North American Private Equity Firm Stops HR-Spoofing Cyber-Attack With Darktrace AI
The company, which manages over 150 restaurants across the US, was trialling
The attack, which slipped past the company's existing security controls, started when an employee received an email appearing to originate from internal 'HR'. The email had been carefully designed to look like a SharePoint Microsoft document and was titled 'Q3 Commission 2021 and Agenda', an attempt to induce the recipient into clicking on a malicious link.
Detecting that the IP address of the email was unusual, Darktrace AI identified this as spoofing activity and further investigation suggested it was part of a wider trend of targeted phishing campaigns at the time which used fake Microsoft branding. These attacks are often launched with the intention of causing operational disruption or conducting IP and financial theft.
The company's security team were alerted and issued company-wide warnings about the attack, averting a crisis. Had Antigena Email been deployed in fully autonomous mode, it would have double-locked the malicious links to ensure they were not clickable.
"Email impersonation attacks have been on the rise for a number of years – these are hyper-realistic 'digital fakes' that expertly mimic the writing style of trusted contacts, colleagues, and suppliers," commented
About
Media Contacts
Brands2Life (
+44 (0) 7983 857952
darktrace@brands2life.com
+1 419 350 4614
darktrace@commstrat.com
|
|
