Phishing Insights Center
At Bolster, we leverage data from our CheckPhish phishing community of security researchers worldwide to provide valuable insights into the ever-evolving threat landscape of phishing and scam attacks. By analyzing billions of data points collected from thousands of active security researchers, we equip organizations with knowledge to understand the state of phishing.
Daily Phishing Highlights
We collect a vast amount of data, including the total number of scans conducted daily, the number of total users, and the active organizations within our research community. These statistics help us gauge the scale and impact of phishing attacks worldwide and how the security community is responding.
Total Scans Daily
Total CheckPhish Users
Total CheckPhish Organizations
In-Depth Phishing and Scam Analysis
In addition to the phishing highlights, our analysis dives deeper into the specific characteristics of these scans of phishing attacks. We review and report on various aspects, including :
Total Phishing and Scam Counts
Quantifying the number of detected phishing attempts and scams provides a clear picture of the prevalent threats faced by businesses and individuals.
Phish
Scam
Total Count
Top Hosting Providers
Identifying hosting providers that unknowingly host phishing websites aids in collaboration between security teams and hosting providers to combat malicious activities.
Top Registrars
Tracking the registrars associated with phishing attacks aids in detecting and shutting down illicit domains more effectively.
Top Countries of Origin
Understanding the countries where phishing campaigns originate provides vital insight into the geographic distribution of threats.
Top-Level Domains (TLDs) Used
Recognizing the TLDs that are frequently abused by phishers helps identify potential sources of fraudulent activity.
Categories
Identifying the top categories that attacker leverage for phishing and scam campaigns can help organizations be more alert about the risk to their industry.
Top IP Addresses
Analyzing IP addresses associated with phishing attacks assists in identifying potential sources of malicious activity and blocking them proactively.
Phishing Kit Metrics
In our continuous efforts to combat phishing, we closely monitor and assess phishing kits that are part of these phishing campaigns. These numbers provide important insights into the tools and techniques employed by hackers. Our analysis covers factors such as:
Total Phishing Kits
Quantifying the number of phishing kits discovered allows us to gauge the proliferation of these malicious resources.
Unique Drop Emails
Identifying the unique drop email addresses used for phishing attacks helps in tracking the infrastructure utilized by bad actors. A “drop email” refers to the email address that is used to collect users’ secret credentials from phishing websites.
Domains with Victim Emails
Recognizing the domains where victim emails are being sent aids in the identification and mitigation of ongoing campaigns.
Stop Phishing Campaigns From Targeting You
By comprehensively analyzing these scans of phishing campaigns, we gain a deeper understanding of the latest techniques and trends of hackers. This knowledge enables us to develop effective risk mitigation and phishing countermeasures to help organizations protect themselves from the growing threat of phishing and scam attacks.