Phishing Scams Use Cloaking to Evade Detection-New Tech Verifies Malicious Sites with Cryptographic Proof

Generated by AI AgentCoin World
Tuesday, Oct 14, 2025 12:39 am ET1min read
Speaker 1
Speaker 2
AI Podcast:Your News, Now Playing
Aime RobotAime Summary

- SEAL introduces TLS Attestations to verify phishing sites using cryptographic proofs, addressing cloaking evasion tactics that caused $400M+ in crypto losses.

- The system captures TLS sessions with a proxy and attestation server, generating tamper-evident reports without direct site access or exposing users to risk.

- Designed for researchers/defenders, it accelerates takedown of dynamic phishing kits by cryptographically binding reports to specific malicious sessions.

- While improving detection accuracy over traditional URL-based methods, adoption depends on workflow integration and doesn't prevent attacks outright.

- Backed by major crypto foundations, the tool aims to combat 1.13M+ phishing attacks in Q2 2025 alone, where crypto phishing losses reached $2.17B.

.>

Security Alliance (SEAL), a nonprofit crypto crime investigation group, has introduced and to combat phishing scams that exploited over $400 million in cryptocurrency-related losses during the first half of 2025This is the Full Title of the Second News Article[2]. The system addresses a critical gap in current phishing detection: the inability to verify whether reported malicious websites genuinely serve harmful content or use cloaking techniques to display benign pages to automated scannersThis is the Full Title of the First News Article[1].

Traditional phishing reporting relies on user-submitted URLs and hostname-based heuristics, which are vulnerable to false positives and evasion tactics like CAPTCHAs and IP-based cloakingThis is the Full Title of the First News Article[1]. SEAL's solution leverages cryptographic verification to ensure that reports reflect exactly what a user encountered. The TLS Attestations protocol creates signed, tamper-evident proofs of web content delivered during a TLS session, allowing researchers to confirm malicious activity without visiting the site directlyThis is the Full Title of the Second News Article[2].

The system operates through a and a . When a user suspects a phishing site, the proxy captures the TLS session, including the ClientHello handshake. The attestation server then mimics the user's browser, performs cryptographic operations, and signs a transcript of the session, including the server's certificate chain and observed contentThis is the Full Title of the First News Article[1]. This signed attestation becomes a , which can be shared with platform defenders or law enforcement without exposing the submitter to riskThis is the Full Title of the Second News Article[2].

SEAL emphasizes that the tool is designed for , not the average userThis is the Full Title of the Second News Article[2]. By cryptographically binding reports to specific sessions, the system reduces reliance on unverified claims and accelerates takedown efforts. For example, phishing kits that dynamically serve malicious content only to real victims-rather than scanners-can now be exposed through attested session dataThis is the Full Title of the First News Article[1].

The initiative builds on SEAL's existing tools, such as (a Telegram channel for reporting crypto crimes) and (a collaboration hub for victims and researchers). Backed by a16z Crypto, the

Foundation, and Paradigm, the nonprofit aims to strengthen defenses against a phishing landscape that saw 1.13 million attacks in Q2 2025 alone.

Despite its promise, adoption hinges on interoperability and integration with existing security workflows. Critics note that while TLS Attestations enhance evidence collection, they do not prevent phishing attacks outright but rather improve detection and response accuracyThis is the Full Title of the Second News Article[2].

.>

The technology's architecture deliberately balances privacy and efficiency. Unlike TLSNotary, which uses multi-party computation (MPC) but generates large proofs, TLS Attestations streamline the process by relying on a trusted attestation serverThis is the Full Title of the First News Article[1]. This allows high-volume verification without compromising user anonymity, as the server only accesses data necessary for attestationThis is the Full Title of the First News Article[1].

SEAL tested the system in a private beta for over a month, with plans to expand its use among researchers and defenders. The tool's impact is expected to be significant in sectors like crypto, where phishing losses accounted for $2.17 billion in H1 2025 according to Chainalysis.