Akamai platform Cloud Manager Manage your cloud resources en * English * Deutsch * Español * Français * Italiano * Português * 中文 * 日本語 * 한국어 Try Akamai Under Attack? Back 1. Products 2. Solutions 3. Why Akamai 4. Resources 5. Partners 6. Contact Us +49-8994006308 Back PRODUCTS Back 1. Cloud Computing 2. Security 3. Content Delivery 4. All Products and Trials 5. Global Services +49-8994006308 Back CLOUD COMPUTING CLOUD COMPUTING Learn more Create a Cloud Account COMPUTE Build, release, and scale faster with VMs for every workload See all NETWORKING Secure your network, balance traffic, control your infrastructure See all CONTAINERS Efficiently orchestrate containerized applications See all DEVELOPER TOOLS Get the most out of your applications with advanced management tools See all STORAGE Deploy dependable, easily accessible storage and management See all DATABASES Scale easily with simple and reliable managed databases See all Create a Cloud Account SECURITY SECURITY Learn more APP AND API SECURITY API SECURITY Discover and monitor API behavior to respond to threats and abuse APP & API PROTECTOR Protect web apps and APIs from DDoS, bots, and OWASP Top 10 exploits CLIENT-SIDE PROTECTION & COMPLIANCE Assist with PCI compliance and protect against client-side attacks ZERO TRUST SECURITY AKAMAI GUARDICORE SEGMENTATION Mitigate risk in your network with granular, flexible segmentation SECURE INTERNET ACCESS Proactively protect against zero-day malware and phishing HUNT Stop the most evasive threats with proactive threat hunting ENTERPRISE APPLICATION ACCESS Granular application access based on identity and context AKAMAI MFA Harden against account takeovers and data breaches with phish-proof MFA ABUSE AND FRAUD PROTECTION ACCOUNT PROTECTOR Mitigate account abuse and grow your digital business CONTENT PROTECTOR Stop scrapers, protect intellectual property, and increase conversion BRAND PROTECTOR Detect and mitigate fraudulent representations of your brand BOT MANAGER Welcome the bots you want and mitigate those you don’t IDENTITY CLOUD Add secure, cloud-based identity management to your websites or apps INFRASTRUCTURE SECURITY EDGE DNS External authoritative solution for your DNS infrastructure PROLEXIC Protect your infrastructure from distributed denial-of-service attacks CONTENT DELIVERY CONTENT DELIVERY Learn more APPLICATION PERFORMANCE ION Improve the performance and reliability of your website at scale API ACCELERATION Improve the performance and reliability of your APIs at scale MEDIA DELIVERY ADAPTIVE MEDIA DELIVERY High-quality video delivery for any screen to global audiences DOWNLOAD DELIVERY Deliver large file downloads flawlessly, every time, at global scale DEDICATED DELIVERY Deliver broadcast-quality video while maximizing network efficiency EDGE APPLICATIONS EDGEWORKERS Execute custom JavaScript at the edge, near users, to optimize UX EDGEKV Distributed key-value store database at the edge IMAGE & VIDEO MANAGER Automatically optimize images and video for every user, on any device MEDIA SERVICES LIVE Reliably ingest and deliver low-latency live video at global scale CLOUDLETS Predefined apps that run at the edge for specific business needs CLOUD WRAPPER Use an efficient caching layer to improve origin offload GLOBAL TRAFFIC MANAGEMENT Optimize performance with intelligent load balancing MONITORING, REPORTING, AND TESTING DATASTREAM Low-latency data feed for visibility and ingest into third-party tools MPULSE Measure the business impact of real user experiences in real time CLOUDTEST Site and application load testing at global scale SOLUTIONS Back 1. Use Cases 2. Industry Solutions +49-8994006308 Back USE CASES CLOUD COMPUTING MEDIA Deliver an engaging, interactive video experience SAAS Build with portability, performance, and efficiency from cloud to client GAMING Improve the gamer experience with low latency and high availability SECURITY APPS AND APIS Protect your brand by securing apps and APIs from persistent threats ZERO TRUST Deploy one platform for comprehensive coverage and deep visibility DDOS PROTECTION Protect your infrastructure from DDoS and DNS attacks ABUSE AND FRAUD PROTECTION Stop account abuse, sophisticated bot attacks, and brand impersonation CONTENT DELIVERY APP AND API PERFORMANCE Improve user engagement through app & API optimization MEDIA DELIVERY Deliver seamless streaming and download experiences to any device EDGE COMPUTE Build and deploy on the world’s most distributed edge platform INDUSTRY SOLUTIONS MEDIA AND ENTERTAINMENT RETAIL, TRAVEL, AND HOSPITALITY FINANCIAL SERVICES HEALTHCARE AND LIFE SCIENCES PUBLIC SECTOR GAMES IGAMING AND SPORTS BETTING PUBLISHING NETWORK OPERATOR WHY AKAMAI COMPANY Discover how we power and protect life online Learn more OUR PLATFORM Explore Akamai Connected Cloud Learn more RESOURCES Back 1. Library 2. Learn 3. Security Research 4. Developer Resources 5. Blog 6. Events +49-8994006308 Back LIBRARY LIBRARY See all PRODUCT BRIEFS REFERENCE ARCHITECTURES CUSTOMER STORIES EBOOKS WHITE PAPERS WEBINARS VIDEOS LEARN LEARNING HUB Educational resources and training for Akamai products and services GLOSSARY Key concepts in security, cloud computing, and content delivery SECURITY RESEARCH AKAMAI SECURITY RESEARCH Insights and intelligence from the Akamai Security Intelligence Group STATE OF THE INTERNET REPORTS In-depth analysis of the latest cybersecurity research and trends PARTNERS Back 1. Find a Partner 2. Become a Partner 3. Cloud Computing Marketplace +49-8994006308 Back FIND A PARTNER WHY CHOOSE AN AKAMAI PARTNER Learn about our industry-leading ecosystem of partners BECOME A PARTNER CHANNEL PARTNERS Unlock more profit, focus on what matters, and deliver with confidence TECHNOLOGY PARTNERS Create more value for joint customers with seamless integrations CONTACT US CONTACT SALES Have questions? We can help. Contact us CUSTOMER SUPPORT Need technical support? We are here 24/7. Get support Login Control Center Access the Akamai platform Cloud Manager Manage your cloud resources en * English * Deutsch * Español * Français * Italiano * Português * 中文 * 日本語 * 한국어 1. Blog 2. Security 3. Phishing: The Oldest and Wisest Attack Vector PHISHING: THE OLDEST AND WISEST ATTACK VECTOR Written by Jim Black and Or Katz April 19, 2023 Written by Jim Black Jim Black is a Senior Product Marketing Manager in Akamai's Enterprise Security Group. He has spent his entire career in technology, with roles in manufacturing, customer support, business development, product management, public relations, and marketing. Written by Or Katz Or Katz is a security researcher driven by data, constantly focused on developing innovative security products and transforming security challenges into scientific solutions. His passion lies in analyzing the threat landscape from both macro and micro perspectives, paying close attention to details and the big picture alike, to understand what makes threats tick and uncover the stories behind them. As a respected thought leader in the security industry, he frequently speaks at conferences and has published numerous articles, blogs, and white papers on a range of topics, including web application security, threat intelligence, internet scams, and defensive techniques. Share WHAT IS PHISHING? Phishing is an evergreen security problem that’s been around since the earliest days of our connected world. Back then, people were unaware of the concept of phishing and, despite the terrible spelling and grammar in the emails, people still responded to fictitious African kings who promised them great riches. However, the nature of phishing has changed dramatically over the years and is now delivered on an industrial scale. Today’s phishing techniques have made it significantly harder for users to determine if that email from their favorite brand is genuine or fake. Despite the changes we have seen in phishing attacks over the years, the key motivation for the cybercriminals remains the same: to trick people into disclosing confidential information, such as login credentials for their online accounts. Once the criminals have that information, they either resell the account logins on the dark web, or use the credentials themselves to access the accounts. HOW HAVE PHISHING ATTACKS CHANGED? The most significant change in phishing attacks is that the criminals now leverage off-the-shelf phishing toolkits that allow them to quickly build and deliver very sophisticated phishing campaigns at scale. The phishing kits can be bought for as little as a few hundred dollars, and they allow the attackers to create a full phishing campaign, including emails and customer login pages that look identical to the targeted brand’s login page. PHISHING KITS: AS-A-SERVICE TOOLS AND PRODUCTS In addition, the suppliers of the kit will often offer a full phishing-as-a-service product, which means the criminals don’t even have to worry about sending out the emails. The availability of low-cost phishing kits and phishing-as-a-service tools allows criminals to release new campaigns very quickly. According to Akamai data on phishing campaigns that used more than 300 different phishing toolkits, 2% of the tracked kits were reused on at least 54 distinct days during the 90-day period of Q4 2022. Furthermore, 55% of the kits were reused for at least four days, and among all the tracked kits, 100% were reused for no fewer than two distinct days over the same period. The frequency and volume of these phishing attacks makes it exceptionally difficult for brands’ security teams to deal with this problem. No sooner has one phishing attack targeting its customers’ been thwarted, then another is already underway. The same Q4 2022 data revealed that some brands had seen more than 300 domains that were created with the same phishing kits that mimicked their brand. PHISHING IS NO LONGER JUST EMAIL Another big change is that phishing no longer includes just email. Attackers now use multiple channels — email, SMS, messaging, and social media — to deliver and amplify phishing campaigns. Akamai frequently observes attacks that promise rewards for completing a simple quiz; for example, a free backpack for answering three simple questions. In late 2022, Akamai security researchers uncovered a new phishing kit that was being used to mimic several large retail brands ahead of the holiday season. The kit used a combination of social engineering, multiple evasion techniques, and access control to bypass security measures. One of the evasion techniques — utilizing URI fragmentation — is novel. The email through which the scam is delivered contains a token that is later used to reconstruct a URI link to which the victim will be redirected. Any access to a phishing scam without obtaining and using that token will be restricted from accessing the phishing landing page. These campaigns are usually accompanied by numerous fake testimonials from previous “winners” that are used to gain the victims’ trust and to inject a sense of urgency. A new approach to this technique is the creation of fake user forums in which previous winners discuss their prize. The attackers target highly popular brands because that increases the odds of their campaigns reaching the most customers. It's simply a numbers game: If the attackers send out, say, 500,000 emails, then it's highly likely a decent percentage of the recipients are existing customers of the brand. Once the attackers have garnered the targeted brand’s customers details, they can then use that list to launch more targeted campaigns. ATTACKERS ARE PRIMARILY TARGETING CONSUMERS One final insight from the Q4 2022 data is that 93% of phishing attacks are targeted at consumers, which shows that the attackers perceive the barriers to success are significantly lower than when targeting businesses. The combination of the industrial scale of the sophisticated phishing attacks against consumers and the high frequency of these campaigns presents a significant problem for brands that are being targeted. A customer who falls for one of these attacks, and has their account compromised, is very likely to develop a negative perception of the brand and may take their business elsewhere. AKAMAI’S EFFORTS TO PROTECT YOUR CUSTOMERS So, what else can brands do to further proactively protect their customers against these attacks? In our next blog post, we’ll share more of our security research findings on phishing attacks and give best practice guidance on how to protect your organization’s customers against these types of attacks. LEARN MORE If you are headed to the RSA Conference 2023, stop by the Akamai booth to see demos and hear technical talks about our latest security tools. If you won’t be there in person, follow us on LinkedIn for announcements and video clips. Follow us -------------------------------------------------------------------------------- * Security * Phishing Share -------------------------------------------------------------------------------- Written by Jim Black and Or Katz April 19, 2023 Written by Jim Black Jim Black is a Senior Product Marketing Manager in Akamai's Enterprise Security Group. He has spent his entire career in technology, with roles in manufacturing, customer support, business development, product management, public relations, and marketing. Written by Or Katz Or Katz is a security researcher driven by data, constantly focused on developing innovative security products and transforming security challenges into scientific solutions. His passion lies in analyzing the threat landscape from both macro and micro perspectives, paying close attention to details and the big picture alike, to understand what makes threats tick and uncover the stories behind them. As a respected thought leader in the security industry, he frequently speaks at conferences and has published numerous articles, blogs, and white papers on a range of topics, including web application security, threat intelligence, internet scams, and defensive techniques. RELATED BLOG POSTS There are many different kinds of good and bad bots, and it’s important to be able to distinguish whether a bot is helpful or harmful. HAVE WEB TRUST ISSUES? BOT MANAGEMENT CAN HELP May 22, 2024 Bot management involves detecting, identifying, and blocking or allowing bots that interact with websites, applications, and networks. by Christine Ferrusi Ross Read more Unfortunately, the number of DNS attacks is on the rise across industries and around the world. HOW TO DEFEND AGAINST RELENTLESS DNS ATTACKS May 20, 2024 Enterprise organizations, their employees, and their customers are better protected from cyberattacks when their DNS is properly secured. by Steve Winterfeld and Jim Gilbert Read more Because threat actors quickly shift their targets, tactics, and motivations, staying on top of risks as you innovate requires a layered defense. DDOS ATTACKS AGAINST LIFE SCIENCES ORGANIZATIONS LIKELY TO RISE May 17, 2024 Discover insights about rising DDoS attacks on life sciences and pharmaceutical organizations, and how to help protect against emerging threats. by Carley Thornell Read more Rate the helpfulness of this page PRODUCTS * Cloud Computing * Security * Content Delivery * All products and trials * Global Services COMPANY * About Us * History * Leadership * Facts and Figures * Awards * Board of Directors * Investor Relations * Environmental, Social, and Governance * Ethics * Locations CAREERS * Careers * Working at Akamai * Students and Recent Grads * Workplace Diversity * Search Jobs * Culture Blog NEWSROOM * Newsroom * Press Releases * In the News * Media Resources LEGAL & COMPLIANCE * Legal * Information Security Compliance * Privacy Trust Center * Cookie Settings * EU Digital Services Act (DSA) GLOSSARY * What Is Zero Trust? * What Is a CDN? * What Is Cloud Computing? * What Is Cybersecurity? * What Is a DDoS attack? * See all Twitter Facebook Youtube Linkedin * EMEA Legal Notice * Service Status * Contact Us -------------------------------------------------------------------------------- * EMEA Legal Notice * Service Status * Contact Us * en * English * Deutsch * Español * Français * Italiano * Português * 中文 * 日本語 * 한국어 ©2024 Akamai Technologies YOUR COOKIE CHOICES FOR THIS WEBSITE We use cookies to ensure the fast reliable and secure operation of this website, to improve your website experience, to enable certain social media interactions and to manage your cookie choices. Some cookies process personal data. By agreeing to the placement of the cookies you also agree to the related personal data processing activities, where applicable. Click “Manage Preferences” to make individual choices and get details on the cookies in use and the processing activities in the Cookie Details section, click “Accept Cookies” to agree to the storing of all cookies except for strictly necessary cookies and the data processing activities or click “Reject Cookies” to reject all cookies except for strictly necessary cookies. You can withdraw your consent at any time by clicking on the Cookie Icon that appears at the lower left corner when scrolling the website. For additional information relating to your privacy take a look at ourPrivacy Statement. Reject Cookies Accept CookiesManage Preferences