SHARE
Facebook X Pinterest WhatsApp

Tactics Used by Phishing Hackers

I write a lot about phishing scams, but rightfully so. They continue to be a popular and extremely effective way of downloading malware and getting access into networks. As long as people continue to be fooled or unable to recognize them, phishing emails will remain a popular tool for hackers. But what is it like […]

Written By
SP
Sue Poremba
Jul 27, 2017

I write a lot about phishing scams, but rightfully so. They continue to be a popular and extremely effective way of downloading malware and getting access into networks. As long as people continue to be fooled or unable to recognize them, phishing emails will remain a popular tool for hackers.

But what is it like from the hacker’s point of view? What are they doing when they get into your account? What kind of tactics are they using?

That’s what a new study from Imperva set out to discover. The researchers went undercover by creating several fake user accounts and then deployed techniques to lure in the criminals and tracked them over the span of nine months. The end result was a report detailing common patterns in phishing attacks and how hackers find and use data in compromised accounts.

According to the executive summary, some of the questions that the researchers wanted answered included: How long does it take from the time the account is hacked to exploitation of the data; how do phishers look for their targets and what type of decoys work best to lure them in; and how do hackers use security practices to hide their tracks?

Perhaps not too surprisingly, the hackers are after business data (this may explain the increase in spearphishing and whaling tactics; go after the biggest targets in a company if you want the most data). To find where that data is lurking, hackers searched for subject lines that included information like financial information or customer database.

More surprisingly, hackers don’t exploit as much information as we think. Less than half of the compromised credentials ended up used. The researchers speculated that this could be due to the overwhelming amount of data they are able to dig up and they have too much.

As for covering their tracks, an Imperva blog explained it this way:

We observed three different techniques attackers use to cover their tracks:

Delete sign-in alerts from the inbox (and permanently delete them from deleted items/trash)

Delete sent emails and failure notification messages

Mark read messages as unread

Yet, only a fraction – 17 percent – cover their tracks.

The stat that really stunned me, though, is that the attackers aren’t as quick to act as we may have thought. The general theory is that once an attack happens, time is of the essence and that information is compromised quickly. Instead, the research found more than 50 percent of the accounts were accessed 24 hours or more after the credential takeover. The result is a brief window where if the attack is suspected, a quick password change results in a 56 percent chance of preventing an account takeover.

As Itsik Mantin, head of data research at Imperva, said in a formal statement about the research:

If we can quickly detect an attack, we then know that swift remediation including a simple password change significantly reduces the odds of a successful attack. This lesson proves the value of incorporating threat-intelligence and breach detection solutions that quickly detect and help mitigate this risk.

Sue Marquette Poremba has been writing about network security since 2008. In addition to her coverage of security issues for IT Business Edge, her security articles have been published at various sites such as Forbes, Midsize Insider and Tom’s Guide. You can reach Sue via Twitter: @sueporemba

SP

Sue Poremba is freelance writer based on Central PA. She's been writing about cybersecurity and technology trends since 2008.

Recommended for you...

5G and Industrial Automation: Practical Use Cases
Kashyap Vyas
Apr 22, 2022
Understanding the Relationship Between 5G and Edge Computing
Collins Ayuya
Apr 19, 2022
Building a Private 5G Network for Your Business 
Kihara Kimachia
Apr 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.