Whaling is a type of attack whereby the criminal impersonates C-level executives and higher-ranking politicians. By assimilating into a believable, trusted figure, the attacker builds rapport, usually using tricks like social engineering to encourage employees to follow directions. After the attacker believes the employees are completely comfortable, the criminal will use email to steal important information, acquire account credentials, or request a financial transfer for their personal gain, at the company’s expense.
Unlike regular phishing attacks, whaling attacks are decidedly trickier. Attackers rely on the fact employees are too busy to digest each individual element of an email, whether it’s the language or a fake domain. These rogues get through to busy employees with communications that look real, circumventing any indication of threat.
Unlike most anti-phishing software, INKY doesn’t rely on examining URLs and sender addresses to stop phishing emails. INKY’s brand forgery detection software uses Computer Vision to detect company logos and determine who the email pretends to originate from.
INKY’s true machine learning develops behavior profiles and social graphs that identify suspicious behavior or identities. When INKY sees an email from a sender that doesn’t match a known profile, it sends an impersonation warning.
Whether you’re an Outlook traditionalist, or experimenting with the latest mobile email solutions, INKY integrates into almost any email solution. With a single click, your users can react to the warning banner right in the body of the email. This unique ease of use banner is one of our clients’ favorite features.
A unique feature is the ability to click a “Report this Email” link in every email, which means users can report spam, phish, and other problematic email from any device – web, phone, any email client, with no special software. Most email protection software only has the capability to work from an installed instance.
In this report, we break down some of the critical phishing attack statistics for 2019 by aggregating information from the UK, US, Japanese, and Australian governments, tech publications and Accenture’s 2019 cost of cybercrime report.Download Report