By Yaelle Harel and Yair Herling, Technical Product Marketing

Social Phishing attacks remain the most successful methods used to execute attacks and steal data. Lookalike domains or emails are often used to mislead users to open emails, click a link, and enter their credentials or any other sensitive data. Hackers count on the trust that users have in products they regularly use and therefore they often impersonate your brand to interact with your customers and steal their data.

Figure 1 Version 2020 Data Breach Investigations Report

According to the APWG Q2 2020  Phishing Activity Trends Report, the number of phishing sites detected in the second quarter of 2020 was 146,994! In every month, ~360 brands are targeted by phishing campaigns.

Figure 2 APWG Q2 2020 Phishing Activity

Another interesting fact is that hackers are no longer targeting financial institutes only. SaaS and Webmail sites are now the biggest targets of phishing (34.7%) while Financial and Payment are second (29.8%).

Figure 3 Most Targeted Industry Sectors during Q2 2020

The COVID-19 has increased the phishing risk even more. As we reported in Check Point’s 2020 Mid-Year Report, thousands of Coronavirus-related domain names were registered, many of which would later be used for various scams. Some were used to sell fake COVID-19 vaccinations or medication, others for various phishing campaigns, and for distributing malicious mobile applications. Similar to holidays and sales events, scammers offered merchandise in “special coronavirus discounts”.

All this data sounds threating, but you probably ask yourself – Is it my responsibility to protect my customers from impersonation-bases phishing attacks using my brand?

Protecting Your Brand Integrity

Given the fact that the hackers not exploiting security vulnerabilities in your company’s website or data, you will probably be surprised to learn that most users will blame your company for their data loss, even more than the hacker [1]. In addition, the business might also pay regulations fines, for example, when a hacker successfully steals user’s sensitive data, even if the data was accessed using credentials provided by the user itself in a successful phishing attack.

Your company probably worked hard to build its brand integrity and to gain customers’ trust. You should not neglect the risk introduced by phishing attacks targeting your brand. Infinity SOC is the only solution to detect threats inside and outside the organization, providing you with a complete protection of your brand.

Infinity SOC Brand Protection

Infinity SOC alerts you when it detects a lookalike domain used to impersonate your corporate website and email domains and provides a takedown option to prevent any brand hijacking attempts.

Figure 4 Infinity SOC Brand Protection

Infinity SOC detects x3 more threats than competing solutions because of its visibility into real-time internet traffic. Unlike other solutions, Infinity SOC does not detect based on new domain registration feeds. Instead, it uses innovative technologies to analyze the domain: Advanced reputation algorithms, based on multi-source intelligence and website characteristics analysis including textual similarity, visuals, domain attributes and SSL certificates.

Infinity SOC Brand Protection leverages Check Point ThreatCloud, the most powerful threat intelligence database. ThreatCloud is continuously enriched by advanced predictive intelligence engines, data from hundreds of millions of sensors, cutting-edge research from Check Point Research and external intelligence feed. On a daily basis, ThreatCloud analyzes 10 trillion logs, 86 billion IOCs, 2.6 billion attacks and 3 billion website and files.

Figure 5 Infinity SOC “Domain Protection” Architecture

Summary

Infinity SOC is the only solution to detect threats inside and outside the organization, providing you with a complete view of the entire threat landscape. Hackers often impersonate your brand to interact with your customers and steal their data. Infinity SOC alerts you when it detects a lookalike domain used to impersonate your corporate website and email domains and provides a takedown option to prevent any brand hijacking attempts.

Don’t let your investments in Brand Integrity go down the drain. Start your Infinity SOC Free Trial Now.


[1] RSA Data Privacy and Security Survey

You may also like