Anti-Phishing

VIDEOS

6 Common Phishing Detection Evasion Techniques Solved By VISUA

See Transcript

[00:00:04.430]
Cybersecurity platforms are in an arms race with bad actors who will use every trick possible to avoid detection. Here are the six most common detection evasion techniques and how Visual-AI can help to detect the undetectable.

[00:00:19.670]
Fake websites used to last days or hours, but bad actors switched gears to use short-life and single use URLs. After all, you can’t blacklist a website that only lasts minutes or less.

[00:00:33.270]
Bad actors will add noise to the code of an email or website to confuse and overwhelm detection systems. They’ll even take key imagery, split it into many small parts, and reassemble it using CSS or JavaScript.

[00:00:47.790]
Using genuine links and reply-to’s in fake emails or sites are also great for fooling detection systems.

[00:00:55.770]
You can’t detect what you can’t see, so bad actors will convert trigger words, sentences, a form or entire page into graphics to make it invisible to detection systems.

[00:01:07.740]
Bad actors will also use obfuscated JavaScript and web assembly to dynamically generate content and block HTML parsers.

[00:01:16.980]
Another great way to confuse users and detection systems alike is to drive victims to genuine sites, but trigger a fake form to open in a window above the legitimate form.

[00:01:29.010]
Visual-AI provides a new way to detect and block phishing emails and websites.

[00:01:36.030]
Visual-AI sees all content with human eyes, but at machine speed, so it’s fast and bad actors can’t avoid it.

[00:01:45.000]
It delivers super effective phishing detection in three simple steps.

[00:01:50.430]
Step one, render the web page or email, save it as a flattened image and send it to our engine for processing.

[00:01:58.650]
Step two, high risk elements or attributes are identified and flagged.

[00:02:04.830]
Step three, a risk score is calculated and passed with the identified anomalies back to the master fishing detection system for final actions. And all this happens in real time.

[00:02:18.210]
You too could harness the power, speed and accuracy of Visual-AI in your fishing detection platform test it today, and see how Visual-AI could enhance your platform.

 

Cybersecurity platforms are in an arms with Bad Actors who’ll use every trick possible to avoid detection.

This video looks at these evasion techniques that exploit visual elements in order to understand how they are used to slip through the net, despite the impressive technology being used in the cybersecurity industry to bring them to block them.

It also highlights how Computer Vision (Visual-AI) can detect these threats and how VISUA has packaged it for ease of deployment.

RELATED

BLOG BLOG
How Visual Search is Used in Anti-Phishing

Reading Time: 2 minutes Visual Search in Phishing Protection – an effective combination Visual search is a powerful piece of computer vision technology that can enhance […]

Anti-Phishing
BLOG BLOG
How Object Detection is Used in Anti-Phishing

Reading Time: 3 minutes Object Detection plays an important role in phishing protection We have discussed previously how logo detection and text detection work with anti-phishing […]

Anti-Phishing
BLOG BLOG
How Text Detection Is Used In Phishing Protection

Reading Time: 4 minutes Text Detection in Phishing Protection has become an essential asset  When we were approached by a cybersecurity company to discuss how our […]

Anti-Phishing

Trusted by the world's leading platforms, marketplaces and agencies

Integrate Visual-AI Into Your Platform

Seamlessly integrating our API is quick and easy, and if you have questions, there are real people here to help. So start today; complete the contact form and our team will get straight back to you.

  • This field is for validation purposes and should be left unchanged.