Loading
Serviceteam IT
  • Infrastructure
  • Consultancy
  • Research
  • Case Studies
  • Contact Us
  • Blog
  • 0121 468 0101
  • Search
  • Menu Menu
  • Twitter
  • LinkedIn
  • Youtube
News

Phishing Biggest Threat to Google Account Security

Last year may have been mostly about ransomware, but it’s difficult to forget the billion or so passwords that were spilled in high-profile breaches and credential leaks.

Google and researchers from the University of California Berkeley attempted to ease some of that pain, and teamed up to analyze how cybercriminals operating underground markets for stolen credentials steal, use and monetize this data.

Looking at black market activity from March 2016 to March 2017 and its impact on exclusively Google accounts, the researchers said they wanted to know how the multitude of keyloggers, phishing kits and available data from publicly known breaches for sale can be turned around to learn valid email credentials and in turn control over a user’s online identity.

The news isn’t good.

In a paper presented at the recent Conference on Computer and Communications Security, Google said that between 7 percent and 25 percent of exposed passwords matched a victim’s Google account. Overall, Google and UC Berkeley estimates there are 1.9 billion usernames and passwords cultivated from breaches that are being traded on the black market. Tack on to that another 12.4 million victims of phishing kits and another 788,000 victims of commercial keyloggers and the climate is dire.

“We observe a remarkable lack of external pressure on bad actors, with phishing kit playbooks and keylogger capabilities remaining largely unchanged since the mid-2000s,” the researchers wrote.

Of the black markets tracked in this research, Google said there are 25,000 tools for phishing and keyloggers at attackers’ disposal. Even though attackers are failing to access Google accounts three out of four times, it’s not for a lack of effort.

“Because a password alone is rarely sufficient for gaining access to a Google account, increasingly sophisticated attackers also try to collect sensitive data that we may request when verifying an account holder’s identity,” Google said in a blog post accompanying the report. “We found 82 percent of blackhat phishing tools and 74 percent of keyloggers attempted to collect a user’s IP address and location, while another 18 percent of tools collected phone numbers and device make and model.

“By ranking the relative risk to users, we found that phishing posed the greatest threat, followed by keyloggers, and finally third-party breaches,” Google said.

Phishing remains one of the most successful phenomena in security, despite more than a decade of education and examples of successful attacks based on the technique.

“Hijackers also have varying success at emulating the historical login behavior and device profile of targeted accounts. We find victims of phishing are 400x more likely to be successfully hijacked compared to a random Google user,” the researchers wrote. “In comparison, this rate falls to 10x for data breach victims and roughly 40x for keylogger victims. This discrepancy results from phishing kits actively stealing risk profile information to impersonate a victim, with 83 percent of phishing kits collecting geolocations, 18 percent phone numbers, and 16 percent User-Agent data.”

Backing this up, the researchers found more than 4,000 phishing kits used in active attacks during the period of time studied compared to 52 keyloggers. Phishing kits are packages of all-in-one tools for creating and configuring content used in these attacks, including email and website creation. These kits generally are used to collect a victim’s username and password, but also geolocation information and a lot more. The credentials are forwarded to the attacker over SMPT, FTP or uploading them to a website. Most phishing kits—and keyloggers—are configured to steal Gmail credentials, the study said. Yahoo webmail users, however, were the biggest victims of credential leaks. Yahoo has reported that at one time all of its 3 billion users’ data has been exposed to attackers.

Google said it has already used this data to reinforce the security of Gmail.

“Our findings illustrate the global reach of the underground economy surrounding credential theft and the need to educate users about password managers and unphishable two-factor authentication as a potential solution,” the researchers wrote.

Source: ThreatPost

With over 20 years of experience, Serviceteam IT design and deliver sophisticated connectivity, communication, continuity, and cloud services, for organisations that need to stay connected 24/7. We take the time to fully understand your current challenges, and provide a solution that gives you a clear understanding of what you are purchasing and the benefits it will bring you.

To find out how we can help you, call us on 0121 468 0101, use the Contact Us form, or why not drop in and visit us at 49 Frederick Road, Edgbaston, Birmingham, B15 1HN.

We’d love to hear from you!

13 November, 2017/by serviceteamit
Tags: account hijacking, account takeover, credential leaks, Google, Keyloggers, Phishing, Security News, Stolen Credentials, Web Security
Share this entry
  • Share on Facebook
  • Share on Twitter
  • Share on WhatsApp
  • Share on Pinterest
  • Share on LinkedIn
  • Share on Tumblr
  • Share on Vk
  • Share on Reddit
  • Share by Mail
http://51.132.39.250/wp-content/uploads/2017/04/Squarelogotemplate.png 250 250 serviceteamit /wp-content/uploads/2020/05/ServiceteamITLogo250.png serviceteamit2017-11-13 18:29:352017-11-13 18:29:35Phishing Biggest Threat to Google Account Security
You might also like
Serviceteam IT Security News Capita fined £14m for data protection failings in 2023 cyber-attack
Serviceteam IT Security News Honda, Universal Music Group Expose Sensitive Data in Misconfig Blunders
Serviceteam IT Security News Cyber security: available at good shops everywhere
Don't be hooked by data trawlers Don’t be hooked by data trawlers
Serviceteam IT Security News Lenovo Fixes Hardcoded Password Flaw Impacting ThinkPad Fingerprint Scanners
Serviceteam IT Security News Secure development and deployment

Serviceteam IT Research

Serviceteam IT ResearchServiceteam IT Research

Recent Posts

  • Booking.com warns customers of hack that exposed their data
  • Almost half a million Lloyds customers had personal data exposed in IT glitch
  • Google warns quantum computers could hack encrypted systems by 2029
  • Australia politics live: Bowen confirms dozens of east coast petrol stations experiencing shortages; One Nation only about ‘stunts and the vibe’, Marles says
  • ‘Exploit every vulnerability’: rogue AI agents published passwords and overrode anti-virus software
  • Stone, parchment or laser-written glass? Scientists find new way to preserve data
  • A Victorian school teacher was applying for ‘heaps of rentals’ online – then someone accessed his bank account
  • Why should renters like me have to trade away our privacy just to get a roof over our heads? | Samantha Floreani
  • Real estate agents in Australia using apps that leave millions of lease documents at risk, digital researcher says
  • Burner phones and lead-lined bags: a history of UK security tactics in China
  • ‘All brakes are off’: Russia’s attempt to rein in illicit market for leaked data backfires
  • ‘Mortified’ OBR chair hopes inquiry into budget leak will report next week
  • London councils enact emergency plans after three hit by cyber-attack
  • Personal details of Tate galleries job applicants leaked online
  • Knee-jerk corporate responses to data leaks protect brands like Qantas — but consumers are getting screwed

Categories

  • 2FA
  • 5G
  • Active Directory
  • Active Directory Federated Services (ADFS)
  • Amazon Web Services
  • Apple Mac
  • Artificial Intelligence (AI)
  • AWS Direct Connect
  • Azure
  • Azure AD
  • Azure ExpressRoute
  • Backup
  • Big Data
  • Blockchain
  • Blockchain as a Service
  • Brexit
  • Business Continuity
  • Calendar App
  • Case Study
  • Cloud
  • Cloud Analytics
  • Cloud Connect
  • Collaboration
  • Communication
  • Compliance
  • Connectivity
  • Consultancy
  • Continuity
  • Cyber Fraud
  • Cyber Security
  • Data Centre
  • Data Sovereignty
  • Desktop-as-a-Service
  • Digital Transformation
  • Disaster Recovery
  • DNS
  • Edge Computing
  • EOL
  • Exchange Online
  • Exchange Online Protection
  • GDPR
  • Glossary
  • Google Cloud
  • High Availability
  • HowTo
  • HP Helion
  • Hybrid-Cloud
  • IBM
  • Identity and Access Management
  • Internet of Things (IoT)
  • IONOS
  • IP Telephony
  • Leased Line
  • Lock down client IP source
  • MFA
  • Microsoft Teams
  • Multi-Factor Authentication
  • MX Fallback
  • Networks
  • News
  • O365
  • OData
  • Office 365
  • Oracle
  • Outlook 2011 for Mac
  • Outlook 2016 for Mac
  • Outsourcing
  • Password Management
  • Phishing
  • PowerShell
  • Reporting
  • Research
  • Restricted Access
  • Robotic Process Automation (RPA)
  • Salesforce
  • Scam Emails
  • Security
  • Self-service
  • SharePoint Online
  • Single Sign-On
  • Skype for Business
  • Smart Network
  • Spoof Emails
  • SSO
  • Supplier Selection
  • Teams Direct
  • Unified Threat Management
  • VoIP

Serviceteam IT Limited, 49 Frederick Road, Edgbaston, Birmingham, B15 1HN.

Copyright © 2011 Serviceteam IT Limited. Registered in England 07578043.

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • December 2016
  • November 2016
  • October 2016
  • September 2016
  • August 2016
  • June 2016
  • May 2016
  • April 2016
  • March 2016
  • February 2016
  • January 2016
  • November 2015
  • October 2015

Categories

  • 2FA
  • 5G
  • Active Directory
  • Active Directory Federated Services (ADFS)
  • Amazon Web Services
  • Apple Mac
  • Artificial Intelligence (AI)
  • AWS Direct Connect
  • Azure
  • Azure AD
  • Azure ExpressRoute
  • Backup
  • Big Data
  • Blockchain
  • Blockchain as a Service
  • Brexit
  • Business Continuity
  • Calendar App
  • Case Study
  • Cloud
  • Cloud Analytics
  • Cloud Connect
  • Collaboration
  • Communication
  • Compliance
  • Connectivity
  • Consultancy
  • Continuity
  • Cyber Fraud
  • Cyber Security
  • Data Centre
  • Data Sovereignty
  • Desktop-as-a-Service
  • Digital Transformation
  • Disaster Recovery
  • DNS
  • Edge Computing
  • EOL
  • Exchange Online
  • Exchange Online Protection
  • GDPR
  • Glossary
  • Google Cloud
  • High Availability
  • HowTo
  • HP Helion
  • Hybrid-Cloud
  • IBM
  • Identity and Access Management
  • Internet of Things (IoT)
  • IONOS
  • IP Telephony
  • Leased Line
  • Lock down client IP source
  • MFA
  • Microsoft Teams
  • Multi-Factor Authentication
  • MX Fallback
  • Networks
  • News
  • O365
  • OData
  • Office 365
  • Oracle
  • Outlook 2011 for Mac
  • Outlook 2016 for Mac
  • Outsourcing
  • Password Management
  • Phishing
  • PowerShell
  • Reporting
  • Research
  • Restricted Access
  • Robotic Process Automation (RPA)
  • Salesforce
  • Scam Emails
  • Security
  • Self-service
  • SharePoint Online
  • Single Sign-On
  • Skype for Business
  • Smart Network
  • Spoof Emails
  • SSO
  • Supplier Selection
  • Teams Direct
  • Unified Threat Management
  • VoIP

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
  • Privacy
  • Resources
  • Terms
  • Portal
  • Fibre
  • Smart Network
  • Cloud Connect
  • IP Telephony
  • Teams Calling
  • Microsoft Teams
  • Office 365 Plans
AutoIt Scripting Used By Overlay Malware to Bypass AV Detection Serviceteam IT Security News Changing Cyber Security Demands Meeting the changing demands of cyber security
Scroll to top