Saturday, November 16, 2024
HomeSecurity NewsPhishing and Keylogging Major Threats to Google Accounts Security

Phishing and Keylogging Major Threats to Google Accounts Security

Published on

Phishing and Keylogging are one of the most common problems for Internet Users, hackers find a new innovative method to create believable URL’s to trick users. According to Google research, more than 15% accounts hijacked by using these social engineering methods.

Google teamed up with the University of California Berkeley for the better understanding of how account hijacks occur in wild and the survey conducted between the period of March 2016 to March 2017.

They found 788,000 potential victims of off-the-shelf keyloggers; 12.4 million potential victims of phishing kits; and 1.9 billion usernames and passwords exposed via data breaches and traded on black market forums.

Also, they identified 4,069 distinct phishing kits and 52 keyloggers that are responsible for the attack and the most popular keylogger used by Blackhat hackers is HawkEye. You read the full research paper here.

- Advertisement - SIEM as a Service
Source: Google

Malicious websites available everywhere over the Internet, it is very difficult to find a trustworthy website. We need to browse smart and need to make sure the site is not dangerous by using Multiple approaches.

In general, it is good to type the website URL instead of copy paste or clicking an URL. Also, check to see the website working with HTTP OR HTTPS.

Read to deploy phishing kits are available in a number of hacker forums with inbuilt support for reporting credentials to the operator.And the same scenario for keyloggers.

Gao et al. identified 57,000 Facebook accounts that created 200,000 spam posts; they estimated 97% of the accounts were in fact compromised.

Incase of an data breach around 12% of excluded records includes google Email addresss and 7% of passwords can be resued.So attackers prime target over Google account and the sucess percentage varies 12-25%.

Their entire dataset now included 1,092,567,042 credential leak victims, 3,779,664 phishing victims, and 2,992 keylogger victims.

Source: Google
We evaluate the likelihood a user falls victim to hijacking given they appear in our dataset of stolen credentials. In order to mitigate the risk of exposed passwords, Google blocks or requires additional authentication information when a login falls outside a user’s risk profile encapsulates a user’s historical access patterns, known devices, and known locations.

They found 82% of blackhat phishing tools and 74% of keyloggers attempted to collect a user’s IP address and location, while another 18% of tools collected phone numbers and device make and model.

Mitigations

Google said with their findings they must evolve their defenses in order to stay ahead of bad actors and keep users safe.Our findings illustrate that despite significant research in the space, Internet users continue to fall victim to the same threats.

Immediate solutions to the shortcomings of risk profiles include migrating users to unphishable two-factor authentication (2FA) or password managers that associate credentials with specific domains.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Critical TP-Link DHCP Vulnerability Let Attackers Execute Arbitrary Code Remotely

A critical security flaw has been uncovered in certain TP-Link routers, potentially allowing malicious...

Chinese SilkSpecter Hackers Attacking Black Friday Shoppers

SilkSpecter, a Chinese financially motivated threat actor, launched a sophisticated phishing campaign targeting e-commerce...

Cybercriminals Launch SEO Poisoning Attack to Lure Shoppers to Fake Online Stores

The research revealed how threat actors exploit SEO poisoning to redirect unsuspecting users to...

Black Basta Ransomware Leveraging Social Engineering For Malware Deployment

Black Basta, a prominent ransomware group, has rapidly gained notoriety since its emergence in...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Critical PDF.js & React-PDF Vulnerabilities Threaten Millions Of PDF Users

A new critical vulnerability has been discovered in PDF.js, which could allow a threat...

LayerX Security Raises $26M for its Browser Security Platform, Enabling Employees to Work Securely From Any Browser, Anywhere

LayerX, pioneer of the LayerX Browser Security platform, today announced $24 million in Series...

Email Header Analysis – Verify Received Email is Genuine or Spoofed

Email Header Analysis highly required process to prevent malicious threats since Email is...