Rock Phish

From HandWiki
Revision as of 11:19, 10 July 2021 by imported>John Stpola (fix)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Short description: Phishing toolkit and the group behind it

Rock Phish refers to both a phishing toolkit/technique and the group behind it.[1][2]

Rock Phish gang and techniques

At one time the Rock Phish group was stated to be behind "one-half of the phishing attacks being carried out.[2] VeriSign reports them as a group of Romanian origin,[1] but others have claimed that the group is Russian.[3] They were first identified in 2004.[4]

Their techniques were sophisticated and distinctive, as outlined in a presentation at APWG eCrime '07.[5]

History

In 2004 the first rock phishing attacks contained the folder path “/rock”, which led to the name of the attack, and group.

Attackers employed wild card DNS (domain name server) entries to create addresses that included the target’s actual address as a sub-domain. For example, in the case of a site appearing as www.thebank.com.1.cn/thebank.html, ”thebank.com” portion of the domain name is the “wild card”, meaning its presence is purely superficial – it is not required in order for the phishing page to be displayed. “1.cn” is the registered domain name, “/thebank.html” is the phishing page, and the combination of “1.cn/thebank” will display the phishing page. This allows the perpetrators to make the wild card portion the legitimate domain name, so that it appears at first glance to be a valid folder path.[6]

References

  1. 1.0 1.1 Compliance and Privacy (2006-12-15). "What is Rock Phish? And why is it important to know?". Compliance and Privacy. http://www.complianceandprivacy.com/News-Verisign-R-Ph-commentary.asp. "Rock Phish is an individual or group of actors likely working out of Romania and nearby countries in the region. This group has been in operation since 2004 and is responsible for innovation in both spam and phishing attacks to date, such as pioneering image-spam (Ken Dunham, VeriSign)" 
  2. 2.0 2.1 Robert McMillan (2006-12-12). "'Rock Phish' blamed for surge in phishing". InfoWorld. pp. 2. http://www.infoworld.com/article/06/12/12/HNrockphish_1.html. "The first thing you need to know about Rock Phish is that nobody knows exactly who, or what, they are." 
  3. Dignan, Larry. "RSA finds new malware enhanced phishing technique". ZDNet. https://www.zdnet.com/article/rsa-finds-new-malware-enhanced-phishing-technique/. 
  4. Howard, Rick (2009-04-23) (in en). Cyber Fraud: Tactics, Techniques and Procedures. CRC Press. p. 264. ISBN 9781420091281. https://archive.org/details/cyberfr_xxx_2009_00_7612. "Rock Phish gang." 
  5. Tyler Moore and Richard Clayton.. "Examining the Impact of Website Take-down on Phishing.". APWG eCrime Researcher's Summit, ACM Press, pp. 1-13. http://www.ecrimeresearch.org/2007/proceedings/p1_moore.pdf. 
  6. Goodin, Dan. "FBI logs its millionth zombie address". The Register. https://www.theregister.co.uk/2007/06/13/millionth_botnet_address/.