Domain Name System: Phishing attacks use fake websites as a pretext

The second quarter of 2015 recorded the highest number of phishing attacks. It is noticeable that the attackers are increasingly carrying out their attacks on the Domain Name System (DNS) level.

The DNS is required for virtually all connections on the Internet because it converts domain names into machine-readable IP addresses. This not only makes the service important for protecting networks, but also the perfect target for attacks. The Infoblox DNS Threat Index shows a significant increase in hostile domains for the second quarter of 2015, whereby the criminal masterminds even use DNS bypasses for their attacks. The aim of this manipulation is to direct users to fake websites where the cybercriminals “phish” for confidential information, including passwords, PINs and bank account details. Exploit kits with malware are often hidden on low-key websites and, when accessing these websites, the malware is automatically transferred. At the same time, there has recently been another sharp rise in the number of servers brought down by distributed denial-of-service (DDoS) attacks.

The Infoblox and IID DNS Threat Index is based on a core value of 100 points. In the first quarter of 2015, the index stood at 122 points, before it climbed to a record high of 133 points in the second quarter. (Source: Infoblox Inc./bs)

Matomo