PhishParrot: LLM-Driven Adaptive Crawling to Unveil Cloaked Phishing Sites

AI-generated keywords: Phishing attacks

AI-generated Key Points

  • Phishing attacks are evolving with cloaking techniques that challenge detection efforts
  • PhishParrot is a novel crawling environment optimization system utilizing Large Language Models (LLMs)
  • PhishParrot collects information on phishing sites, adapts browser settings, and network configurations to bypass cloaking mechanisms
  • In a 21-day evaluation, PhishParrot showed up to 33.8% improvement in detection accuracy compared to standard systems
  • PhishParrot successfully identified 91 distinct crawling environments targeted by attackers
  • Limitations include potential execution overhead from selection process and the need for successful and failed examples for reference
  • The system automatically accumulates cases of trending phishing attacks and cloaking patterns once initial examples are prepared
Also access our AI generated: Comprehensive summary, Lay summary, Blog-like article; or ask questions about this paper to our AI assistant.

Authors: Hiroki Nakano, Takashi Koide, Daiki Chiba

Accepted for publication at IEEE GLOBECOM 2025
License: CC BY 4.0

Abstract: Phishing attacks continue to evolve, with cloaking techniques posing a significant challenge to detection efforts. Cloaking allows attackers to display phishing sites only to specific users while presenting legitimate pages to security crawlers, rendering traditional detection systems ineffective. This research proposes PhishParrot, a novel crawling environment optimization system designed to counter cloaking techniques. PhishParrot leverages the contextual analysis capabilities of Large Language Models (LLMs) to identify potential patterns in crawling information, enabling the construction of optimal user profiles capable of bypassing cloaking mechanisms. The system accumulates information on phishing sites collected from diverse environments. It then adapts browser settings and network configurations to match the attacker's target user conditions based on information extracted from similar cases. A 21-day evaluation showed that PhishParrot improved detection accuracy by up to 33.8% over standard analysis systems, yielding 91 distinct crawling environments for diverse conditions targeted by attackers. The findings confirm that the combination of similar-case extraction and LLM-based context analysis is an effective approach for detecting cloaked phishing attacks.

Submitted to arXiv on 04 Aug. 2025

Ask questions about this paper to our AI assistant

You can also chat with multiple papers at once here.

AI assistant instructions?

Results of the summarizing process for the arXiv paper: 2508.02035v1

, , , , Phishing attacks are constantly evolving, with cloaking techniques presenting a significant challenge to detection efforts. These methods allow attackers to display phishing sites only to specific users while showing legitimate pages to security crawlers, making traditional detection systems ineffective. To combat this threat, a novel crawling environment optimization system called PhishParrot has been developed. This system utilizes Large Language Models (LLMs) for contextual analysis and identifies potential patterns in crawling information, allowing for the creation of optimal user profiles that can bypass cloaking mechanisms. PhishParrot works by collecting information on phishing sites from various environments and adapting browser settings and network configurations based on similar cases of targeted users. In a 21-day evaluation, PhishParrot showed a significant improvement in detection accuracy, with an increase of up to 33.8% compared to standard analysis systems. It successfully identified 91 distinct crawling environments representing different conditions targeted by attackers. While effective, PhishParrot does have some limitations. The selection process for crawling environments may introduce additional execution overhead, but this is offset by the improved phishing site detection rate. Additionally, the system requires a certain number of successful and failed examples for reference from similar attacks. However, once several hundred initial examples are prepared, PhishParrot automatically accumulates cases of trending phishing attacks and cloaking patterns. In conclusion,<Organization>s innovative approach to combating cloaked phishing attacks combines similar-case extraction and LLM-based context analysis. This research has been accepted for publication at IEEE Globecom 2025 and provides valuable insights into enhancing defenses against evolving threats in the realm of cybersecurity.
Created on 19 Aug. 2025

Assess the quality of the AI-generated content by voting

Score: 0

Why do we need votes?

Votes are used to determine whether we need to re-run our summarizing tools. If the count reaches -10, our tools can be restarted.

Similar papers summarized with our AI tools

Navigate through even more similar papers through a

tree representation

Look for similar papers (in beta version)

By clicking on the button above, our algorithm will scan all papers in our database to find the closest based on the contents of the full papers and not just on metadata. Please note that it only works for papers that we have generated summaries for and you can rerun it from time to time to get a more accurate result while our database grows.

Disclaimer: The AI-based summarization tool and virtual assistant provided on this website may not always provide accurate and complete summaries or responses. We encourage you to carefully review and evaluate the generated content to ensure its quality and relevance to your needs.