Phish Watch

Did you know that as of June 2020 there were 1,514 top level domains (TLDs)? Add to this mix simple visual replacements (like a 1 for l, 0 for 0) and you have millions of domains that can be registered that look, or sound similar to your domains. Each of these registrations has a potential to be used for phishing, damage to reputation, lost traffic and other nefarious activities.

This is just one of the features in the Phish Watch service portfolio:

Domain Hoarding

This service continuously monitors current and new TLD domains and notifies you of any new registrations. To minimize noise, we also do a reputation check on the registrations to highlight risky domains that need your immediate attention.

Phish Threat Alerts

Attacks on corporations using lookalike domains – when a phishing e-mail is sent from a domain that is one letter different from the real one. This approach on the part of the attacker turns out to be slightly more profitable than traditional spoofing, when the sender’s address is simply forged. Modern inbound authentication technologies, such as SPF, DKIM and DMARC, are fairly reliable in identifying outright forgeries. The letter from the lookalike domain contains all the necessary digital signatures and can pass filters. This is a deliberate attempt to hack into the company’s infrastructure, steal money through sending a plausible invoice, and so on.

This service looks for the huge number of similar looking and similar sounding domains and highlights these as possible phishing domains. With an integrated risk assessment capability, riskier phishing domains are extracted from the hundreds of domains that are typically found. Based on proprietary risk assessment algorithms, we report the ones you need to act against – and we also suggest possible actions you can take to mitigate phishing risks.

Fake Phishing Sites

Businesses suffer huge losses in revenue and reputation when malicious actors not only register a phishing domain, but who then create websites that look similar – as these are far more successful than just plain emails.

This service visits all websites that have been identified as possible phishing domains to verify if these are replicas. Some also have all the content replicated to drive search engine traffic away from the genuine website. This study presents you will a detailed threat report on such fake sites with recommendations on what you can do next to minimize these threats.

Request A Demo