Naver logo. /Courtesy of Naver

Naver has detected and blocked more than 500 phishing distribution sites targeting its services over the past 21 months.

Naver on the 30th released a casebook analyzing and summarizing phishing attacks from Jan. 2024 to September last year, and said it blocked 566 search phishing distribution sites detected by its self-developed phishing detection and monitoring system.

Naver said phishing techniques are evolving beyond the traditional spam that impersonated public agencies or highlighted "account security threats" into forms that exploit user behavior, such as search results and easy login. The company said platform-level preemptive blocking has become more important as attempts to funnel users to phishing pages through search results or to steal account information by mimicking the login screen increase. Because phishing can cause greater damage if the initial inflow is missed, blocking at the access stage is considered key.

The casebook also includes countermeasures along with the changes in attack methods. Naver collected information on easy login phishing pages with its phishing data collection module and notified partners to help remove them quickly. It also established an access blocking system by using its "Safe Browsing" feature, which blocks the moment a user tries to access a phishing site.

Naver said it has additionally developed a new phishing collection module to expand the detection scope, is providing ongoing cautions to users, and is running an awareness campaign.

※ This article has been translated by AI. Share your feedback here.