1-833-727-4659
The Inky Difference
Domain Spoofing Detection

Domain Spoofing Detection  with Advanced Machine Learning Algorithms

Spoofed email addresses may be able to fool your users, but not Inky.

Sophisticated Email Based Attacks
Are On the Rise.

Domain spoofing can be difficult to detect for even sophisticated and cautious users. Most users trust the authenticity of the email address that they see in the “From” field of emails they receive. Or they scan briefly and may miss a single character in a domain or email address. If an email claims that it comes from the CEO, and the email address is correct, then the recipient trusts the email. However, this field in the email can be forged to make a phishing email appear to come from a legitimate source. Inky’s intelligent machine learning algorithms will catch abnormalities in text, fonts, and domain names, even if the threat has not been seen before.

Actual AI and Machine Learning

While some email protection products are claiming to use Machine Learning, Inky actually builds social graphs using Natural Language Processing (NLP) and other machine learning techniques to profile behavior of senders, their identities, and their patterns. Any email pretending to be from that sender and not matching the model is marked as suspicious, while Inky continues to learn from your feedback.

Innovative Phishing Protection

Inky’s algorithms are sophisticated and unique in this industry. Using Computer Vision, the email protection software uses a combination of techniques, sometimes “seeing” the email as a human would, and other times detecting tiny anomalies in text, characters, fonts, and logos that humans would miss. The vast database of domains used in global corporations, coupled with the machine learning behavior profiles, brings phishing protection to a highly advanced level.

Email Header Analysis

The presence, absence, and content of certain email headers can be largely consistent across a user’s communications, yet dramatically different from that of another user.  Inky analyzes the header information of a user’s emails to create a model of common contents and then compares this model against future emails to detect anomalies, which may be indications of domain spoofing.

Inky won’t be fooled by these domain spoofing techniques:

Usually, phishers impersonate an authority figure in order to take advantage of the increased probability that the recipient will follow their instructions.  Inky’s behavior profiling will mark an email as suspicious if the sender does not commonly email this person, and with a higher level of suspicion if the domain address also does not match a known profile.
Most people have a certain tone or voice that comes across in their emails.  Domain spoofers may not mimic this tone, sounding more formal or more casual than the person usually does.
Emails contain a chain of headers that track each device that an email passes through between its source and destination.  If the sender and recipient are in the same building and using the same email service, this chain of hops should be pretty short
Most people use the same email client consistently for all of their email communications.  If someone regularly uses Outlook and an email from a Gmail client claims to be from them, that’s probably cause for suspicion.

Inky supports signature verification.

The use of email signatures is the most common protection against domain spoofing attacks.  Several types of email signatures exist (including DKIM, DMARC, SPF, and Sender ID), all with the purpose of verifying that the email address actually originated at the alleged sender’s domain.

But Inky doesn’t stop with signature verification.

Signature verification only works if the alleged sender’s domain supports it.  Inky provides increased protection against domain spoofing attacks by using user behavioral profiling and email header analysis to determine if an email is stylistically and behaviorally consistent with previous emails from that sender.

 

Inky can be used with any device.

Most phishing protection software is specific to a given device or email client.  Inky integrates with an Office 365 or Microsoft Exchange server and requires no software installation on the client, meaning that it can be used anywhere.

Report Phishing Attempts from any device

A very unique feature is the ability to click a “Report this Email” link in every email, which means users can report spam, phish, and other problematic email from any device – web, phone, any email client, with no special software.  Most BEC protection software only has the capability to work from an installed instance.

Inky makes admins’ lives easy.

Inky installation can be completed in 1-2 hours and does not require software deployment to users’ machines.  Once installed, Inky provides a comprehensive dashboard allowing admins to monitor and query data about the past and current state of their phishing defenses.

Want to See Inky in Action?

See Inky in action with a free scan of your inbox or get in touch to get a demo from one of our experts.

Inky® protects your organization from advanced phishing threats and other email based attacks.

Asset

Get Inky For Office 365

Fill out the form and an Inky expert will be in touch to get you started.

Thank you for your interest in Inky Phish Fence. An expert will contact you shortly.

Asset

Get Inky For Exchange

Fill out the form and an Inky expert will be in touch to get you started.

Thank you for your interest in Inky Phish Fence. An expert will contact you shortly.

Asset

Get Inky For G Suite

Fill out the form and an Inky expert will be in touch to get you started.

Thank you for your interest in Inky Phish Fence. An expert will contact you shortly.