Proceedings of the 17th International Conference on Availability, Reliability and Security 2022
DOI: 10.1145/3538969.3538997
|View full text |Cite
|
Sign up to set email alerts
|

Dating Phish: An Analysis of the Life Cycles of Phishing Attacks and Campaigns

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…( Legg, Blackman, 2019 , Van Der Heijden, Allodi, 2019 ) Dutch phishing rise march 2020 The rise of phishing emails in the Netherlands corresponds in a broad sense to the announced measurements taken by the Dutch government, and highly relates to the announcement classifying Covid-19 as a pandemic Trend shift Dutch Covid-19 restriction announcements Likely higher victimization rate Sec 4.2.1 Day and Time-depend susceptibility to phishing It is apparent that day of the week, and time of the day play an influential role in the assumptions of attackers that people are susceptible to phishing. Patterns follow work-week patterns of employees (mon-fri), with specific hours of breaktime, and email reading patterns Recurring Likely higher victimization rate Sec 4.2.2 Weekend pattern ( Lastdrager, 2018 , Ramzan, Wüest, 2007 ) peak pattern ( Drury et al., 2022 ) If we remove the dominant pattern, there are no other spikes appearing in the data. That means, it is likely that we have caught the most largest campaigns that are event/date specific.…”
Section: Methodsmentioning
confidence: 94%
“…( Legg, Blackman, 2019 , Van Der Heijden, Allodi, 2019 ) Dutch phishing rise march 2020 The rise of phishing emails in the Netherlands corresponds in a broad sense to the announced measurements taken by the Dutch government, and highly relates to the announcement classifying Covid-19 as a pandemic Trend shift Dutch Covid-19 restriction announcements Likely higher victimization rate Sec 4.2.1 Day and Time-depend susceptibility to phishing It is apparent that day of the week, and time of the day play an influential role in the assumptions of attackers that people are susceptible to phishing. Patterns follow work-week patterns of employees (mon-fri), with specific hours of breaktime, and email reading patterns Recurring Likely higher victimization rate Sec 4.2.2 Weekend pattern ( Lastdrager, 2018 , Ramzan, Wüest, 2007 ) peak pattern ( Drury et al., 2022 ) If we remove the dominant pattern, there are no other spikes appearing in the data. That means, it is likely that we have caught the most largest campaigns that are event/date specific.…”
Section: Methodsmentioning
confidence: 94%
“…Mansoori et al [35] attempted to detect geofencing by concurrently accessing malicious hosts from clients located in six geolocations and revealed the correlation between TLDs and targeted locations. Drury et al analyzed the life cycle of phishing sites to determine their survival time and campaign-specific characteristics [14]. Bijmans et al identified attacks using off-the-shelf phishing kits, observed them, and derived TTPs [17].…”
Section: Related Workmentioning
confidence: 99%
“…Such techniques bypass security researcher investigations and automatic malicious host detection systems, resulting in threat information not being shared and action being delayed. For example, an extensive study of phishing in [14] examined the possibility that there may be some attacks that cannot be observed due to cloaking.…”
Section: Introductionmentioning
confidence: 99%
“…These datasets also face relevance challenges due to various factors. As these messages age, linked websites are often taken down swiftly, limiting learning opportunities about the smishing attack [5]. Moreover, older datasets become less effective as smishing campaigns evolve, leading to concept drift [20].…”
Section: Introductionmentioning
confidence: 99%