Home / Industry

Q3 2011 Fraud Intelligence Report

The MarkMonitor Fraud Intelligence Report for the third quarter of 2011 is now available. The findings are:

Phishing Attacks Increase from Previous Quarter – Phish attack volume grew 7% from the previous quarter to 103,702 attacks.

Organizations Targeted Declined Again – The number of targeted organizations continued to decline, decreasing 2% from the second quarter to 488.

Attacks per Organization Returned to Growth – Attacks per organization volume increased 9% from Q2 2011 to 213.

Retail Sector Continued to Grow as a Popular Phishing Sector – Retail/Service phishing continued to increase, growing 43% to 14,572 attacks. The Financial sector continued to be the most phished industry, accounting for 44% of phish attacks, while the Payment Services sector accounted for 20%.

Social Networking Sector Returned to Growth – Social Networking sector phish increased 33% from the second quarter to 4,767 attacks and was 145% above its level from a year ago.

Phishing Attacks Increasingly Target Chinese Brands – Attacks targeting Chinese brands accounted for 14% of phishing last quarter, making China the second most popular country whose brands are targeted by phishing. American brands remained in the top spot with 56% of phishing attacks, while British brands dropped to the number three position with 12% of phishing attacks. Other important countries whose brands were targeted include Brazil, Canada, Spain, the Dominican Republic and South Africa.

Phishing Attacks Hosted in Hong Kong are the Most Popular After United States – In the third quarter, phish hosted in Hong Kong accounted for 6% of phishing attacks, while the US accounted for 54%. Canada dropped behind Hong Kong, hosting 5% of attacks. Other important countries hosting phish attacks include Germany, the UK, France, Brazil, China, Russia and Australia.

For more detail, the full report is available for download here:
MarkMonitor Fraud Intelligence Report, Q3 2011

About MarkMonitor


MarkMonitor®, the world leader in enterprise brand protection and a Thomson Reuters Intellectual Property & Science business, uses a SaaS delivery model to provide advanced technology and expertise that protects the revenues and reputations of the world's leading brands. Learn More

Related topics: Cyberattack, Cybercrime, Security

WEEKLY WRAP — Get CircleID's Weekly Summary Report by Email:

Related Blogs

The Cock and the Goat: ICANN in the Age of Horrorism

Officially Compromised Privacy

The Emotional Cost of Cybercrime

Why I Wrote 'Thinking Security'

Regulation and Reason

Related News


Industry Updates – Sponsored Posts

Verisign Mitigates More Attack Activity in Q3 2015 Than Any Other Quarter During Last Two Years

Verisign & Forrester Webinar: Defending Against Cyber Threats in Complex Hybrid-Cloud Environments

Introducing Verisign Public DNS: A Free Recursive DNS Service That Respects Your Privacy

Faster DDoS Mitigation - Introducing Verisign OpenHybrid Customer Activated Mitigation

Verisign's Q2'15 DDoS Trends: DDoS for Bitcoin Increasingly Targets Financial Industry

Protect Your Network From BYOD Malware Threats With The Verisign DNS Firewall

Announcing Verisign IntelGraph: Unprecedented Context for Cybersecurity Intelligence

The Deep Web and the Darknet - The Nether Regions of the Internet

Introducing the Verisign DNS Firewall

TLD Security, Spec 11 and Business Implications

Verisign Named to the Online Trust Alliance's 2015 Honor Roll

3 Key Steps for SMBs to Protect Their Website and Critical Internet Services

Key Considerations for Selecting a Managed DNS Provider

Verisign Mitigates More DDoS Attacks in Q1 2015 than Any Quarter in 2014

Verisign OpenHybrid for Corero and Amazon Web Services Now Available

Afilias Supports the CrypTech Project - Ambitious Hardware Encryption Effort to Protect User Privacy

Public Sector Experiences Largest Increase in DDoS Attacks (Verisign's Q4 2014 DDoS Trends)

Help Ensure the Availability and Security of Your Enterprise DNS with Verisign Recursive DNS

Verisign iDefense 2015 Cyber-Threats and Trends

What's in Your Attack Surface?

Sponsored Topics