On September 04, The Hacker News reported on research published by Resecurity about a phishing campaign distributed through SMS (smishing). This campaign is targeting US citizens. The key elements of these campaigns are:
Zimperium’s research team is constantly monitoring newly registered domains in order to detect those that could be used to perform phishing attacks. These domains are detected in a zero-day fashion, without any external indicator. From the reported domains in the original blog post, 85% of them were already being tracked as malicious (some of them as far as 8 days before the release of the blog). Moreover, from the remaining 15% that we haven’t seen, 50% were correctly classified by our on-device machine learning classifiers as malicious. Zero day, this gives an overall coverage for the campaign of 92.5%.
For Zimperium customers, this means that our machine learning engine is proactively stopping these links and rendering this attack completely ineffective. Moreover, this is performed without requiring any engine or heuristics database file update and is effective even for devices using our ‘on-device’ only phishing solution.