Resources

Blog

3 Strategies to Enhance Brand Threat Intelligence

Brand threats have accounted for 68% of fraud attacks so far this year. Contrary to traditional cyber attacks, which are designed to compromise the infrastructure or circumvent controls, brand threats live outside of the organization’s control and compromise the reputation of your brand. Common types of brand misrepresentation include spoofed emails, social media scams, and...
Blog

New Quarterly Threat Trends Intelligence Report Now Available

Phishing volume in 2021 continues to outpace last year by 22%, according to PhishLabs Quarterly Threat Trends & Intelligence Report. The August 2021 report uses data from hundreds of thousands of attacks analyzed and mitigated by PhishLabs to identify the most recent top threats targeting brands and determine emerging trends throughout the threat landscape. Key Findings of the...
Blog

OSINT: How Usernames Unlock Investigations

One piece of evidence that adds value to investigating social media threats is the threat actor’s chosen username. Usernames can hold meaning to the individual, and as a result provide useful information when expanding investigations to different social platforms. As we covered in our last OSINT post, connecting all known social media accounts to one user is a critical step in...
Blog

Threat Evasion Techniques: Restricting by Interaction

Threat actors improve the resiliency of phishing campaigns by concealing malicious content from security teams. Avoiding detection increases an attacker’s odds of reaching more victims and achieving a more lucrative outcome. There are many types of evasion techniques that can be used individually or in tandem. In this post we discuss active evasion, restricting by interaction. ...
On-Demand Webinar

Quarterly Threat Trends & Intelligence Webinar (Aug 2021)

John LaCour, Founder and CTO at PhishLabs In the first half of 2021, PhishLabs detected and mitigated hundreds of thousands of external phishing, social media, and email threats targeting a broad range of enterprises and brands. In this webinar, John LaCour, Founder and CTO of PhishLabs, will analyze the Q2 findings and provide insight into key trends shaping the threat...
Blog

Breaking Down Phishing Site TLDs and Certificate Abuse in Q1

Cybercriminals continue to heavily abuse domains to launch phishing attacks. PhishLabs’ analysis of Q1 phishing attacks has found that:   96% used Legacy Generic (gTLD) or Country Code (ccTLD) Top-level Domains Almost 83% abused HTTPS Domain Validated (DV) Certificates were used 94.5% of the time   For this analysis, PhishLabs looked at three categories of TLDs: Legacy...
Blog

62% of Phishing Sites Abuse Free Tools or Services

  In Q1, PhishLabs analyzed hundreds of thousands of phishing attacks and found more than 62% abused legitimate no-cost tools or services.    >> Access the Report   In this post, we take a look at findings from our Q1 Threat Trends and Intelligence Report and review the free services that were most commonly abused to stage phishing sites.     Methods of Staging...
Press Release

PhishLabs Releases Q1 Threat Trends & Intelligence Report

Phishing Attacks Increase 47% in Q1 May 26, 2021, Charleston, SC – PhishLabs, the leading provider of Digital Risk Protection solutions, today released their Q1 Threat Trends & Intelligence Report. PhishLabs analyzed and mitigated hundreds of thousands of attacks targeting enterprise brands and employees in the first quarter of 2021. The report uses data from those attacks to...
Blog

Q1 2021 Threat Trends Intelligence Report

  Phishing attacks in Q1 have increased 47% compared to last year, according to PhishLabs newly released Q1 2021 Threat Trends & Intelligence Report. The report uses data collected from hundreds of thousands of attacks analyzed and mitigated by PhishLabs in Q1 to identify top threats targeting enterprise brands, and determine emerging trends throughout the threat landscape.  ...
Blog

Top 4 Digital Brand Threats

  Threat actors routinely impersonate brands as part of their attacks. Brand abuse can occur anywhere online, and impersonating a reputable company automatically gives credibility to a threat that might otherwise be instantly identified as suspicious. Because brand impersonation is so broadly used across the threat landscape, security teams need to have complete visibility...
Blog

Alien Mobile Malware Evades Detection, Increases Targets

  PhishLabs is monitoring the increasing number of mobile applications targeted by the relatively new Alien Mobile Banking Trojan. Alien, a fork of Cerberus, continues to evade Google's malware detection and is targeting a broad spectrum of both financial and non-financial apps. So far, Alien has been connected with 87 new brands previously not targeted by Cerberus.    ...
On-Demand Webinar

Q1 2021 Threat Trends & Intelligence Webinar

In Q1, we detected and mitigated hundreds of thousands of external threats targeting a broad range of enterprises and their brands. In this webinar, John LaCour, Founder and CTO of PhishLabs, will review the findings from analyzing these threats and provide insight into key trends shaping the threat landscape. Attendees will learn: How phishing attack volume changed in Q1 ...
Blog

Look-alike Domain Mitigation: Breaking Down the Steps

  Look-alike domains remain some of the most consistent elements of cyber attacks targeting organizations. At a high-level, there are two ways to mitigate the threat of a look-alike domain: remove the threat completely by taking it offline, or block attacks on your users by implementing IT security controls. If we dissect the construction of a look-alike domain, we see where...
Blog

The Anatomy of a Look-alike Domain Attack

  Cybercriminals register hundreds of thousands of look-alike domains every year to impersonate reputable brands and make a profit. These domains are used for a variety of attacks including phishing emails, fraudulent websites, web traffic diversion, and malware delivery. Look-alike domains are intentionally misleading to give customers the false impression that they're...
Blog

The Year In Review: How COVID-19 Has Changed Cyber Security

  The novel coronavirus has dominated 2020, and in the cyber community, threat actors have capitalized on its impact from the beginning. In early March we saw the first of what would be an onslaught of criminal activity using the pandemic to manipulate users, and over the course of the year these attacks have been modified to reflect local and global fallout.    The...
Blog

APWG Q3 Report:Four Out of Five Criminals Prefer HTTPS

  The Anti-Phishing Working Group (APWG), known for its collaborative analysis of phishing attacks and identify theft techniques, has released its Phishing Activity Trends Report for Q3 of 2020. Highlights from the report include more than two hundred thousand unique phishing websites detected in August and September, SSL encryption for phishing sites overtaking SSL deployment...
Blog

Easy to Deceive, Difficult to Detect, Impersonation Dominates Attacks

  Impersonation enables threat actors to manipulate victims into disclosing sensitive information as well as enhance their ability to commit fraud. An organization's name, logo, or messaging can be incorporated into almost any threat type, making it an easy and versatile element of a cyber attack. Impersonation is an especially difficult technique to defend against because of...
Blog

What is a Look-alike Domain?

By definition, a look-alike domain is a nearly identical, slightly altered domain name, registered with intent to deceive. Cybercriminals register hundreds of thousands of look-alike domains each year with the goal of impersonating legitimate brands and making money, usually by committing fraud. In this post, we'll describe how domains help us communicate on the Internet, the...
Blog

Top 7 Use Cases for Digital Risk Protection

  Today's enterprises are experiencing an accelerated digital transformation due to the pandemic, and adoption of initiatives that would normally span years are being fast-tracked to support remote workforces and transition to new platforms. The external digital landscape is also rapidly expanding, and organizations are being required to conduct business more frequently...
Blog

As Screen Time Skyrockets, So Does Threat of Fake Apps

  App downloads fueled by COVID-19 lockdowns leapt to 37.5 billion in Q2 of this year, and collective global app usage is surging. Android users' screen time stands out significantly, with an increase of 25% above the weekly average from the previous year. As apps continue to be an integral part of how we conduct business and perform sensitive tasks, bad actors are using fake...