Rock Phish

From Wikipedia, the free encyclopedia
Jump to navigation Jump to search

Rock Phish refers to both a phishing toolkit/technique and the group behind it.[1][2]

Rock Phish gang and techniques[edit]

At one time the Rock Phish group was stated to be behind "one-half of the phishing attacks being carried out.[2] VeriSign reports them as a group of Romanian origin,[1] but others have claimed that the group is Russian.[3] They were first identified in 2004.[4]

Their techniques were sophisticated and distinctive, as outlined in a presentation at APWG eCrime '07.[5]

History[edit]

In 2004 the first rock phishing attacks contained the folder path “/rock”, which led to the name of the attack, and group.

Attackers employed wild card DNS (domain name server) entries to create addresses that included the target’s actual address as a sub-domain. For example, in the case of a site appearing as www.thebank.com.1.cn/thebank.html, ”thebank.com” portion of the domain name is the “wild card”, meaning its presence is purely superficial – it is not required in order for the phishing page to be displayed. “1.cn” is the registered domain name, “/thebank.html” is the phishing page, and the combination of “1.cn/thebank” will display the phishing page. This allows the perpetrators to make the wild card portion the legitimate domain name, so that it appears at first glance to be a valid folder path.[6][7][8]

References[edit]

  1. ^ a b Compliance and Privacy (2006-12-15). "What is Rock Phish? And why is it important to know?". Compliance and Privacy. Retrieved 2006-12-15. Rock Phish is an individual or group of actors likely working out of Romania and nearby countries in the region. This group has been in operation since 2004 and is responsible for innovation in both spam and phishing attacks to date, such as pioneering image-spam (Ken Dunham, VeriSign) 
  2. ^ a b Robert McMillan (2006-12-12). "'Rock Phish' blamed for surge in phishing". InfoWorld. p. 2. Archived from the original on 2007-01-08. Retrieved 2006-12-13. The first thing you need to know about Rock Phish is that nobody knows exactly who, or what, they are. 
  3. ^ Dignan, Larry. "RSA finds new malware enhanced phishing technique". ZDNet. Retrieved 8 September 2018. 
  4. ^ Jeremy Kirk (2008-04-21). "'Rock Phish Gang' Adds Second Punch to Phishing Attacks". IDG News Service. p. 1. Retrieved 2012-11-03. The Rock Phish gang surfaced around 2004, becoming well-known for its expertise in setting up phishing sites... 
  5. ^ Tyler Moore and Richard Clayton. "Examining the Impact of Website Take-down on Phishing" (PDF). APWG eCrime Researcher's Summit, ACM Press, pp. 1-13. Retrieved October 28, 2007. 
  6. ^ Goodin, Dan. "FBI logs its millionth zombie address". The Register. Retrieved 8 September 2018. 
  7. ^ Nambiar, Sai Narayan. "Getting Acquainted With Rock Phishing". SYmantec. Retrieved 8 September 2018. 
  8. ^ BCS March 2008 http://www.bcs.org/server.php?show=ConWebDoc.17968