{"id":17238,"date":"2018-04-11T08:00:05","date_gmt":"2018-04-11T12:00:05","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=17238"},"modified":"2022-04-27T16:15:24","modified_gmt":"2022-04-27T20:15:24","slug":"trusted-sites-deliver-phishing-attacks-scams","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/trusted-sites-deliver-phishing-attacks-scams\/","title":{"rendered":"Trusted Sites Actually Deliver Phishing Attacks: Here&#8217;s How"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">While it may seem that trusted sites with domain names you recognize are likely safe, they\u2019re not always what they appear to be. Hackers have discovered a vulnerability in websites that seem secure, yet what they really do is push phishing scams your way. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">The best way to protect from such an attack is using an all-purpose online safety app such as <\/span><a href=\"https:\/\/app.appsflyer.com\/com.psafe.msuite?pid=Blog&amp;c=Trusted_Sites_Deliver_Phishing Attacks\"><span style=\"font-weight: 400;\">\u00a0dfndr security<\/span><\/a><span style=\"font-weight: 400;\">, which is packed with antivirus and anti-phishing detection to guard your Android phone against hacker threats.<\/span><\/p>\n<p><b>Read More: <\/b><a href=\"https:\/\/www.psafe.com\/en\/blog\/5-phishing-clues-to-look-for-in-emails\/\"><b>5 Phishing Clues to Look for in Emails from Your Contacts<\/b><\/a><\/p>\n<p><span style=\"font-weight: 400;\">The more you know how these phishing scams are perpetrated, the better prepared you\u2019ll be for a potential attack. Here\u2019s what you should know.<\/span><\/p>\n<p><b>More Than \u2153 of Trusted Sites May Be Vulnerable<br \/>\n<\/b><span style=\"font-weight: 400;\">A recent study<\/span><span style=\"font-weight: 400;\">\u00a0discovered that out of the top 100,000 sites based on Alexa\u2019s rankings, 42% may be at risk of being hacked. The software used for these sites are not always fully secure, paving the way for hackers to take advantage. The study also found 80,000 phishing sites in 2017, 80,000 of which are reportedly secure.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The vulnerabilities may appear on all sorts of websites, but the most popular targets are business sites, as well as adult and pornography domain names. Other websites that may be compromised include uncategorized sites, parked sites, shopping outlets, gambling hotspots, news, and media domain names, as well as personal blogs.<\/span><\/p>\n<p><b>The Character Conversion Vulnerability<br \/>\n<\/b><span style=\"font-weight: 400;\">One sign of security that we all know about is websites that use the https:\/\/ prefix, along with the little green padlock that touts a website as being secure. However, hackers are able to <\/span><a href=\"https:\/\/www.wired.com\/2017\/04\/sneaky-exploit-allows-phishing-attacks-sites-look-secure\/\"><span style=\"font-weight: 400;\">exploit a vulnerability<\/span><\/a><span style=\"font-weight: 400;\"> that can make a fraudulent site mimic the exact appearance of a real website, especially when it comes to websites that don\u2019t use the Latin alphabet.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Common targets are domain names that use Chinese characters or Cyrillic. English-based browsers have to convert these characters into English using Punycode, which translates them. It\u2019s through this conversion process that cybercriminals thrive and \u201cbreak-in\u201d within this process.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Internet users believe that they are opening a familiar domain name, even though they are taken to a different URL and web server. Following this process, phishing scams are pushed take over by asking you for personal information that can later be used for criminal purposes.<\/span><\/p>\n<p><b>How to Avoid These<br \/>\n<\/b><span style=\"font-weight: 400;\">Always be cautious of any website that asks for personal information and always\u00a0update your browser regularly since updates usually fix vulnerabilities and bugs. Take a close look at the link address for extra words that seem out of place for a trusted site and scan any information once the site has loaded for anything out of the ordinary. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Ultimately, the best way to avoid falling prey to a phishing scam that appears to be legitimate is by getting a security app that flags these threats for you.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hackers can take advantage of a vulnerability on websites and are aiming straight at victims with phishing scams. <\/p>\n","protected":false},"author":83,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[5],"tags":[53,358,249,223],"class_list":["post-17238","post","type-post","status-publish","format-standard","hentry","category-security","tag-internet","tag-protection","tag-security","tag-tips"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/17238","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=17238"}],"version-history":[{"count":5,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/17238\/revisions"}],"predecessor-version":[{"id":17951,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/17238\/revisions\/17951"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=17238"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=17238"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=17238"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}