BE-Hacktive
HackTricksTwitterLinkedInSponsorWebsite
English
English
  • BE-Hacktive
  • About the author and the project
  • Table of contents
  • Contact
  • 🎬Synopsis
    • Technology over time
    • Cybersecurity
    • CVE
  • 🏆Eskooly - CVE
    • ESKOOLY
    • CVE-2024-27709 - SQL Injection in Eskooly Web Product v.3.0
    • ESkooly - Broken Authentication
      • CVE-2024-27710 - Privilege Escalation via Authentication Mechanism in Eskooly Web Product <= v3.0
      • CVE-2024-27711 - User Enumeration via Sign-up Process in Eskooly Web Product <= v3.0
      • CVE-2024-27712 - User Enumeration via Account Settings in Eskooly Web Product <= v3.0
    • CVE-2024-27713 - Protection mechanism Failure in Eskooly Web Product <= v3.0
    • CVE-2024-27715 - Inadequate Password Update Verification in Eskooly Web Product <= v3.0
    • CVE-2024-27716 - Cross-site Scripting (XSS) in Eskooly Web Product <= v3.0
    • CVE-2024-27717 - Cross-Site Request Forgery (CSRF) in Eskooly Web Product <= v3.0
  • 🚨Tip 1 - Raising awareness
    • Phishing
      • Phishing - Origins
      • Phishing - Evolution
      • Phishing - Statistics
      • Phishing - Techniques
      • Phishing - Protection
    • Malware
      • Malware - Origines
      • Malware - Evolution
      • Malware - Categories
      • Malware - Ransomware
    • Passwords
      • Passwords - Origins
      • Passwords - Evolution of authentication
      • Passwords - Statistics
      • Passwords - Protect yourself
  • 🧨Capsule 2 - Ethical Hacking
    • Definition and Methodology
  • 🧰Capsule 3 - Tools
    • Burp Suite
      • Installation
      • Intercept HTTP traffic with Burp Proxy
      • Define the perimeter
      • Intruder et Repeater
  • Capsule 2 - Ethical Hacking
    • Page 1
  • 📖Articles
    • Cybersecurity 2023: 5 major threats and how to protect yourself from them
    • Am I a victim of data leaks?
    • LOG4J: The vulnerable bookstore that is shaking the planet
    • LOG4SHELL: COME, SEE, LIVE
    • Protecting Your Child Online: Tips for Safer Internet Day
    • ChatGPT: Revolution or threat?
    • The FBI dismantles Raptor Train: A Chinese Botnet that Infected 260,000 IoT Devices Worldwide!
  • 🗞️News
    • Active exploitation of TP-Link, Apache and Oracle vulnerabilities detected
    • Microsoft stresses the urgency of patching Exchange servers locally
Powered by GitBook
On this page
  • Years: 2003 - 2004
  • Years: 2004 2005
  • Year: 2008
  1. Tip 1 - Raising awareness
  2. Phishing

Phishing - Evolution

PreviousPhishing - OriginsNextPhishing - Statistics

Last updated 5 months ago

Years: 2003 - 2004

In late 2003, phishers registered dozens of domains that resembled legitimate sites such as eBay and PayPal. They used e-mail programs to send fraudulent e-mails to PayPal customers. These customers were directed to hacker sites and asked to update their credit card and other credentials.

In early 2004, phishers enjoyed considerable success, particularly in attacking banking sites and their customers. Pop-up windows were used to obtain sensitive information from victims.

Years: 2004 2005

Between May 2004 and May 2005, around 1.2 million users in the USA suffered losses caused by phishing, for a total of around $929 million. Organizations lose around $2 billion a year to phishing.

Phishing is officially recognized as a fully organized part of the black market. Specialized software capable of processing phishing payments is appearing on a global scale, externalizing a huge risk. This software is used in phishing campaigns by organized criminal gangs.

Year: 2008

At the end of 2008, bitcoin and other crypto-currencies were launched. Transactions carried out using malware can now be secure and anonymous, changing the game for cybercriminals.

🚨
Phishing e-mail using Paypal's name and redirecting to a fraudulent site