Phishing scams are more advanced and widespread than ever, and threat actors are becoming increasingly sophisticated in their ability to craft malicious websites that look legitimate to unsuspecting users — including your employees, who have the kind of restricted access to enterprise data that cybercriminals covet most.

Traditionally, organizations have taken the blacklist approach: A security service provider rates domains based on reputation and a browser extension uses this data to block phishing websites. However, this approach can quickly devolve into a cat-and-mouse game, since the blacklist would only include domains that are actively hosting malicious content. In other words, this method isn’t effective until after victims are already infected.

Spot Phishing Scams Before They Cast Their Bait

IBM Research in Tokyo and IBM X-Force developed a more advanced approach to protecting users from malicious domains called ahead-of-threat detection. This unique method enables security teams to detect potentially malicious domains and actors before the actual threat becomes visible.

To demonstrate how to stay one step ahead of phishing websites with ahead-of-threat detection, let’s take a phishing site, for example. Figure 1 shows the typical life cycle of a malicious domain. In many cases, phishing domains are generated by replacing a single character in a popular domain with another similar-looking or easy-to-mistype character. Then there are domain generation alorithms, such as homograph domains and combosquatting and typosquatting domains.

Figure 1: Malicious domain life cycle

However they’re generated, bad actors register these domains to host phishing websites. Ahead-of-threat detection can identify potentially malicious domains at the time of registration or at the very early stages of domain activation.

How Does Ahead-of-Threat Detection Identify Phishing Websites?

Ahead-of-threat detection pulls in numerous pools of data. One of the most important is the ICANN WHOIS database, which includes information about domain registrars, such as names, phone numbers and addresses. Although WHOIS is anonymized by a guard service that protects registrants’ more detailed personal information, it is one of the primary sources of data by which to evaluate a domain’s maliciousness via ahead-of-threat detection.

Another key metric is image comparison. Phishing sites nowadays tend to look nearly identical to legitimate websites. Therefore, if a domain hosts a site that looks similar to that of a bank or other service, ahead-of-threat detection will raise a red flag.

What Does Ahead-of-Threat Detection Look Like in Practice?

We deployed our architecture in the real world in the form of Quad9, a free service IBM launched in collaboration with Packet Clearing House (PCH) and the Global Cyber Alliance (GCA) to deliver greater online privacy and security protection to consumers and businesses. Quad 9 provides a stream of newly observed response tuples, or Unique DNS Record (UDR), that contains only the response domain, query type and response record. This stream of around 1 million UDR records per day is condensed from the Quad9 systems operating in 76 countries and 128 locations.

Combining multiple results from these analytics can filter a limited number of potentially malicious domains from massive amount of incoming domains. In our experiment, we filtered more than 17 million domains to identify only about 10 malicious ones, including phishing sites masquerading as cryptocurrency exchanges, insurance sites, online banking portals and more. Most of these sites eluded the detection of traditional browser protection; in other words, they were detected ahead of the threat! It wasn’t until weeks later that many of these sites landed on traditional domain blacklists.

Ahead-of-threat detection can help security teams protect their users — and, by proxy, their enterprise data — proactively. It also has the potential to change the game for consumers, who traditionally use tools capable of identifying malicious sites only after they are accessed.

As the risk of phishing escalates and threat actors grow more and more cunning, ahead-of-threat protection can help security professionals discover how to stay one step ahead of phishing websites — literally.

More from Fraud Protection

PixPirate: The Brazilian financial malware you can’t see

10 min read - Malicious software always aims to stay hidden, making itself invisible so the victims can’t detect it. The constantly mutating PixPirate malware has taken that strategy to a new extreme. PixPirate is a sophisticated financial remote access trojan (RAT) malware that heavily utilizes anti-research techniques. This malware’s infection vector is based on two malicious apps: a downloader and a droppee. Operating together, these two apps communicate with each other to execute the fraud. So far, IBM Trusteer researchers have observed this…

New Fakext malware targets Latin American banks

6 min read - This article was made possible thanks to contributions from Itzhak Chimino, Michael Gal and Liran Tiebloom. Browser extensions have become integral to our online experience. From productivity tools to entertainment add-ons, these small software modules offer customized features to suit individual preferences. Unfortunately, extensions can prove useful to malicious actors as well. Capitalizing on the favorable characteristics of an add-on, an attacker can leverage attributes like persistence, seamless installation, elevated privileges and unencrypted data exposure to distribute and operate banking…

From federation to fabric: IAM’s evolution

15 min read - In the modern day, we’ve come to expect that our various applications can share our identity information with one another. Most of our core systems federate seamlessly and bi-directionally. This means that you can quite easily register and log in to a given service with the user account from another service or even invert that process (technically possible, not always advisable). But what is the next step in our evolution towards greater interoperability between our applications, services and systems?Identity and…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today