Attack Vectors
Phishing,
Spear-phishing and Whaling
The Phishing Challenge
Phishing is one of the oldest tricks in the attacker’s playbook: an attack that leverages social engineering to obtain sensitive information. Phishing attacks leverage URLs, files, and text-based techniques to deceive their target and gain access.
Â
Many phishing attacks are getting through existing security measures as new variations are being created minute-by-minute, their resemblance to the “real-thing” is becoming more and more accurate, and modern employees simply don’t have the time to analyze every individual email they receive.
The Phishing Cyber Kill Chain
Step 1
Target Acquisition
The attacker gathers intelligence on the target, including personnel and technology data.
Step 2
Weaponize
The attacker chooses the best way to get in the organization, such as favorite payload or most exposed channel.
Step 3
Grooming &
Delivery
The attacker creates the “story” of the attack – for example, designing the message, writing a cover text, setting up the link, and more.
Step 4
Information Capture
The attacker logs the information gathered from the attack and validates the information by trying to log in using the target’s information.
Step 5
Execution
The attacker leverages the log-in details to steal money, steal information or even sell the log-in credentials themselves to other parties.
Our Anti-phishing Techonology
Perception Point has combined four layers of anti-phishing prevention, including propriety engines developed specifically to outsmart any advanced phishing attempts, and keep pace with the latest techniques:
Recursive Unpacker
Unpacks the most deeply embedded phishing attacks, even if highly concealed by the attacker.
Image-recognition engine
Propriety engine use several advanced image recognition algorithms to validate if any URL is a legitimate site.
URL Reputation
Incorporates data from the four top URL reputation engines monitoring global traffic for phishing attempts.
Threat Intelligence
Combines six different market-leading sources that leverage intelligence from external security vendors and the cyber community.
Our Advantages
#1 in Detection​
Prevention.
Not Detection
Anti-evasion capabilities
We uncover each and every file, URL, or hidden code, even if highly concealed or stored on a cloud storage platform, rendering advanced evasion techniques useless.
Holistic Coverage (Across Channels)
Deployment-ready
All our solutions are deployed in a few clicks, creating zero fuss to you and your IT team.
In-depth Insights
Our Incident Response team checks and monitors every incident to ensure the most accurate detection rates, and to reduce strain on your SOC team.
TALK TO SALES