Domain Spoofing Icon

Domain Spoofing

Spoofed email addresses may be able to fool your users, but not INKY.

Demo INKY Today

What is domain spoofing?

Sophisticated Email Based Attacks Are on the Rise

Domain spoofing can be difficult to detect for even sophisticated and cautious users. Most users trust the authenticity of the email address that they see in the “From” field of emails they receive. Or they scan briefly and may miss a single character in a domain or email address. If an email claims that it comes from the CEO, and the email address is correct, then the recipient trusts the email. However, this field in the email can be forged to make a phishing email appear to come from a legitimate source. INKY’s intelligent machine learning algorithms prevent spoofing by catching abnormalities in text, fonts, and domain names, even if the threat has not been seen before.

Pandora_1

How Does INKY Prevent Spoofing?

Actual Artificial Intelligence and Machine Learning

While some phishing protections products are claiming to use Machine Learning, INKY actually builds social graphs using Natural Language Processing (NLP) and other machine learning techniques to profile behavior of senders, their identities, and their patterns. Any email pretending to be from that sender and not matching the model is marked as suspicious, while INKY continues to learn from your feedback.

Innovative Phishing Protection

INKY’s algorithms are sophisticated and unique in this industry. Using Computer Vision, the email protection software uses a combination of techniques, “seeing” the email as a human would. Other times INKY detects tiny anomalies in text, characters, fonts, and logos that humans would miss. The vast database of domains used in global corporations, coupled with the machine learning behavior profiles, brings phishing protection to a highly advanced level.

Email Header Analysis

The presence, absence, and content of certain email headers can be largely consistent across a user’s communications, yet dramatically different from that of another user. INKY analyzes the header information of a user’s emails to create a model of common contents and then compares this model against future emails to detect anomalies, which may be indications of domain spoofing.

What makes INKY different?

 

INKY supports signature verification.

The use of email signatures is the most common protection against domain spoofing attacks. Several types of email signatures exist (including DKIM, DMARC, SPF, and Sender ID), all with the purpose of verifying that the email address actually originated at the alleged sender’s domain.

Whale-1
BrandImpersonation0

But INKY doesn’t stop with signature verification.

Signature verification only works if the alleged sender’s domain supports it. INKY provides increased protection against domain spoofing attacks by using user behavioral profiling and email header analysis to determine if an email is stylistically and behaviorally consistent with previous emails from that sender.

INKY can be used with any device.

Most anti-spoofing and phishing protection software is specific to a given device or email client. INKY integrates with an Office 365 or Microsoft Exchange server and requires no software installation on the client, meaning that it can be used anywhere.

Asset-2@4x
Asset-10-1

Report phishing attempts from any device.

A unique feature is the ability to click a “Report this Email” link in every email, which means users can report spam, phish, and other problematic emails from any device – web, phone, any email client, with no special software. Most email protection software only has the capability to work from an installed instance.

Guide to Surviving Email Fraud

The best way to manage the email fraud crisis is to prevent it completely. Download this free guide to gain some security strategies to prevent and recover from email fraud.

IT Guide for Securing Email Get Protected Today