The History and Evolution of Phishing Attacks
![]() |
| Retrieved from: https://consoltech.com/wp-content/uploads/2018/12/How-to-stop-Phishing-emails.jpg |
TL;DR: Phishing attacks have been around since the mid-90s and due to their success rate, they have evolved to become one of the most used forms of malicious attacks.
Phishing attacks are a popular form of attack that have been around since the mid-1990s. “Phishing is an attempt to deceive the victim to gain access to confidential and private information and/or distribute infected files” (Gershwin, 2019). The term “Phishing” was first used in an AOL user group called AOHell (KnowBe4, n.d.). “Some of the earliest hackers were known as phreaks. Phreaking refers to the exploration, experimenting and study of telecommunication systems” (KnowBe4, n,d,). The spelling of the term “Phishing”, which replaces the “f” with “ph” was done in order to link this type of attack to phreaks.
![]() |
| AOHell Interface. Retrieved from: https://www.semanticscholar.org/topic/AOHell/3132882 |
Some of the earliest phishing
attacks were performed on AOL users in the mid-1990s. AOL was one of the
largest providers of internet service during the mid-1990s, which made it a
target for hackers. It wasn’t long until a suite of hacker tools specifically
designed to perform phishing attacks on AOL users was created. This toolset was
aptly named AOLHell and was created by a seventeen-year-old who went by the
name “Da Chronic” (Velzian, 2019).
![]() |
| AOHell Phishing tool. Retrieved from: https://www.semanticscholar.org/topic/AOHell/3132882 |
The phishing attacks that were
carried out in the 1990s were done via instant messenger or through email. The
hackers would use AOL’s instant messenger and AOL email accounts to impersonate
AOL employees and contact targets in order to get them to give out their
personal information, such as their credit card information or account login (Moramacro,
n.d.). But as time went on, hackers developed more advanced forms of phishing
that integrated malicious links to external websites.
In the early 2000s, hackers began
to register domain names to impersonate businesses (Moramacro, n.d.). These
websites were used to impersonate legitimate websites with the intent of
stealing the victim’s login information. For example, a hacker may register the
domain name amazon-billing.com to target amazon shoppers. This approach only
helped to legitimize the phishing emails in the eyes of their intended targets.
These impersonation websites are
often referred to as cloned websites, as hackers can easily clone a website
with free opensource tools. A quarterly report that was conducted by the Anti
Phishing Working Group from October 2018 to March 2019, found that phishing
websites have increased from fifty-eight thousand to sixty-one thousand (Gershwin,
2019).
The typical phishing email will
usually imitate a bank or credit card company. The email will inform the target
that the company believes that their account has been compromised (Moramacro,
n.d.). The email will include a link that will direct the target to a
fraudulent website that will look like the home page of the business entity
that they are impersonating. If the target enters their credentials, then the
hacker has successfully deceived the target into disclosing their sensitive
data.
![]() |
| Office 365 Phishing email. Retreived from:https://www.newcmi.com/blog/tips-for-detecting-a-phishing-email |
Email phishing attacks have also
evolved to become highly sophisticated attacks. The two newest forms of
phishing attacks are spear phishing and whaling. Whereas a simple phishing
attack will target many victims, spear phishing focuses on a specific target
and whaling focus on a high-level target. In a spear phishing attack, research
is conducted on the target in order to tailor the phishing attack to that
specific target (Swinhoe, 2019). A whaling attack is when an attacker tries to
compromise a high-level target, such as the president of a company. This type
of attack requires the hacker to think beyond the traditional phishing attack
methods, because high-level targets like company executives have usually
received extensive training on traditional phishing attacks (Rapid7, n.d).
The phishing attack has also evolved
to incorporate phone calls and text messages. Vishing involves the attacker
calling the target and posing as an employee of the target’s bank or credit
card company (Drolet, 2019). The hacker can easily manipulate caller ID to
impersonate a company, only furthering the trust of the target that the hacker
is a legitimate employee of the company (Moramacro, n.d.). The hacker will use
the pretext that they believe that the targets account has been compromised and
they need the account holder to verify information about the account. This
usually involves the hacker asking the target to verify username, password, and
account number.
A Smishing attack is a phishing
attack that is done through SMS text messaging. The attacker sends a message to
the target with a malicious link hoping the target will click on the link (Drolet,
2019). The message will contain a call to action to entice the victim to click
on the malicious link that will either download virus or try to steal the
victims account credentials.
![]() |
| Smishing Messages. Retrieved from:https://www.digitaltrends.com/computing/smishing-threat-targets-phones-by-text-message/ |
Some of the statistics on phishing
shows just how successful these attacks are and how lucrative they can be.
According to a 2019 study, “[p]hishing attempts have grown 65% in the last year”
and “account for 90% of data breaches”, which resulted in a loss of twelve
billion dollars to businesses (Retruster, 2020). With the payoff of a
successful phishing attack being so lucrative, this type of attack will be
around for a while if strong security measures are not developed to thwart
these types of attacks.
Even though phishing has been
around for more than twenty years, its popularity doesn’t seem to be waning.
With the cost of entry being only internet access and time, this type of attack
will be around for a while. It will be up to cyber security professionals to
come up with new ways to prevent these types of attacks from being successful
and protect companies and individuals.
Phishing attack demonstration. Retrieved from: https://www.youtube.com/watch?v=lc7scxvKQOo
Phishing attack demonstration. Retrieved from:https://www.youtube.com/watch?v=PWVN3Rq4gzw
Sources
Drolet, M. (2019, August 9). Smishing and vishing: How
these cyber attacks work and how to
prevent them. Retrieved April 29, 2020,
from https://www.csoonline.com/article
/3411439/smishing-and-vishing-how-these-cyber-attacks-work-and-how-to-prevent-them.html
Gershwin, A. (2019, July 31). The evolution of phishing
attacks: why are they still effective?
Retrieved April
29, 2020, from https://hackernoon.com/the-evolution-of-phishing-attacks-why-are-they-still-effective-44bdb8f458c2
KnowBe4. (n.d.). History of Phishing. Retrieved April 29,
2020, from
https://www.phishing.org/history-of-phishing
Moramacro, S. (n.d.). Phishing Definition and History.
Retrieved April 29, 2020, from
https://resources.infosecinstitute.com/category/enterprise/phishing/phishing-definition-and-history/
Rapid7. (n.d.). Whaling Phishing Attacks Explained: What Is
Whaling? Retrieved April 29,
2020, from https://www.rapid7.com/fundamentals/whaling-phishing-attacks/
Retruster. (2020). Retruster. Retrieved April 29, 2020,
from https://retruster.com/blog/2019-
phishing-and-email-fraud-statistics.html
Swinhoe, D. (2019, January 21). What is spear phishing? Why
targeted email attacks are so
difficult to
stop. Retrieved April 29, 2020, from
https://www.csoonline.com/article/3334617/what-is-spear-phishing-why-targeted-email-attacks-are-so-difficult-to-stop.html
Velzian, B. (2019, August 28). AOHell - Hacking Horror Stories
- Vol.1. Retrieved April 29,
2020, from
https://www.quadrotech-it.com/blog/hacking-horror-stories-vol-1-aohell/





Comments
Post a Comment