RSA FRAUDACTION ANTI-PHISHING SERVICE: BENEFITS OF A COMPREHENSIVE MITIGATION STRATEGY

Similar documents
Protecting Against Online Fraud. F5 EMEA Webinar August 2014

Adaptive Authentication Adapter for Citrix XenApp. Adaptive Authentication in Citrix XenApp Environments. Solution Brief

Automated Context and Incident Response

ADAPTIVE AUTHENTICATION ADAPTER FOR IBM TIVOLI. Adaptive Authentication in IBM Tivoli Environments. Solution Brief

How Enterprise Tackles Phishing. Nelson Yuen Technology Manager, Cybersecurity Microsoft Hong Kong

Adaptive Authentication Adapter for Juniper SSL VPNs. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief

Phishing Activity Trends

Vincent van Kooten, EMEA North Fraud & Risk Intelligence Specialist RSA, The Security Division of EMC

Unique Phishing Attacks (2008 vs in thousands)

Phishing Activity Trends Report October, 2004

Managed Enterprise Phishing Protection. Comprehensive protection delivered 24/7 by anti-phishing experts

Phishing Activity Trends Report August, 2005

Phishing Activity Trends Report January, 2005

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015

Phishing Activity Trends Report August, 2006

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

Phishing Activity Trends

RSA FraudAction Intelligence A DECADE OF PHISHING. November 2016

Phishing Activity Trends

FAQ. Usually appear to be sent from official address

RSA Web Threat Detection

Anti-Phishing Working Group

RSA NetWitness Suite Respond in Minutes, Not Months

Security & Phishing

Office 365 Buyers Guide: Best Practices for Securing Office 365

KASPERSKY FRAUD PREVENTION FOR ENDPOINTS

Protecting Against Online Banking Fraud with F5

ELECTRONIC BANKING & ONLINE AUTHENTICATION

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Phishing Activity Trends

Bank of america report phishing

Imperva Incapsula Website Security

Symantec Protection Suite Add-On for Hosted Security

TRUE SECURITY-AS-A-SERVICE

with Advanced Protection

RSA Fraud & Risk Intelligence Solutions

Security by Default: Enabling Transformation Through Cyber Resilience

Easy Activation Effortless web-based administration that can be activated in as little as one business day - no integration or migration necessary.

Symantec Intelligence Quarterly: Best Practices and Methodologies October - December, 2009

Your guide to the Payment Card Industry Data Security Standard (PCI DSS) banksa.com.au

Building Resilience in a Digital Enterprise

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief

Seqrite Antivirus for Server

DMARC Continuing to enable trust between brand owners and receivers

Quick Heal AntiVirus for Server. Optimized Antivirus Scanning. Low on Resources. Strong on Technology.

EBOOK. Stopping Fraud. How Proofpoint Helps Protect Your Organization from Impostors, Phishers and Other Non-Malware Threats.

The Credential Phishing Handbook. Why It Still Works and 4 Steps to Prevent It

August 2009 Report #22

NOT-FOR- PROFIT SERVICES GROUP Client Information Bulletin

2014 INTERNET COMMERCE CASE STUDY. The Battle Against Phishing and Fraudulent s. 100 S. Ellsworth Ave 4th Floor San Mateo, CA

WHITEPAPER. Protecting Against Account Takeover Based Attacks

EBOOK. Stopping Fraud. How Proofpoint Helps Protect Your Organisation from Impostors, Phishers and Other Non-Malware Threats.

Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF)

ATTIVO NETWORKS THREATDEFEND PLATFORM INTEGRATION WITH CISCO SYSTEMS PROTECTS THE NETWORK

CYBER RESILIENCE & INCIDENT RESPONSE

CYBER SECURITY RESOURCE GUIDE. Cyber Fraud Overview. Best Practices and Resources. Quick Reference Guide for Employees. Cyber Security Checklist

DIGITAL LIFE E-GUIDE. A Guide to 2013 New Year s Resolutions

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Phishing Activity Trends Report March, 2005

See how proofpoint helps you connect with confidence across all digital channels

Quick Heal Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac.

Evolution of Spear Phishing. White Paper

JPCERT/CC Incident Handling Report [January 1, March 31, 2018]

Phishing Read Behind The Lines

Protecting from Attack in Office 365

WHITE PAPER THE SOCIAL MEDIA FRAUD REVOLUTION A STUDY OF THE EXPANSION OF CYBERCRIME TO NEW PLATFORMS

ENDNOTE SECURITY OVERVIEW INCLUDING ENDNOTE DESKTOP AND ONLINE

Phishing Activity Trends Report. 3 rd Quarter Committed to Wiping Out Internet Scams and Fraud

May the (IBM) X-Force Be With You

Best Practices Guide to Electronic Banking

Kaspersky Enterprise Cybersecurity. Kaspersky Security Assessment Services. #truecybersecurity

Phishing: When is the Enemy

Phishing Activity Trends Report. 4 th Quarter Unifying the. Global Response To Cybercrime. October December 2012

PBX Fraud Information

Korea Phishing Activity Trends Report

Cybercrime and Information Security for Financial Institutions. AUSA Jared M. Strauss U.S. Attorney s Office So. District of Florida

Security Gap Analysis: Aggregrated Results

Phishing Activity Trends Report November, 2004

AKAMAI CLOUD SECURITY SOLUTIONS

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Proactive Protection Against New and Emerging Threats. Solution Brief

BRING SPEAR PHISHING PROTECTION TO THE MASSES

Introducing MVISION. Cohesive Cloud-based Management of Threat Countermeasures and Devices Leveraging Built-in Device Controls. Jon Parkes.

FFIEC CONSUMER GUIDANCE

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

Anti-Phishing Working Group

Phishing Activity Trends Report. 4 th Quarter Committed to Wiping Out Internet Scams and Fraud

Webomania Solutions Pvt. Ltd. 2017

Symantec Security Monitoring Services

THE ACCENTURE CYBER DEFENSE SOLUTION

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

Cyber security tips and self-assessment for business

TOP TEN DNS ATTACKS PROTECTING YOUR ORGANIZATION AGAINST TODAY S FAST-GROWING THREATS

Phishing in the Age of SaaS

CloudSOC and Security.cloud for Microsoft Office 365

CERTIFIED SECURE COMPUTER USER COURSE OUTLINE

ASSESSMENT LAYERED SECURITY

2017 Annual Meeting of Members and Board of Directors Meeting

Cisco Security: Advanced Threat Defense for Microsoft Office 365

Security Solutions. Overview. Business Needs

Transcription:

RSA FRAUDACTION ANTI-PHISHING SERVICE: BENEFITS OF A COMPREHENSIVE MITIGATION STRATEGY RSA CYOTA PROJECT PROPOSAL RSA FRAUDACTION ANTI-PHISHING SERVICE V.1 2011

Overview This brief highlights the benefits of the RSA FraudAction Anti-Phishing Service, which employs a highly effective, comprehensive mitigation strategy against phishing attacks. The service s extensive, pre-scanned phishing feed, early detection methods, dual manual and automated qualification procedures, its extensive blocking network, speedy shutdown routine and forensicsextraction capabilities all make RSA a worldwide leader in phishing mitigation. Why the FraudAction Anti-Phishing Service? The RSA FraudAction Anti-Phishing service ( APS ) was created by RSA in 2004 to prevent and mitigate phishing attacks that target consumers mainly for the purpose of committing financial fraud. The APS is currently provided to over 360 customers, chiefly financial institutions, located around the globe, as well as other cloud-based service companies. Since its establishment, and as of October 15, 2011, the APS has successfully shut down over 500,000 phishing attacks hosted in 185 countries around the world. Offered as an outsourced, managed 24x7x365 service, the APS allows organizations to minimize resource investment, while providing an effective, real time solution against phishing attacks immediately upon their detection. Dedicated to closely monitoring the latest trends in online fraud, the APS is supported by RSA s exclusive Anti-Fraud Command Center (AFCC), which is staffed with an experienced team of 130 fraud analysts, making it the largest anti-phishing command center in the industry. Why Deploy a Phishing Mitigation Strategy? Deploying an effective, comprehensive mitigation strategy enables financial institutions to: Decrease financial losses incurred from phishing attacks, thanks to all the practices and procedures detailed further below, namely: Shutting down phishing attacks within one of the best shutdown medians in the industry! The timely shut down of phishing attacks substantially reduces the subsequent potential losses that may be incurred by a financial institution as a result of the fraudulent utilization of compromised credentials harvested via phishing attacks. (For details, see below.) Protecting your brand s reputation, and maintaining consumer confidence in your online banking channel by blocking malicious URLs through RSA s Global FraudAction Blocking Network the largest blocking network in the industry! (For details, see below.) Reducing the fraudulent utilization of harvested credentials by shutting down phishing attack drop points. (For details, see below.) CONFIDENTIAL PAGE 2 of 5

Identifying vulnerable banking vectors through the analysis of data elements requested in phishing attacks, and taking proactive measures to reduce the vulnerability of targeted banking vectors. (For details, see below.) Dramatically reduce the duration of a phishing attack, and enjoy one of the best shutdown medians in the industry -- only 5.4 hours 1! As part of the Anti-Phishing Service, you benefit from numerous early detection mechanisms that further expedite the detection and mitigation process, and consequently further reduce phishing exposure. Early detection methods employed by RSA, include the monitoring of: Detection feeds provided by the FraudAction Detection Network Partners. RSA has partnered with leading ISPs, webmail providers, and anti-spam companies to receive feeds of pre-scanned email messages and URLs drawn from internet resources located around the globe. Prior to their delivery to RSA, these feeds are scanned and filtered according to predefined patterns that indicate that a URL or email message is used for phishing. Our detection partners include leading service providers such as Commtouch, Yahoo and AOL. The customer s Abuse Mailbox. By monitoring a customer s abuse mailbox, RSA can scan over emails and websites reported by the bank s consumers to be spam email or phishing attacks. Emails forwarded to RSA undergo an initial automated scan, which flags any suspicious cases, and emails subsequently undergo manual review by the AFCC s fraud analysts. The customer s server weblogs. The ongoing monitoring of a customer s weblogs enables RSA to detect suspicious activity related to the setting up of phishing sites before an attack goes live. As phishing attacks may pull specific page elements from the customer s genuine website (e.g. genuine graphics or CSSs), or may refer victims to the customer s genuine URL, RSA can determine whether such references are made from a live or preloaded phishing attack. In this manner, RSA can take preemptive measures, such as blocking and shutting down a phishing domain during the attack-setup stage. Known rogue servers. Servers that are known to cater to malicious operations, and host such content as Trojan infection points, phishing kits, and mule network operations are monitored for new phishing attacks; at times enabling their detection prior to the kit going online. These servers are sometimes rented out to fraudsters by facilities known as bulletproof hosting services. Drastically decrease consumer exposure to attacks through RSA s Global FraudAction Blocking Network. RSA s exclusive site blocking network comprises some of the world s leading firewall vendors, ISPs and browser developers, including Microsoft, McAfee, Commtouch, AOL, Yahoo, Checkpoint, and Radware, among others. With the cooperation of our blocking partners, RSA ensures that tens of millions of online users are prevented from accessing confirmed phishing sites, even if they click on a link within a 1 Median Shutdown time for the month of August 2011. CONFIDENTIAL PAGE 3 of 5

phishing e-mail or bogus social network message. The FraudAction Blocking Network partners are provided with near real time feeds of attacks to enable their blocking as soon as they are identified by the AFCC as being malicious. This means that phishing attacks are blocked by our partners within minutes of their detection! By blocking and shutting down phishing attacks in a timely manner, RSA limits the duration of phishing campaigns that target your financial institution s brands, and limits the accessibility of phishing attacks to potential victims. Combined, these mitigation methods protect your brands reputation and maintain consumer confidence. Prevent fraudulent utilization of access credentials thanks to RSA s forensics recovery capabilities. Technical analyses of phishing kits conducted by the APS, enable locating the drop point deployed by phishing perpetrators to collect sensitive information from their attacks. By shutting down attacks drop points, we prevent fraudsters from utilizing the fruits of their cybercriminal operation. Among others, phishing drop points may consist of directories hosted on hijacked websites, fraudsters webmail accounts, or accounts opened at online form-distribution services. Thanks to RSA s forensics-recovery capabilities, the fraudster s drop point can be identified and shut down, thus preventing or reducing subsequent fraudulent transactions that would have been performed using the harvested credentials. Identify vulnerabilities in current authentication procedures. Being able to view images taken from phishing attacks enables our customers to perform a breakdown and analysis of data elements requested in phishing attacks. This in turn can assist in identifying specific vulnerabilities in the targeted vector, and enable the customer to take proactive mitigative measures. Analyzing the data elements harvested by attacks on your brands can help your organization identify the following fraud vectors: Online banking fraud Attacks requesting basic online banking data elements E-commerce fraud Attacks requesting CVV2 data elements Telephone banking fraud Attacks requesting telephone banking passwords and other identifying information, such as the accountholder s nationality, driver s license number or various phone numbers (work/home/mobile numbers) which may further be used to spoof the accountholder s number. Multi-vector operations Attacks requesting a complete set of data elements ATM fraud Attacks requesting complete data element sets + card PIN To learn more about RSA s Anti-Phishing Service and the layered protection approach against online threats, kindly contact your FraudAction project manager. CONFIDENTIAL PAGE 4 of 5

2011 RSA Security Inc. All rights reserved. RSA, the RSA logo, and FraudAction are registered trademarks or trademarks of RSA Security Inc. in the United States and/or other countries. EMC is a registered trademark of EMC Corporation. All other products or services mentioned are trademarks of their respective owners. CONFIDENTIAL PAGE 5 of 5