Impersonation Attacks
Stop the advanced impersonation attacks that evade existing email security and lead to security incidents, with Egress Defend and Egress Prevent.
Impersonation attacks are one of the most common phishing threats
of phishing emails contain some form of impersonation
of impersonation attacks bypass Microsoft 365 and secure email gateways (SEGs) detection
of CISOs say the threat of deepfakes keeps them awake at night
Detecting impersonation attempts is essential
Many phishing attacks use sender impersonation to socially engineer their victims by adding credibility.
Cybercriminals have evolved their email impersonation attacks to get through Microsoft 365's native security functionality and secure email gateways (SEGs). This leaves it down to individual employees to determine which emails are legitimate and which are spoofed, with a single mistake exposing organizations to credential theft, data exfiltration, and fraudulent payments.
Detecting an impersonation attack using trust and domain analysis
- 1 Sender domain analysis. The domain c0mpany.com is used to fool the recipient into thinking this is a genuine email. However, the display name matches that used by an internal user. An internal user with an external domain is treated with suspicion.
- 2 Real-time alerts highlight impersonation attacks. Based on its analysis, Egress Defend highlights to the user that this an impersonation attack sent from an individual they've had no previous contact with.
Preventing replies to impersonation attacks
- 3 Egress Prevent provides enhanced security to stop replies to impersonation attacks. Outbound emails, including replies to impersonation attacks, are inspected by Egress Prevent, with alerts that increase intervention to notify the user of the current risk. This further “nudge” will force the user to carefully consider their actions.
Join global thought leaders as they discuss the personalization of attacks and defenses in a new age for cybersecurity.
Register for Human Risk Summit 2024Cut through the noise to highlight the risks that matter
Reporting on threats such as impersonation attacks within email flows can be manual and slow. Even worse, systems can throw too much unnecessary information at you, making it harder to make timely and effective decisions.
Egress Defend and Prevent's intelligence platform provides simplified dashboards and critical insights so that administrators can quickly cut through the noise, identify email security risks and, where necessary, remediate.
Actionable intelligence
Data and analytics should not overwhelm you with information. Augmented threat intelligence into attack types, payload, and supply chain health give Security teams what they need to take decisive action that mitigate threats.
Our real-time threat feed offers insights and statistics into email details, type of attack, threat levels, authentication checks, communication history and how your people interacted with the email.
Want to know more about Egress Defend and its protection against impersonation attacks?
Greater Manchester Mental Health Trust enhances anti-phishing defenses in Microsoft 365 using Egress Defend
“We’re really pleased with Defend. We’re now detecting a broader range of advanced phishing threats, including BEC and impersonation attacks."
Featured event
HRS 2024: Handpicked by hackers: Understanding and defending against advanced persistent threats
Join Erich Kron, Security Awareness Advocate at KnowBe4, and Jack Chapman, SVP of Threat Intelligence for Egress, as they discuss how organizations and individuals are singled out by cybercriminals, and why phishing attack attribution will radically enhance defenses against these advances persistent threats.