said by Snowy:Sure, anything is possible but that analysis concludes with phishers not phishing for a lack of available servers.
I'd be more than leery hanging my hat on that conclusion, especially as a driving force behind the lull.
Example of what I am saying when it comes to server compromise:
Registrant:
Blare Media
5756 N. Marks Ave.
Suite 170
Fresno, California 93711
United States
»
www.relentlessmetal.com/ ··· ges/ppl/»
www.phishtank.com/phish_ ··· =1094167canonical name relentlessmetal.com.
aliases
addresses 76.74.253.47
Domain Name: RELENTLESSMETAL.COM
Registrar: WILD WEST DOMAINS, INC.
Whois Server: whois.wildwestdomains.com
Referral URL: »
www.wildwestdomains.com Name Server: NS1.GEODNS.NET
Name Server: NS2.GEODNS.NET
Status: clientDeleteProhibited
Status: clientRenewProhibited
Status: clientTransferProhibited
Status: clientUpdateProhibited
Updated Date: 14-may-2010
Creation Date: 14-may-2010
Expiration Date: 14-may-2012
»
www.fruitfairydelivers.c ··· ges/ppl/»
www.phishtank.com/phish_ ··· =1094164canonical name fruitfairydelivers.com.
aliases www.fruitfairydelivers.com
addresses 76.74.253.47
Domain Name: FRUITFAIRYDELIVERS.COM
Registrar: WILD WEST DOMAINS, INC.
Whois Server: whois.wildwestdomains.com
Referral URL: »
www.wildwestdomains.com Name Server: NS1.GEODNS.NET
Name Server: NS2.GEODNS.NET
Status: clientDeleteProhibited
Status: clientRenewProhibited
Status: clientTransferProhibited
Status: clientUpdateProhibited
Updated Date: 22-apr-2009
Creation Date: 16-apr-2009
Expiration Date: 16-apr-2011