Tuesday, November 12, 2024
HomeSecurity NewsPhishing and Keylogging Major Threats to Google Accounts Security

Phishing and Keylogging Major Threats to Google Accounts Security

Published on

Malware protection

Phishing and Keylogging are one of the most common problems for Internet Users, hackers find a new innovative method to create believable URL’s to trick users. According to Google research, more than 15% accounts hijacked by using these social engineering methods.

Google teamed up with the University of California Berkeley for the better understanding of how account hijacks occur in wild and the survey conducted between the period of March 2016 to March 2017.

They found 788,000 potential victims of off-the-shelf keyloggers; 12.4 million potential victims of phishing kits; and 1.9 billion usernames and passwords exposed via data breaches and traded on black market forums.

Also, they identified 4,069 distinct phishing kits and 52 keyloggers that are responsible for the attack and the most popular keylogger used by Blackhat hackers is HawkEye. You read the full research paper here.

- Advertisement - SIEM as a Service
Source: Google

Malicious websites available everywhere over the Internet, it is very difficult to find a trustworthy website. We need to browse smart and need to make sure the site is not dangerous by using Multiple approaches.

In general, it is good to type the website URL instead of copy paste or clicking an URL. Also, check to see the website working with HTTP OR HTTPS.

Read to deploy phishing kits are available in a number of hacker forums with inbuilt support for reporting credentials to the operator.And the same scenario for keyloggers.

Gao et al. identified 57,000 Facebook accounts that created 200,000 spam posts; they estimated 97% of the accounts were in fact compromised.

Incase of an data breach around 12% of excluded records includes google Email addresss and 7% of passwords can be resued.So attackers prime target over Google account and the sucess percentage varies 12-25%.

Their entire dataset now included 1,092,567,042 credential leak victims, 3,779,664 phishing victims, and 2,992 keylogger victims.

Source: Google
We evaluate the likelihood a user falls victim to hijacking given they appear in our dataset of stolen credentials. In order to mitigate the risk of exposed passwords, Google blocks or requires additional authentication information when a login falls outside a user’s risk profile encapsulates a user’s historical access patterns, known devices, and known locations.

They found 82% of blackhat phishing tools and 74% of keyloggers attempted to collect a user’s IP address and location, while another 18% of tools collected phone numbers and device make and model.

Mitigations

Google said with their findings they must evolve their defenses in order to stay ahead of bad actors and keep users safe.Our findings illustrate that despite significant research in the space, Internet users continue to fall victim to the same threats.

Immediate solutions to the shortcomings of risk profiles include migrating users to unphishable two-factor authentication (2FA) or password managers that associate credentials with specific domains.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

10 Best DNS Management Tools – 2025

Best DNS Management Tools play a crucial role in efficiently managing domain names and...

Sweet Security Announces Availability of its Cloud Native Detection & Response Platform on the AWS Marketplace

Customers can now easily integrate Sweet’s runtime detection and response platform into their AWS...

Researchers Detailed Credential Abuse Cycle

Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling...

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Critical PDF.js & React-PDF Vulnerabilities Threaten Millions Of PDF Users

A new critical vulnerability has been discovered in PDF.js, which could allow a threat...

LayerX Security Raises $26M for its Browser Security Platform, Enabling Employees to Work Securely From Any Browser, Anywhere

LayerX, pioneer of the LayerX Browser Security platform, today announced $24 million in Series...

Email Header Analysis – Verify Received Email is Genuine or Spoofed

Email Header Analysis highly required process to prevent malicious threats since Email is...