Half of phishing sites fool users with green padlock symbols

Seeing a padlock no longer a guarantee of security

Phishing

A padlock displayed in a browser bar is no longer a sign that a website is safe. According to reports, half of the known phishing sites display the symbol in a bid to fool victims.

In a new report by PhishLabs (via Krebs on Security), 49% of phishing websites are using SSL, up from 35% during the last quarter and 25% a year ago.

While the padlock has never meant to portray a site as safe (it just means that data exchanged between browser and website is encrypted), it has been assumed by many that the site is somehow genuine. A survey carried out by Phishlabs last year found that over 80% of people thought that the padlock meant that a website was either legitimate and/or safe, neither are true.

"The presence of the padlock does not mean the site is legitimate, nor is it any proof the site has been security-hardened against intrusion from hackers," said Brian Krebs in a report on the finding.

Advertisement
Advertisement - Article continues below

John LaCour, chief technology officer at Phishlabs told Krebs that the adoption of SSL by phishers is a good example in which fraudsters are taking their cue from legitimate sites.

"PhishLabs believes that this can be attributed to both the continued use of SSL certificates by phishers who register their own domain names and create certificates for them, as well as a general increase in SSL due to the Google Chrome browser now displaying Not secure' for web sites that do not use SSL," he said. "The bottom line is that the presence or lack of SSL doesn't tell you anything about a site's legitimacy."

Paul Bischoff, privacy advocate with Comparitech, told IT Pro that the study goes to show that there's no one way to identify a phishing website.

"Making sure the site has a valid SSL certificate indicated by HTTPS and a padlock in the URL bar is just one step. Users should also look for character replacement ("punycode"), subdomains, and other inconsistencies in a site's real URL and webpage. You can usually find the real site by Googling the company name, then check it against the suspected phishing URL. Other means of combating phishing usually deal with emails and other means of getting victims to the phishing site," he said.

Featured Resources

The IT Pro guide to Windows 10 migration

Everything you need to know for a successful transition

Download now

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Software-defined storage for dummies

Control storage costs, eliminate storage bottlenecks and solve storage management challenges

Download now

6 best practices for escaping ransomware

A complete guide to tackling ransomware attacks

Download now
Advertisement

Most Popular

Visit/operating-systems/microsoft-windows/354297/this-exploit-could-give-users-free-windows-7-updates
Microsoft Windows

This exploit could give users free Windows 7 updates beyond 2020

9 Dec 2019
Visit/security/identity-and-access-management-iam/354289/44-million-microsoft-customers-found-using
identity and access management (IAM)

44 million Microsoft customers found using compromised passwords

6 Dec 2019
Visit/cloud/microsoft-azure/354230/microsoft-not-amazon-is-going-to-win-the-cloud-wars
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Visit/hardware/354237/five-signs-that-its-time-to-retire-it-kit
Sponsored

Five signs that it’s time to retire IT kit

29 Nov 2019