What is Rock Phishing and how can it be prevented?
In a Rock Phishing attack the perpetrators register a large quantity of domains. These are used to host scripting files that send and receive information from the perpetrator’s main host. Rock Phishing attacks are hosted in such a way that they can be displayed on any compromised machine controlled by the perpetrators. Advanced scripting set up by the fraudsters allows the domains to move from ISP to ISP without any human interaction. These attacks are more effective then the run-of-the-mill phishing attack due to the significant difficulties encountered when attempting to shut these domains down. ISPs cannot assist in shutting these attacks down, as they are not physically hosted on the compromised machine. Rather the machine is simply used as a drone to display the fraudulent site. BrandProtect’s primary point of contact for Rock Phishing attacks are the Registrars. Registrars have the ability to suspend the Domain Record, which effectively shuts down the attack on that domain. When