Detection and takedown of counterfeit websites

bg

Digital risks come in various forms, ranging from the common to the extraordinary.

Various Types of Digital Risks

  In this era of technological advancement, the internet has become an essential part of everyone's life. We frequently access information online and store our data on various platforms, but there are actually various risky behaviors associated with these activities.

Phishing


  • Website phishing
  • Rogue Mobile APP
  • Social media impersonation
  • VIP impersonation
  • Email phishing

Data Breach


  • Document leakage
  • Source code leakage
  • Business data leakage

Anti-piracy


  • Film and television
  • Music
  • Novels
  • Sports events
  • E-Games

Domain Risks


  • Similar domain names
  • Expired domain names
  • Domain name disputes
  • Overdue domain name abuse

Misreporting


  • Website misreporting
  • App misreporting
  • IP misreporting
  • Domain name misreporting

Dark Web Intelligence


  • Data breaches
  • Source code leakage
  • Hacking campaign
  • Infringement and Fraud

Ransomware response


  • Threat attribution
  • DRP awareness training
  • Ransomware response
  • Offline assistant
  • Asset recovery

We Provides Customers with Managed DRP Services

Identification

  Understand the organization's operations (including missions, functions, image, or reputation), organizational assets, and individual cybersecurity risks; identify and manage enterprise asset elements and their importance to business objectives; and use them to support operational risk decisions.

Recovery

  Coordinate recovery activities with internal and external parties, execute and maintain recovery processes and procedures, and ensure timely recovery of systems or assets affected by cybersecurity incidents. Learn from experience and incorporate lessons learned into future improvements to recovery plans and processes.

Detection

  Comprehensively monitor enterprises' information, assets, and digital footprint to identify cybersecurity incidents and abnormal activities, understand the potential impact of incidents, evaluate and provide feedback on the level of event risk.

Response

  Execute response processes and procedures to prevent event escalation, mitigate event impact, and eliminate events; communicate and coordinate with internal and external stakeholders as appropriate for event activities, including seeking external support such as law enforcement agencies.

DRP Service Overview

Insightful

  • 24/7 global digital risk monitoring
  • Coverage of over 10 digital risk scenarios
  • Coverage of hundreds of mainstream online platforms
  • Professional technical analysis and threat analysis
  • Accurate alerts reporting

Efficient

  • 90% of phishing fraud can be takedown within 24 hours
  • 90% of brand infringement can be takedown within 72 hours
  • 70% of misreported can be corrected within 7 working days
  • 80% of data leaks can be eliminated within 72 hours

Global

  • Global support, no matter where the customer is located
  • Global action, no matter where the risks are hidden.

Managed Services

  • Comprehensive emergency response to various risks
  • Multilingual communication
  • Legal services and support
  • 24-hour self-service SaaS platform.

AI Multi-dimensional detection of digital risks to form an information Security Service System

Newly registered domain names for monitoring and analysis

Monitor newly registered domain names around the world, automatically compare (including fuzzy comparison) suspicious domain names through machine learning technology, and perform risk assessments on them. Notify active phishing domains ( brands Party) to processing, continuous monitoring of inactive but suspicious domain names.

Distributed web crawler

The search system is mainly used for preliminary screening and labeling of risk data. The underlying distributed architecture uses Kubernetes to implement automatic search of cross-platform host clusters based on Docker, and uses the cluster to monitor and allocate resources to resource sets. At the same time, for websites restricted by IP addresses, a springboard model based on IP addresses has been established to effectively prevent phishing scams and fraud techniques.

Search engine integration Detection

Integrate the search capabilities of mainstream search engines such as Google and Yahoo to ensure more comprehensive and accurate search results. Technically, MD5 hash value is used to ensure the accuracy and completeness of the comparison and achieve load balancing.

Directional platform Detection

Different types of counterfeit assets have different degrees of dependence on the platform. For example, counterfeit APP assets are often attached to APP stores. In view of this feature, on the basis of other detection methods, more than 5,000 app platforms at home and abroad are scanned and detected, and newly added APP stores are continuously monitored, and suspicious assets are evaluated from multiple dimensions to quickly anomalies are found.

Image recognition Ability

Model the image features of counterfeit assets and compare them with automatic screenshots of suspicious assets to score suspicious assets based on the risk assessment algorithm.