Sunday, May 4, 2025
HomeComputer SecurityHalf of the Phishing Sites Trick Users by Displaying the HTTPS Green...

Half of the Phishing Sites Trick Users by Displaying the HTTPS Green Padlock

Published on

SIEM as a Service

Follow Us on Google News

A new study by PhishLabs nearly half of the phishing sites using SSL HTTPS connection and shows padlock which indicates a means of telling it as a legitimate site.

The reason for the alarming rise is because still the internet user’s believe in the padlock “look for the lock” and believe the website is legitimate and safe.

The presence of SSL doesn’t tell you anything about site legitimacy, the SSL/TLS certificates are to encrypt the connection between the browser and the server which avoids intrusion from hackers.

- Advertisement - Google News

In the third quarter of 2018, almost 49 percent of the phishing sites uses the SSL certificate, before one year it was 25 percentage and in the second quarter, it was 35 percent.

According to PhishLabs survey conducted last year found more than 80% of respondents believed the green lock indicated a website was either legitimate and/or safe, reported Kerbs on security.

John LaCour, chief technology officer said that, we believe this can be attributed to both the continued use of SSL certificates by phishers who register their own domain names and create certificates for them, as well as a general increase in SSL due to the Google Chrome browser now displaying ‘Not secure’ for websites that do not use SSL.”

The attackers taking advantage of internationalized domain names to introduce visual confusion and trick the user’s to believe it is a legitimate site.

Image Credits: SANS

Nowadays the process of getting an SSL Certificate is very simple and we also get it for free. Cybercriminals also selling the stolen SSL and code signing certificates in packages.

Certificate Transparency aims to remedy these certificate-based threats, it helps in Earlier detection, Faster mitigation, and better oversight.

There is a number of ways to analyze the Website is legitimate or not, the first and the most recommended method is to check online page scanners.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Claude AI Abused in Influence-as-a-Service Operations and Campaigns

Claude AI, developed by Anthropic, has been exploited by malicious actors in a range...

Threat Actors Attacking U.S. Citizens Via Social Engineering Attack

As Tax Day on April 15 approaches, a alarming cybersecurity threat has emerged targeting...

TerraStealer Strikes: Browser Credential & Sensitive‑Data Heists on the Rise

Insikt Group has uncovered two new malware families, TerraStealerV2 and TerraLogger, attributed to the...

MintsLoader Malware Uses Sandbox and Virtual Machine Evasion Techniques

MintsLoader, a malicious loader first observed in 2024, has emerged as a formidable tool...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

FBI Uncovers 42,000 Phishing Domains Tied to LabHost PhaaS Operation

The Federal Bureau of Investigation (FBI) has revealed the existence of 42,000 phishing domains...

AiTM Phishing Kits Bypass MFA by Hijacking Credentials and Session Tokens

Darktrace's Security Operations Center (SOC) in late 2024 and early 2025, cybercriminals have been...

ResolverRAT Targets Healthcare and Pharmaceutical Sectors Through Sophisticated Phishing Attacks

A previously undocumented remote access trojan (RAT) named ResolverRAT has surfaced, specifically targeting healthcare...