Skip to main content

Almost All Phishing Events Use Free Hosting And Compromised Domains

 

For staging a phishing website, cybercriminals can choose between using legitimate yet compromised domain names, registering their own domains, and misusing free web hosting services. The key to detect and mitigate these cybersecurity threats at the earliest possible time is to understand how prevalent each of these scenarios is.

IT service company PhishLabs analyzed over a hundred thousand phishing websites to determine how many of those utilized compromised domains, domain names registered with malicious intent, or free website hosting solutions. Around 38% of the websites misused free hosting or utilized compromised domains, whereas about one-quarter of them used domain names registered with the intent to cause harm.

It is potentially tricky to determine whether one of these sites utilizes a compromised or malicious domain at a level that is enough to correctly represent the modern phishing landscape. Research regarding phishing has mainly used the following elements.

  • Whether the content in the domain name tries to pretend to be a legitimate website in some way.
  • The amount of time elapsed between domain name registration and its use. The shorter that timeframe was, the chance for the website to get maliciously registered would be more.

An advantage of utilizing the latter element is that cybercriminals can do so retroactively, albeit the phishing website is taken down. It can also be applied efficiently to a big dataset of domains associated with phishing. On the downside, it assumes that the malicious actor would register a website in the event that it was utilized for phishing in a definite period. Conservative pieces of research have used some days as a timeframe, whereas others have utilized many months. That said, the survival period of vulnerable web infrastructure is measured as per minutes instead of days or even months. That method would result in the inaccurate labeling of phishing websites as being maliciously registered sites.

Free Website Hosting Abuse

The best web hosting providers often say that nothing is ever free as a criticism of so-called free versions of these services. That is to say, there are hidden charges associated with the free services. These service providers, developer tools, dynamic DNS solutions, code and file sharing websites, and other solutions enable easy web content hosting without users having to buy domain names. The above-mentioned services tend to be misused to perform phishing attacks.

When it comes to free web hosting misuse, the whole domain name is no malicious product. The malicious product is a part of the domain string apart from the second-level domain and the one that follows the dot symbol.

These websites are based on legitimate domain names, so the requirements regarding threat intelligence and mitigation are different from the requirements where hackers register their domains.

Comments

Popular posts from this blog

Things To Know About Choosing An OS For Web Hosting

  Generally, the default OS for a web server is a Unix or Linux version. There are financial and practical reasons why it is the OS for web hosting services . For one thing, Linux is a free and open-source OS, which around 70% of web servers run on. Ubuntu, Red Hat Linux and CentOS are among the commonly-used Linux distributions. It is possible to run applications accessible for a Linux distribution with other distributions, although there are certain exceptions to it. Is Linux Web Hosting More Difficult To Use? Are you concerned about your capability of working with a hosting plan based on Linux? If so, just remember that almost every web hosting service loads the server with a user-friendly Linux distribution, like Ubuntu. The settings and services that you seek might be somewhere else, but you might look forward to having high-level usage patterns and high-level privileges from a Windows or Mac server. A few Linux distributions may be closer to Apple macOS, but others are...

Reasons To Use An Unmanaged Dedicated Server

Some of the best-dedicated server providers offer unmanaged and managed hosting options. This leaves the question of when to be on an unmanaged dedicated server hosting plan. If you are unaware of what an unmanaged hosting service means, you perhaps should not have it. Here, we will discuss why and when you should be on the best dedicated hosting plan that is unmanaged. What Does Unmanaged Dedicated Server Hosting Mean? It is a dedicated server plan that offers root access, which offers the user control over custom configurations. It requires experience in server administration and expertise in the installed OS. The web host will only set up software on the server after the customer makes their selection on checkout. Otherwise, you and/or your team will be responsible for server upkeep. When to Use An Unmanaged Dedicated Server Plan You should go for an unmanaged dedicated server plan when you require not only the power that comes with this form of a server but also the flexib...

Shared Web Hosting Versus Reseller Hosting

  A web host provides the platform and technology that enables users to access websites. The service provider offers numerous packages to suit different needs, including reseller hosting and shared web hosting plans. Shared server hosting is more affordable than other web hosting options. It is good for a single website, small business site, or a site that has low traffic. Reseller hosting is for people who wish to host more than one website or sell web hosting services. Reselling is not allowed on a shared hosting plan. What Is Shared Hosting? The hosting option offers solutions that let multiple sites share the resources of one server. A shared web hosting plan is perfect for a blog and/or small site without advanced configuration requirements or high bandwidth requirements. Further, shared hosting providers divide all the server resources like Random Access Memory, mail server and CPU among customers. Unlimited domains can be hosted on a shared plan through the inclusi...