One-third of phishing pages only stay active for a day

Phishing
(Image credit: Shutterstock)

Many pages created to phish sensitive data out of unsuspecting users don’t survive much longer than a day, according to a report from Kaspersky, which states that a third of such pages die the same day they’re created.

That’s why, the researchers are saying, the first few hours of a phishing page are also the most effective ones for malware distribution and identity theft

Kaspersky analyzed 5307 pages between July 19 and August 2 this year, and found 1784 became inactive after the first day of monitoring. A quarter died after 13 hours, while half were pushed offline after 94 hours. 

Short-lived

It all depends on two things, Kaspersky further explains - the speed at which administrators spot phishing pages sitting on their servers, and the speed at which anti-phishing engines are able to add these pages to their database of dangerous content. 

Even if malicious actors deploy their own servers on the purchased domain, the registrars may prevent them to host any data on it, the researchers further explained.

With the average phishing site’s lifecycle’s being so short, malicious actors usually work fast to distribute it to as many potential victims, as fast as possible. What’s more, instead of modifying an existing page, they’ll usually just create a new page. For example, if they use a certain brand to try and phish for data, they might change it to a different brand, but most pages are blocked before they’re able to make any changes.

Waiting the threat out

Another method that’s often used revolves around creating randomly generated code elements, invisible to the user, but great for evading anti-phishing engines and extending the lifecycle for at least a couple more hours. 

A PUBG giveaway (a giveaway of content for the globally popular third-person shooter game PlayerUnknown’s Battlegrounds) is one of the most popular types of content that gets modified to avoid being blocked, Kaspersky says. 

Malicious actors often shuffle the content around just in time for the game’s new season, hunting for as many unsuspecting gamers as possible.

All things considered, Kaspersky advises everyone who doubts the legitimacy of a page and doesn't want to risk compromising their endpoints, to wait a few hours and see if it’ll still be active. 

“During that time, not only will the likelihood of getting the link in the anti-phishing databases increase, but the phishing page itself can stop its activity,” said Egor Bubnov, security researcher at Kaspersky.

  • You might also want to check out our list of the best firewalls right now

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
Fraude en ligne phishing
Phishing clicks nearly tripled in 2024 as criminals aim for smarter attacks
A fish hook is lying across a computer keyboard, representing a phishing attack on a computer system
Everything you need to know about phishing
Paper craft illustration of a suspicious email that contains a snake
How to spot a phishing email
Fraude en ligne phishing
Google forced to step up phishing defenses following ‘most sophisticated attack’ it has ever seen
Someone checking their credit card details online.
Hackers use CAPTCHA scam in PDF files on Webflow CDN to get past security systems
ransomware avast
AI is helping hackers get access to systems quicker than ever before
Latest in Security
Isometric demonstrating multi-factor authentication using a mobile device.
NCSC gets influencers to sing the praises of 2FA
Sam Altman and OpenAI
OpenAI is upping its bug bounty rewards as security worries rise
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Dangerous new CoffeeLoader malware executes on your GPU to get past security tools
China
Notorious Chinese hackers FamousSparrow allegedly target US financial firms
A digital representation of a lock
NYU website defaced as hacker leaks info on a million students
NHS
NHS IT supplier hit with major fine following ransomware attack
Latest in News
Nintendo Switch 2 Joy-Con up-close from app store
Nintendo's new app gave us another look at the Switch 2, and there's something different with the Joy-Con
cheap Nintendo Switch game deals sales
Nintendo didn't anticipate that Mario Kart 8 Deluxe was 'going to be the juggernaut' for the Nintendo Switch when it was ported to the console, according to former employees
Three angles of the Apple MacBook Air 15-inch M4 laptop above a desk
Apple MacBook Air 15-inch (M4) review roundup – should you buy Apple's new lightweight laptop?
Witchbrook
Witchbrook, the life-sim I've been waiting years for, finally has a release window and it's sooner than you think
Amazon Echo Smart Speaker
Amazon is experimenting with renaming Echo speakers to Alexa speakers, and it's about time
Shigeru Miyamoto presents Nintendo Today app
Nintendo Today smartphone app is out now on iOS and Android devices – and here's what it does