Loading
Serviceteam IT
  • Infrastructure
  • Consultancy
  • Research
  • Case Studies
  • Contact Us
  • Blog
  • 0121 468 0101
  • Search
  • Menu Menu
  • Twitter
  • LinkedIn
  • Youtube
News

Phishing Biggest Threat to Google Account Security

Last year may have been mostly about ransomware, but it’s difficult to forget the billion or so passwords that were spilled in high-profile breaches and credential leaks.

Google and researchers from the University of California Berkeley attempted to ease some of that pain, and teamed up to analyze how cybercriminals operating underground markets for stolen credentials steal, use and monetize this data.

Looking at black market activity from March 2016 to March 2017 and its impact on exclusively Google accounts, the researchers said they wanted to know how the multitude of keyloggers, phishing kits and available data from publicly known breaches for sale can be turned around to learn valid email credentials and in turn control over a user’s online identity.

The news isn’t good.

In a paper presented at the recent Conference on Computer and Communications Security, Google said that between 7 percent and 25 percent of exposed passwords matched a victim’s Google account. Overall, Google and UC Berkeley estimates there are 1.9 billion usernames and passwords cultivated from breaches that are being traded on the black market. Tack on to that another 12.4 million victims of phishing kits and another 788,000 victims of commercial keyloggers and the climate is dire.

“We observe a remarkable lack of external pressure on bad actors, with phishing kit playbooks and keylogger capabilities remaining largely unchanged since the mid-2000s,” the researchers wrote.

Of the black markets tracked in this research, Google said there are 25,000 tools for phishing and keyloggers at attackers’ disposal. Even though attackers are failing to access Google accounts three out of four times, it’s not for a lack of effort.

“Because a password alone is rarely sufficient for gaining access to a Google account, increasingly sophisticated attackers also try to collect sensitive data that we may request when verifying an account holder’s identity,” Google said in a blog post accompanying the report. “We found 82 percent of blackhat phishing tools and 74 percent of keyloggers attempted to collect a user’s IP address and location, while another 18 percent of tools collected phone numbers and device make and model.

“By ranking the relative risk to users, we found that phishing posed the greatest threat, followed by keyloggers, and finally third-party breaches,” Google said.

Phishing remains one of the most successful phenomena in security, despite more than a decade of education and examples of successful attacks based on the technique.

“Hijackers also have varying success at emulating the historical login behavior and device profile of targeted accounts. We find victims of phishing are 400x more likely to be successfully hijacked compared to a random Google user,” the researchers wrote. “In comparison, this rate falls to 10x for data breach victims and roughly 40x for keylogger victims. This discrepancy results from phishing kits actively stealing risk profile information to impersonate a victim, with 83 percent of phishing kits collecting geolocations, 18 percent phone numbers, and 16 percent User-Agent data.”

Backing this up, the researchers found more than 4,000 phishing kits used in active attacks during the period of time studied compared to 52 keyloggers. Phishing kits are packages of all-in-one tools for creating and configuring content used in these attacks, including email and website creation. These kits generally are used to collect a victim’s username and password, but also geolocation information and a lot more. The credentials are forwarded to the attacker over SMPT, FTP or uploading them to a website. Most phishing kits—and keyloggers—are configured to steal Gmail credentials, the study said. Yahoo webmail users, however, were the biggest victims of credential leaks. Yahoo has reported that at one time all of its 3 billion users’ data has been exposed to attackers.

Google said it has already used this data to reinforce the security of Gmail.

“Our findings illustrate the global reach of the underground economy surrounding credential theft and the need to educate users about password managers and unphishable two-factor authentication as a potential solution,” the researchers wrote.

Source: ThreatPost

With over 20 years of experience, Serviceteam IT design and deliver sophisticated connectivity, communication, continuity, and cloud services, for organisations that need to stay connected 24/7. We take the time to fully understand your current challenges, and provide a solution that gives you a clear understanding of what you are purchasing and the benefits it will bring you.

To find out how we can help you, call us on 0121 468 0101, use the Contact Us form, or why not drop in and visit us at 49 Frederick Road, Edgbaston, Birmingham, B15 1HN.

We’d love to hear from you!

13 November, 2017/by serviceteamit
Tags: account hijacking, account takeover, credential leaks, Google, Keyloggers, Phishing, Security News, Stolen Credentials, Web Security
Share this entry
  • Share on Facebook
  • Share on Twitter
  • Share on WhatsApp
  • Share on Pinterest
  • Share on LinkedIn
  • Share on Tumblr
  • Share on Vk
  • Share on Reddit
  • Share by Mail
http://51.132.39.250/wp-content/uploads/2017/04/Squarelogotemplate.png 250 250 serviceteamit /wp-content/uploads/2020/05/ServiceteamITLogo250.png serviceteamit2017-11-13 18:29:352017-11-13 18:29:35Phishing Biggest Threat to Google Account Security
You might also like
Serviceteam IT Security News Protecting Bulk Personal Data
Serviceteam IT Security News Clubhouse chatroom app closes down site rebroadcasting content
Serviceteam IT Security News Windows application developer guidance
Serviceteam IT Security News EUD Security Guidance: Windows 10
Serviceteam IT Security News PSNI data breach: 200 officers and staff not informed about theft for month
Serviceteam IT Security News CyberFirst Girls’ talent showcased as the 2018 competition comes to a close

Serviceteam IT Research

Serviceteam IT ResearchServiceteam IT Research

Recent Posts

  • ‘Source of data’: are electric cars vulnerable to cyber spies and hackers?
  • Ofcom closes technical loophole used by criminals to intercept mobile calls and texts
  • Birthday freebies: how to cash in on UK retailers’ gifts and discounts
  • ‘The bot asked me four times a day how I was feeling’: is tracking everything actually good for us?
  • Apple removes advanced data protection tool in face of UK government request
  • Global ransomware payments plunge by a third amid crackdown
  • DeepSeek blocked from some app stores in Italy amid questions on data use
  • Threat of cyber-attacks on Whitehall ‘is severe and advancing quickly’, NAO says
  • ‘Security through obscurity’: the Swedish cabin on the frontline of a possible hybrid war
  • Alder Hey children’s hospital explores ‘data breach’ after ransomware claims
  • Passwords are giving way to better security methods – until those are hacked too, that is
  • Wire cutters: how the world’s vital undersea data cables are being targeted
  • Is your air fryer spying on you? Concerns over ‘excessive’ surveillance in smart devices
  • Chinese believed to have targeted Trump’s and Vance’s phones in US telecommunications breach
  • The run-up to my prostate examination | Brief letters

Categories

  • 2FA
  • 5G
  • Active Directory
  • Active Directory Federated Services (ADFS)
  • Amazon Web Services
  • Apple Mac
  • Artificial Intelligence (AI)
  • AWS Direct Connect
  • Azure
  • Azure AD
  • Azure ExpressRoute
  • Backup
  • Big Data
  • Blockchain
  • Blockchain as a Service
  • Brexit
  • Business Continuity
  • Calendar App
  • Case Study
  • Cloud
  • Cloud Analytics
  • Cloud Connect
  • Collaboration
  • Communication
  • Compliance
  • Connectivity
  • Consultancy
  • Continuity
  • Cyber Fraud
  • Cyber Security
  • Data Centre
  • Data Sovereignty
  • Desktop-as-a-Service
  • Digital Transformation
  • Disaster Recovery
  • DNS
  • Edge Computing
  • EOL
  • Exchange Online
  • Exchange Online Protection
  • GDPR
  • Glossary
  • Google Cloud
  • High Availability
  • HowTo
  • HP Helion
  • Hybrid-Cloud
  • IBM
  • Identity and Access Management
  • Internet of Things (IoT)
  • IONOS
  • IP Telephony
  • Leased Line
  • Lock down client IP source
  • MFA
  • Microsoft Teams
  • Multi-Factor Authentication
  • MX Fallback
  • Networks
  • News
  • O365
  • OData
  • Office 365
  • Oracle
  • Outlook 2011 for Mac
  • Outlook 2016 for Mac
  • Outsourcing
  • Password Management
  • Phishing
  • PowerShell
  • Reporting
  • Research
  • Restricted Access
  • Robotic Process Automation (RPA)
  • Salesforce
  • Scam Emails
  • Security
  • Self-service
  • SharePoint Online
  • Single Sign-On
  • Skype for Business
  • Smart Network
  • Spoof Emails
  • SSO
  • Supplier Selection
  • Teams Direct
  • Unified Threat Management
  • VoIP

Serviceteam IT Limited, 49 Frederick Road, Edgbaston, Birmingham, B15 1HN.

Copyright © 2011 Serviceteam IT Limited. Registered in England 07578043.

  • Privacy
  • Resources
  • Terms
  • Portal
  • Fibre
  • Smart Network
  • Cloud Connect
  • IP Telephony
  • Teams Calling
  • Microsoft Teams
  • Office 365 Plans
AutoIt Scripting Used By Overlay Malware to Bypass AV Detection Serviceteam IT Security News Changing Cyber Security Demands Meeting the changing demands of cyber security
Scroll to top