Have you ever been phished? Would you know the difference between a phishing website and your bank’s legitimate website? We all hope we could identify the difference between our financial institution’s domain and a phony one. However, statistics indicate that 30 percent of phishing emails are opened. To make matters worse, more than 400,000 fraudulent sites were visited each month and more than 13,000 new phishing sites cropped up daily in 2016. Based on an internal study, IBM researchers determined that 70 percent of credentials are collected within the first hour of a phishing attack.

It is no secret that cybercriminals are dynamic in their attack methods. In the last decade, phishing has undergone a profound transformation, and fraudsters have developed sophisticated tools to gain access to unsuspecting victims’ banking information through fake emails and websites. These advanced tactics and compelling lures trick a large number of people who land on these pages. Victims often inadvertently disclose their login credentials or payment card information, making phishing a lucrative pursuit for cybercriminals.

Phishing in Troubled Waters

Financial institutions aim to keep all their customers’ information and funds safe from fraud. They often have multiple security systems, external services, and internal fraud and security teams. However, phishing attacks occur outside of online banking sessions. Most banks use phishing takedown services to try to keep pace with the growing number of attacks, but these services, while effective in taking down the threat, may take hours or days. By then, it is often too late.

Read the white paper: Adapt to new phishing threats and assess websites automatically

IBM Trusteer’s new cognitive approach, developed by IBM Trusteer Research and the IBM Cyber Security Center of Excellence at Ben-Gurion University, Israel, is incorporated in IBM Trusteer Rapport using patented machine learning and advanced analytics to monitor unstructured website data including links, images, forms, text, scripts, document object model (DOM) data, URLs and more. Sophisticated algorithms evaluate many variables, generate highly accurate threat scores that indicate which brands are under attack and separate legitimate sites from phishing traps.

Additionally, the technology learns with each interaction, giving it the ability to keep up even as phishing tactics change. When you add these new and robust features to existing analytics and other global security intelligence data, IBM Trusteer Rapport can help financial institutions protect their customers like never before.

Reel In Phishing Attacks With IBM Trusteer

But detecting a phishing site is only half the battle. When the IBM Trusteer Rapport solution identifies a suspicious site, it can rapidly notify or block the end user to help prevent the theft of credentials and payment card data.

Traditional anti-phishing takedown services are generally unable to shut a site down before it infects others, since it only takes about 82 seconds from the moment phishing attacks are launched for the first person to fall victim. Furthermore, phishing sites have a median uptime of 10 hours.

By combining machine learning and advanced phishing detection capabilities with client-based fraud protection, IBM offers a huge leap forward in the area of fraud prevention. Due to its advanced capabilities, IBM Trusteer Rapport continuously learns so it can adjust accordingly when cybercriminals change their attack methods.

There’s an easier, faster and more effective way to combat financial fraud due to phishing. To learn more about IBM Trusteer Rapport’s phishing detection solution, please contact your IBM representative or IBM Business Partner, or download the white paper, “Adapt to New Phishing Threats and Assess Websites Automatically.”

More from Fraud Protection

Kronos Malware Reemerges with Increased Functionality

The Evolution of Kronos Malware The Kronos malware is believed to have originated from the leaked source code of the Zeus malware, which was sold on the Russian underground in 2011. Kronos continued to evolve and a new variant of Kronos emerged in 2014 and was reportedly sold on the darknet for approximately $7,000. Kronos is typically used to download other malware and has historically been used by threat actors to deliver different types of malware to victims. After remaining…

How Security Teams Combat Disinformation and Misinformation

“A lie can travel halfway around the world while the truth is still putting on its shoes.” That popular quote is often attributed to Mark Twain. But since we're talking about misinformation and disinformation, you’ll be unsurprised to learn Twain never said that at all. In fact, no one knows who first strung those words together, but the idea that truth spreads slowly while lies spread quickly is at least several hundred years old. The “Twain” quote also serves to…

A View Into Web(View) Attacks in Android

James Kilner contributed to the technical editing of this blog. Nethanella Messer, Segev Fogel, Or Ben Nun and Liran Tiebloom contributed to the blog. Although in the PC realm it is common to see financial malware used in web attacks to commit fraud, in Android-based financial malware this is a new trend. Traditionally, financial malware in Android uses overlay techniques to steal victims’ credentials. In 2022, IBM Security Trusteer researchers discovered a new trend in financial mobile malware that targets…

New DOJ Team Focuses on Ransomware and Cryptocurrency Crime

While no security officer would rely on this alone, it’s good to know the U.S. Department of Justice is increasing efforts to fight cyber crime. According to a recent address in Munich by Deputy Attorney General Lisa Monaco, new efforts will focus on ransomware and cryptocurrency incidents. This makes sense since the X-Force Threat Intelligence Index 2022 named ransomware as the top attack type in 2021. What exactly is the DOJ doing to improve policing of cryptocurrency and other cyber…