Most Phishing Attacks Use Compromised Domains and Free Hosting

Read the original article: Most Phishing Attacks Use Compromised Domains and Free Hosting


To stage a phishing site, cybercriminals have several options. They can use a legitimate domain that has been compromised, they can abuse free hosting services, or they can register their own domain. Understanding the prevalence of each scenario is fundamental to detecting and mitigating these threats as early in the attack process as possible (including before they’ve been launched). PhishLabs recently analyzed more than 100,000 phishing sites to establish how many used compromised domains, free hosting, or maliciously-registered domains.  


Read the original article: Most Phishing Attacks Use Compromised Domains and Free Hosting