These are sophisticated attacks, custom tailored to target a specific individual or business. The sender will impersonate a company or fellow employee using convincing tactics with personalized information, immediately instilling trust. The scammer attempts to convince your employee to send money, open attachments, click web links, or simply gain compromising information to supplement a more damaging attack in the future. Inky spots the phishing email before your business incurs damages.
The largest growing sector of email fraud attacks, BEC encompasses all manner of attacks on organizations via email. The general concept is an advanced impersonation of a CEO, co-worker, supplier, vendor, or any known associate of the business where the attacker gains funds, or company info. Inky is the smartest solution on the market today for preventing BEC attacks.
Zero Day attacks refer to new scams not yet seen or documented by security authorities. These attacks rely on novelty, meaning most systems are unable to detect these tricky methods that exploit companies for money or information. Whereas most products rely on a database of existing attackers and malicious URLs, Inky utilizes a machine learning system and computer visioning models to gain deep insight into both imagery and language, ultimately preventing these treacherous exploits.
Brand forgery refers to a family of tactics used by scammers that includes duplicating company logos, emulating stylistic details and phrasing, and spoofing sender information. These advanced phishing strategies will fool even the savviest of readers by proficiently mimicking a legitimate communication from a trusted entity. Inky’s advanced brand forgery detection looks deep inside every element of a communication including domain matching, email address discrepancies, machine generated URLs, special text characters used for XSS (cross-site scripting) attacks, and many more.
This sort of scam refers to two different manner of attacks where an attacker either impersonates a CEO (sometimes, a different high-profile user), or tricks some C-level executive into revealing sensitive information or sending money to the scammer under the false pretense of a convincing identity. Urgency is typical factor in these attacks, playing on busy schedules while relying on a sense of fabricated trust. Inky protects against these insidious impersonations by referencing behavioral profiles to alert users before they’re exploited.
Malware and ransomware capitalize on code in malicious software to obtain either information or request money from a user with fearmongering. These infections are responsible for everything from deploying keyloggers that transmit every keystroke to an attacker or, may masquerade as an authority, such as the FBI, demanding money with threats of legal consequences if the ransom isn’t paid. Inky will identify and quarantine emails with known malware attachments, preventing your business from falling victim to a scam.
By utilizing alternate characters to create slight misspellings, duplicating names to similar domains, or gaining access to an official email, attackers will appear to be someone they are not. Inky runs every communication through a multitude of algorithms to scan for an array of often imperceptible email components to warn your employees before they reply, or the message is blocked.
This is a core characteristic of most brand forgery efforts where attackers either register and use a domain close in appearance to the entity the scammer is impersonating or, removes these elements from underlying code in the message. Inky’s machine learning systems parse this code, detecting spoofed domains, even zero-day impersonations.
These attacks target a specific individual with convincing language while using a combination of a spoofed domain or email address, identifying information of a trusted contact, compelling storytelling, your company information, and a sense of urgency. Inky uses its proprietary combination of defenses to spot even the most convincing fake email.