Neutralize Phishing Threats With Web Scraping

By Special Guest
Aleksandras Sulzenko, Product Owner, Oxylabs
September 12, 2022

Identifying fraudulent emails may be easy for tech-minded professionals – but it’s not so obvious for the general public and the general workforce. At the same time, tactics used by cybercriminals to trick users into giving up sensitive financial and personal information are growing in number and sophistication. In cases where education and awareness are not enough, web scraping identifies fraudulent websites that capture sensitive user data, effectively stopping phishers in their tracks.




Millions of new users of varying ages and technical abilities are coming online each year all over the world. While many can easily recognize an online scam, fake email address, or fraudulent website, not everyone has the same skills or experience.

Some people might look at a malicious spam message and laugh before deleting it. Others take those emails very seriously and follow links to professionally produced fraudulent websites that prompt them to input critical financial and personal details.

Known widely as “phishing,” these scams are prevalent and growing in number and severity. According to the US Federal Bureau of Investigation (FBI), email wire fraud sent to company employees cost businesses $26 billion since 2016. Besides causing billions in damages, phishing harms the reputation of a company the scammers pretend to be representing, reduces trust between businesses, and compromises system cohesion.

Types of Phishing Threats

Phishing crime varies by method, however, all types generally attempt to extract credentials from users by impersonating a legitimate site. Some common forms to look out for include:

Deceptive Phishing: Deceptive phishing is the most common type of email fraud where cybercriminals impersonate a legitimate organization in order to obtain personal data or login credentials. Messages sent by phishers typically contain shortened links or legitimate URLs that redirect to a fraudulent site. All contain replicated brand logos and other company-specific marketing content.

Example: An email that appears to come from a payment processing company that states the user has received a refund, with instructions to visit a website and enter banking details.

Spear Phishing: Spear phishing is more direct and specialized than deceptive phishing. In this case, the attacker researches the victim’s personal information in advance on a social network, business directory, or industry website. Using those details, they send a customized message that contains a malicious URL that sends them to a website asking for personal data.

Example: A fraudulent message from a credit card company email customized with details obtained from a social network asking to verify login credentials and contact information.

Smishing: Smishing uses SMS messages instead of emails. Some of these messages contain links to fraudulent sites, while others attempt to force-download a malicious app that deploys ransomware to control the device.

Example: An SMS message that appears to come from a banking institution that requests the user to download an app and register for services using banking login details.

Vishing (News - Alert): Vishing is likely the most interactive form of phishing. In this scenario, an imposter uses a Voice over Internet Protocol (VoIP) server to call their victim with requests for personal information. In some cases, attackers first send an email or SMS that contains instructions to call a phone number.

Example: Victim receives a phone call and is told they have a deposit pending from a foreign country, with a request to visit a site to enter banking details.

Phishing Threats Are Growing

Phishing threats are growing, especially in the last two years. According to a report from 2020, more than 75% of respondents admit to opening emails from unknown senders, and over 50% claim these websites look more realistic than ever before.

A recent Google (News - Alert) report supports this trend, stating that the number of phishing websites increased by 350% in 2020 to 522,495 by March. In addition to typical requests for banking details, attackers used COVID-19-related content to frighten users into giving up personal information.

How Web Scraping Identifies Phishing Websites

Businesses take action to fight phishing by scanning all outgoing and incoming emails by employing proxy networks. Web scraping is an integral part of the process that extracts data from linked websites and enables analysts to determine if they are legitimate businesses.

Proxies provide anonymity, allowing cybersecurity professionals to evade detection. However, since phishers are aware they are being targeted, they routinely block IPs suspected of belonging to security companies. To address this issue, residential proxies deployed from varying locations act as an intermediary to provide anonymity and bypass geolocation restrictions. In addition to providing privacy, proxies also distribute requests and prevent server issues.

Advanced Web Crawlers Provide Increased Accuracy

Thousands of new phishing websites appear each year, targeting banking institutions, financial firms, cloud-based storage sites, and government websites. Unfortunately, existing phishing detection tools often fail to identify current threats because they depend on legacy databases of previously identified fraudulent websites.

Recent research has led to advanced web scrapers that rate the heuristics (content factors) of both genuine and illegitimate websites with increased precision. Data collected using these applications is then analyzed using a data mining tool to find patterns, report findings, and detect fraudulent websites with greater accuracy.

The phishing website detection framework is based on content-based heuristics generated from training data sets collected from active and previously detected phishing websites. Advanced web crawlers scrape relevant information from data sets, and a mining tool identifies heuristics typical to fraudulent websites. Following analysis, weights are calculated to produce a “phishing factor” that enables users to determine the probability that a website is illegitimate.

Finally, machine learning can serve as the great next step in phishing detection. Scraping produces a ton of new data every day in addition to the numerous sources already available.

Models can be trained on the labeled data that’s available in public databases. Scraping would then bring the necessary test data to see whether these ML models can perform well in real-world scenarios.

Phishing attacks are a growing threat that evades current detection techniques, defrauds users, and costs businesses billions. The good news is there are technology-driven strategies to reduce risk and avoid falling victim to these attacks.

About the author:  Aleksandras has been working at Oxylabs for more than five years. He started as an Account Manager and, during his time in a company, he managed to switch his career path to the more technical side – now, he's a Product Owner of Scraper APIs. When he's not mastering product development, you can find him creating electronic music and taking care of the mini plantation with the most exotic species of peppers!




Edited by Erik Linask
Get stories like this delivered straight to your inbox. [Free eNews Subscription]
SHARE THIS ARTICLE

Federal Communications Commission Revives Net Neutrality Regulations in 3-2 Vote

The Federal Communications Commission voted 3-2 to reinstate net neutrality rules and resume regulatory oversight of broadband internet.

Read More

Winners of the 2024 Unified Communications Product of the Year Award Announced

The Unified Communications Product of the Year Award honors the most innovative unified communications products and solutions available over the past twelve months

Read More

Windstream Wholesale Expands Network Connectivity with 2 Data Center Additions

Windstream Wholesale, a provider of advanced optical solutions, expanded into two prominent data centers, Ascent and Stack, in Alpharetta, Georgia.

Read More

Bill Dunnion Joins the Team: Mitel Appoints New CISO to Oversee Security Strategies

Mitel has announced the appointment of Bill Dunnion as Chief Information Security Officer (CISO).

Read More

Singtel Teams with Vonage to Drive Global Enterprise and Telco Innovation

Singtel announced a strategic partnership with cloud communications giant Vonage to fuel innovation and scalability for enterprises and telecommunications providers.

Read More