Zero Day Attacks

INKY’s proprietary machine learning algorithms detect and block malware and ransomware-laden phishing email.

What is a Zero Day Attack?

A zero day attack is an advanced offense that essentially is a ‘new’ not yet reported email scam.
Many anti-phishing software products rely on a database of signatures to stop phishing. This renders them defenseless against a phishing attack until a signature is developed and deployed. INKY is different. Each month, 1.5 million new phishing sites are created. This means that standard phishing protections like URL blacklists, are of limited utility since the number of URLs to be checked grows so rapidly. The length of time that it takes for a signature to be released for a piece of malware depends on its complexity, but typically takes 24-48 hours. Since the first victim of a phishing attack falls for it within 82 seconds, this is far too long to protect the first victims of a new phishing attack. INKY provides protection against zero-day attacks while waiting for signature-based systems to catch up.

How Does INKY Identify Zero Day Phishing Attacks?

Microsoft Office Macros

Macros are a feature of Microsoft Office that allow users to automate repetitive tasks. However, Office Macros are extremely powerful and, if allowed to execute, can install malware on a computer. Phishers will create malicious Office documents and attach them to a phishing email that convinces readers to open them and allow macros to run.

Malicious Links

Embedding links within emails is a convenient way for the sender to direct readers to their website to perform an action or receive more information.  Phishers create malicious websites that infect visitors’ computers with malware and write phishing emails that convince readers to click on a link to the malicious site.

Infected PDFs

Adobe’s Acrobat Reader is notorious for being prone to vulnerabilities that can be exploited to run code on a computer. Phishers take advantage of this by creating PDFs designed to install malware and attaching these PDFs to phishing emails.  The emails will be crafted to convince readers to open the PDF, infecting their computer.

Embedded Code

HTML emails allow more individuality in emails by including scripts and style information that enable animations and other functionality.  Phishers will include malicious scripts in phishing emails that take advantage of the opportunity to run code on the reader’s computer to install malware.

Why is INKY’s Zero Day Phishing Protection Superior?

INKY catches attacks the first time that they happen

Most anti-phishing software products use signatures of known attacks for protection, meaning that they are defenseless stop phishing until an attack has been detected and a signature is built and deployed. INKY’s approach is completely different, blocking attacks the first time with no signature needed because it seeks out abnormalities on multiple levels, from domain spoofing, brand forgery, text and character tricks, and even behavior profiling/machine learning.

INKY both protects and educates

Unlike anti-phishing software products that mark suspicious emails with a generic warning message, INKY provides details about why an email was marked as suspicious. This allows users to make an informed decision and provides effective user education by tying training to the real world.

INKY works with any email client

No matter whether you’re an Outlook traditionalist, or experimenting with the latest mobile email solutions, INKY integrates into almost any email solution. With just a click, the user can react to the warning banner right in the body of the email. This unique ease of use banner is one of our clients’ favorite features.

Report Phishing Attempts from any device

A unique feature is the ability to click a “Report this Email” link in every email, which means users can report spam, phish, and other problematic email from any device – web, phone, any email client, with no special software. Most anti-phishing software only has the capability to work from an installed instance.

Other Threats

INKY’s state of the art machine learning and AI stops these other threats.

Whaling Attacks

Inky prevents your business from falling victim to costly whaling attacks.

Business Email Compromise

INKY stops BEC attacks responsible for causing millions in losses

Spear Phishing

INKY take a different approach to spear phishing protection.

Malware & Ransomware

INKY offers state-of-the-art malware and ransomware protection.

$1.4 billion is lost to email fraud every year.

© 2019 Inky Phish Fence For Office 365. Copyright © 2017 Inky Technology Corporation is the creator of Inky® Secure Email