Rock Phish may be using fast flux in phishing attacks
IDG News Service -
The elusive "Rock Phish" group continues to be innovative. The group appears to have started using the so-called "fast flux" method to fool researchers and elude detection, according to new security research.
Cambridge University security researchers Richard Clayton and Tyler Moore tracked 30,000 phishing reports that came in through Phish Tank, a clearing house that tracks phishing sites, between February and April 2007. They found a link between Rock Phish and the fast flux approach.
The researchers logged their findings, among other things, in a paper, "Examining the Impact of Website Takedown on Phishing," that computer science PhD candidate Moore presented at the Anti-Phishing Work Group (APWG) eCrime Researchers Summit in Pittsburgh Thursday.
Nobody knows exactly who or what Rock Phish are -- whether it's one person or a group of people -- but security researchers believe Rock Phish is behind as many as one-half of all phishing attacks on the Web. Fast flux is a method by which a domain name that phishers use has multiple IP (Internet Protocol) addresses assigned to it. The phishers switch those domains quickly between the addresses so that it's not as easy to find or shut down the phishing sites.
With fast flux, once a phishing site is found, it's not simply a matter of going to Internet service provider hosting the domain name to shut down the site; authorities must go to the domain name registrar, which is more time consuming and complex, Moore said.
"There is automated [site] replenishment," he said. "Once proxies are taken down, new ones are taken into the fold."
According to Clayton and Moore's findings, Rock Phish as a group and fast flux as a method are by far the most effective means of phishing. A connection between them would be troublesome for researchers trying to reduce the number of phishing attacks and track down offending parties.
In an interview after his presentation, Moore said evidence about the connection between Rock Phish and fast flux is inconclusive. However, after four weeks of tracking sites that had all the earmarks of being Rock Phish attacks, the fast-flux method started showing up in phishing reports, he said.
"They were burning through 400 IP addresses per week," Moore said. "It becomes impractically hard to take down these proxy machines."
Rock Phish attacks can be identified by researchers because of the way they operate, which is different than standard phishers. They use compromised machines as proxy servers that connect to a central server, which researchers call "the Mother Ship," rather than serving up sites directly from the compromised machines.
Whether the fast flux activity Clayton and Moore identified is actually the work of Rock Phish or a copycat group or person acting like them remains to be seen, but overall phishers appear to be using fast flux more, Clayton said.
"Whether it's [Rock Phish] or separate gangs acting like them, and whether they all get together and drink at the pub and compare methods at night, we don't know because the police haven't caught them yet," he said.
In addition to a connection to fast flux, Clayton and Moore's research also found that Rock Phish's elusive methods allow its phishing sites to stay live a full day and a half longer than average phishing sites. This gives sites served by the group more opportunity to lure unsuspecting Web users into their traps.
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Neustar 2014 DDoS Attacks and Impact Report For the third consecutive year, Neustar surveyed hundreds of companies on distributed denial of service (DDoS) attacks. The survey reveals evidence that the...
- Acxiom Case Study This case study, which focuses on Acxiom, explores how the company was able to secure employee data, reduce migration costs and boost productivity...
- Windows® XP Migration: Protect and Secure Critical Data With the end of the Microsoft Windows XP operating system's lifecycle on April 8, 2014, businesses are faced with the decision to migrate...
- Enhancing Application Protection and Recovery with a Modern Approach to Snapshot Management This CommVault Business Value and Technology White Paper explains how Simpana IntelliSnap® Recovery Manager can make your application recovery fast and reliable.
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts