SlideShare ist ein Scribd-Unternehmen logo
1 von 1
Downloaden Sie, um offline zu lesen
Use Case
Mobile Application Detected Impersonating Company Brand
www.digitalshadows.com
With Digital Shadows SearchLight™, the IT
Manager of a retailer discovered a mobile
application impersonating their brand on a
mobile app store. The company, who did not
have their own mobile application, needed to
know the risk this mobile application posed to
their customers.
The use of copyrighted branding and terms had the potential to mislead customers into believing
the application was legitimate. If these customers fell victim to phishing or social engineering, this
had the potential to impact the company’s reputation and revenue.
ight™, the IT Manager of a retailer
n impersonating their brand on a mobile
did not have their own mobile application,
mobile application posed to their customers.
ng and terms had the potential to mislead
pplication was legitimate. If these
ng or social engineering, this had the
ny’s reputation and revenue.
ting Company Brand
hLightTM
etected
toring official and third party mobile application stores for references to the company’s
g, Digital Shadows SearchLight™ detected a potentially malicious app impersonating their
t Reviews and Adds Context
hadows analysis of this app in a sandbox environment identified behavior or attributes
e indicative of spyware that could steal sensitive information such as documents, videos
credentials. The company was provided with an overview of this analysis, alongside
ed screenshots, IP ranges, domain names, and developer details.
anaged
s context, the company used Digital Shadows Managed Takedown Service to remove the
Mobile App Stores Search Engines Forums RSS Feeds Network Infrastructure Domain Registrations IRC Closed Forums Tor I2P
U.S. Headquarters Digital Shadows, Inc.
332 Pine Street, Suite 600
San Francisco, CA 94104
North American Intelligence Operations Hub
5307 E. Mockingbird Ln.
Suite 915
Dallas, TX 75206
UK Headquarters Digital Shadows, Ltd.
Level 39
One Canada Square
London E14 5AB
Overview
With Digital Shadows SearchLight™, the IT Manager of a retailer
discovered a mobile application impersonating their brand on a mobile
app store. The company, who did not have their own mobile application,
needed to know the risk this mobile application posed to their customers.
The use of copyrighted branding and terms had the potential to mislead
customers into believing the application was legitimate. If these
customers fell victim to phishing or social engineering, this had the
potential to impact the company’s reputation and revenue.
Mobile Application Detected
Impersonating Company Brand
Digital Shadows SearchLightTM
What We Did
Risk Detected
By monitoring official and third party mobile application stores for references to the company’s
branding, Digital Shadows SearchLight™ detected a potentially malicious app impersonating their
brand.
Analyst Reviews and Adds Context
Digital Shadows analysis of this app in a sandbox environment identified behavior or attributes
that were indicative of spyware that could steal sensitive information such as documents, videos
or login credentials. The company was provided with an overview of this analysis, alongside
associated screenshots, IP ranges, domain names, and developer details.
Risk Managed
With this context, the company used Digital Shadows Managed Takedown Service to remove the
mobile application from the store and successfully reduce the risk to their customers.
Retail Vertical
Code-sharing Paste Sites Social Media Mobile App Stores Search Engines Forums RSS Feeds Network Infrastructure Domain Registrations IRC Closed Forums Tor I2P
About Digital Shadows
Digital Shadows monitors and manages an
organization’s digital risk across the widest range of data
sources within the visible, deep, and dark web to protect
an organization’s business, brand, and reputation.
www.digitalshadows.com
info@digitalshadows.com
+1-888-889-4143 | +44 203 393 7001
About Digital Shadows
Digital Shadows enables organizations to manage digital risk by identifying and eliminating threats to their business
and brand. We monitor for digital risk across the broadest range of data sources within the open, deep and dark web
to deliver tailored threat intelligence, context and actionable remediation options that enable security teams to be
more effective and efficient. Our clients can focus on growing their core business knowing that they are protected if
their data is exposed, employees and third parties put them at risk, or their brand is being misused. To learn more,
visit www.digitalshadows.com.
Email: info@digitalshadows.com
U.S. Headquarters
Widest Collection of Sources
SearchLight monitors for data exposure across the widest
range of sources, within the open, deep and dark web.
No stone is left unturned.
Tailored and Targeted Collection
A register of key assets that uniquely define your organization
and your subsidiaries drives our intelligence machinery.
Why Digital Shadows Get Started
For more information on
Digital Shadows SearchLightTM
and
how we can help protect your
organization from Data Exposure,
please contact us
Visit www.digitalshadows.com
for more information
Call us at US 1-800-889-4143
UK +44 (0)203 393 7001
Email info@digitalshadows.com
Analyst
Added Context
Digital Shadows
intelligence analysts
investigate and add
context, impact and
recommended action.
Asset Registration
Organizations register
their company assets
with Digital Shadows,
including code samples,
document markings and
email footers.
Explore View
Organizations can view
the credential exposure
at a strategic level,
identifying trends over
time.
Mitigation Options
Each incident comes with a severity level and mitigation
options. We also offer Managed Takedown Service, which
provides end-to-end management for shutting down
malicious activity and offloading this time consuming task
from your team.
About Digital Shadows Digital Shadows monitors and manages digital risk across the widest range of data sources
within the open, deep and dark web to protect an organization’s business, brand and
reputation. The Digital Shadows SearchLightTM
service combines scalable data analytics with
intelligence analysts to manage and mitigate risks of an organization’s cyber threat, data
exposure, brand exposure, VIP exposure, infrastructure exposure, physical threat, and third
party risk, and create an up-to-the-minute view of an organization’s digital risk with tailored
threat intelligence. The company is jointly headquartered in London and San Francisco.
For more information, visit www.digitalshadows.com.
Data Exposure Example
Call us at 1-888-889-4143
UK +44 (0)203 393 7001
U.S. Headquarters
Digital Shadows, Inc. North American Intelligence Operations Hub
UK Headquarters
Widest Collection of Sources
SearchLight monitors for data exposure across the widest
range of sources, within the open, deep and dark web.
No stone is left unturned.
Tailored and Targeted Collection
A register of key assets that uniquely define your organization
and your subsidiaries drives our intelligence machinery.
Why Digital Shadows Get Started
For more information on
Digital Shadows SearchLightTM
and
how we can help protect your
organization from Data Exposure,
please contact us
Visit www.digitalshadows.com
for more information
Call us at US 1-800-889-4143
UK +44 (0)203 393 7001
Email info@digitalshadows.com
Analyst
Added Context
Digital Shadows
intelligence analysts
investigate and add
context, impact and
recommended action.
Asset Registration
Organizations register
their company assets
with Digital Shadows,
including code samples,
document markings and
email footers.
Explore View
Organizations can view
the credential exposure
at a strategic level,
identifying trends over
time.
Mitigation Options
Each incident comes with a severity level and mitigation
options. We also offer Managed Takedown Service, which
provides end-to-end management for shutting down
malicious activity and offloading this time consuming task
from your team.
About Digital Shadows Digital Shadows monitors and manages digital risk across the widest range of data sources
within the open, deep and dark web to protect an organization’s business, brand and
reputation. The Digital Shadows SearchLightTM
service combines scalable data analytics with
intelligence analysts to manage and mitigate risks of an organization’s cyber threat, data
exposure, brand exposure, VIP exposure, infrastructure exposure, physical threat, and third
party risk, and create an up-to-the-minute view of an organization’s digital risk with tailored
threat intelligence. The company is jointly headquartered in London and San Francisco.
For more information, visit www.digitalshadows.com.
Data Exposure Example
www.digitalshadows.com
U.S. Headquarters
Digital Shadows, Inc.
332 Pine Street, Suite 600
San Francisco, CA 94104
North American Intelligence Operations Hub
5307 E. Mockingbird Ln.
Suite 915
UK Headquarters
Digital Shadows, Ltd.
Level 39
One Canada Square
Widest Collection of Sources
SearchLight monitors for data exposure across the widest
range of sources, within the open, deep and dark web.
No stone is left unturned.
Tailored and Targeted Collection
A register of key assets that uniquely define your organization
and your subsidiaries drives our intelligence machinery.
Why Digital Shadows Get Started
For more information on
Digital Shadows SearchLightTM
and
how we can help protect your
organization from Data Exposure,
please contact us
Visit www.digitalshadows.com
for more information
Call us at US 1-800-889-4143
UK +44 (0)203 393 7001
Email info@digitalshadows.com
Analyst
Added Context
Digital Shadows
intelligence analysts
investigate and add
context, impact and
recommended action.
Asset Registration
Organizations register
their company assets
with Digital Shadows,
including code samples,
document markings and
email footers.
Explore View
Organizations can view
the credential exposure
at a strategic level,
identifying trends over
time.
Mitigation Options
Each incident comes with a severity level and mitigation
options. We also offer Managed Takedown Service, which
provides end-to-end management for shutting down
malicious activity and offloading this time consuming task
from your team.
About Digital Shadows Digital Shadows monitors and manages digital risk across the widest range of data sources
within the open, deep and dark web to protect an organization’s business, brand and
reputation. The Digital Shadows SearchLightTM
service combines scalable data analytics with
intelligence analysts to manage and mitigate risks of an organization’s cyber threat, data
exposure, brand exposure, VIP exposure, infrastructure exposure, physical threat, and third
party risk, and create an up-to-the-minute view of an organization’s digital risk with tailored
threat intelligence. The company is jointly headquartered in London and San Francisco.
For more information, visit www.digitalshadows.com.
Data Exposure Example
Digital Shadows SearchLight™ What We Did

Weitere ähnliche Inhalte

Was ist angesagt?

Forrester-Wave-Digital_Risk_Monitoring-Q3-2016
Forrester-Wave-Digital_Risk_Monitoring-Q3-2016Forrester-Wave-Digital_Risk_Monitoring-Q3-2016
Forrester-Wave-Digital_Risk_Monitoring-Q3-2016
rsouthal2003
 
F5 Hero Asset - Inside the head of a Hacker Final
F5 Hero Asset - Inside the head of a Hacker FinalF5 Hero Asset - Inside the head of a Hacker Final
F5 Hero Asset - Inside the head of a Hacker Final
Shallu Behar-Sheehan FCIM
 

Was ist angesagt? (20)

Contractor Exposed Manufacturer's Sensitive Data
Contractor Exposed Manufacturer's Sensitive DataContractor Exposed Manufacturer's Sensitive Data
Contractor Exposed Manufacturer's Sensitive Data
 
The Current State of Cybercrime 2013
The Current State of Cybercrime 2013The Current State of Cybercrime 2013
The Current State of Cybercrime 2013
 
WTF is Digital Risk Protection
WTF is Digital Risk ProtectionWTF is Digital Risk Protection
WTF is Digital Risk Protection
 
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the BoardroomCritical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the Boardroom
 
Why Passwords are not strong enough
Why Passwords are not strong enoughWhy Passwords are not strong enough
Why Passwords are not strong enough
 
Analyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - ChinaAnalyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - China
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
 
Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0
 
Taking Control of the Digital and Mobile User Authentication Challenge
Taking Control of the Digital and Mobile User Authentication ChallengeTaking Control of the Digital and Mobile User Authentication Challenge
Taking Control of the Digital and Mobile User Authentication Challenge
 
What Makes Web Applications Desirable For Hackers
What Makes Web Applications Desirable For HackersWhat Makes Web Applications Desirable For Hackers
What Makes Web Applications Desirable For Hackers
 
Forrester-Wave-Digital_Risk_Monitoring-Q3-2016
Forrester-Wave-Digital_Risk_Monitoring-Q3-2016Forrester-Wave-Digital_Risk_Monitoring-Q3-2016
Forrester-Wave-Digital_Risk_Monitoring-Q3-2016
 
Emerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business ReadyEmerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business Ready
 
Emerging application and data protection for cloud
Emerging application and data protection for cloudEmerging application and data protection for cloud
Emerging application and data protection for cloud
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
 
Intelligence-Driven Fraud Prevention
Intelligence-Driven Fraud PreventionIntelligence-Driven Fraud Prevention
Intelligence-Driven Fraud Prevention
 
F5 Hero Asset - Inside the head of a Hacker Final
F5 Hero Asset - Inside the head of a Hacker FinalF5 Hero Asset - Inside the head of a Hacker Final
F5 Hero Asset - Inside the head of a Hacker Final
 
Cyber Vigilantes: Turning the Tables on Hackers
Cyber Vigilantes: Turning the Tables on HackersCyber Vigilantes: Turning the Tables on Hackers
Cyber Vigilantes: Turning the Tables on Hackers
 
Network Insights of Dyre and Dridex Trojan Bankers
Network Insights of Dyre and Dridex Trojan BankersNetwork Insights of Dyre and Dridex Trojan Bankers
Network Insights of Dyre and Dridex Trojan Bankers
 
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022
 

Ähnlich wie Mobile Application Detected Impersonating Company Brand

Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015
sarah kabirat
 
Company profile logikeye.pdf
Company profile logikeye.pdfCompany profile logikeye.pdf
Company profile logikeye.pdf
Mehedi Hasan
 

Ähnlich wie Mobile Application Detected Impersonating Company Brand (20)

Digital Shadows and Demisto Enterprise Integration Datasheet
Digital Shadows and Demisto Enterprise Integration DatasheetDigital Shadows and Demisto Enterprise Integration Datasheet
Digital Shadows and Demisto Enterprise Integration Datasheet
 
Digital Shadows Helps Large Retailer Navigate Extortion Attempt
Digital Shadows Helps Large Retailer Navigate Extortion AttemptDigital Shadows Helps Large Retailer Navigate Extortion Attempt
Digital Shadows Helps Large Retailer Navigate Extortion Attempt
 
Digital Shadows SearchLight™ Overview
Digital Shadows SearchLight™ OverviewDigital Shadows SearchLight™ Overview
Digital Shadows SearchLight™ Overview
 
Data Loss Detection
Data Loss DetectionData Loss Detection
Data Loss Detection
 
Big Data Dectives
Big Data DectivesBig Data Dectives
Big Data Dectives
 
Digital Risk Protection
Digital Risk ProtectionDigital Risk Protection
Digital Risk Protection
 
Managed Takedown Service - Digital Shadows
Managed Takedown Service - Digital ShadowsManaged Takedown Service - Digital Shadows
Managed Takedown Service - Digital Shadows
 
What Happens to Your Data When a Company Gets Breached
What Happens to Your Data When a Company Gets BreachedWhat Happens to Your Data When a Company Gets Breached
What Happens to Your Data When a Company Gets Breached
 
Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015
 
ZIGRAM Introduction September 2020
ZIGRAM Introduction September 2020ZIGRAM Introduction September 2020
ZIGRAM Introduction September 2020
 
Company profile logikeye.pdf
Company profile logikeye.pdfCompany profile logikeye.pdf
Company profile logikeye.pdf
 
Protecting Businesses with Top Cybersecurity Companies.pptx
Protecting Businesses with Top Cybersecurity Companies.pptxProtecting Businesses with Top Cybersecurity Companies.pptx
Protecting Businesses with Top Cybersecurity Companies.pptx
 
The 10 most trusted cyber security solution providers 2018
The 10 most trusted cyber security solution providers 2018The 10 most trusted cyber security solution providers 2018
The 10 most trusted cyber security solution providers 2018
 
Open Source Intelligence Overview
Open Source Intelligence OverviewOpen Source Intelligence Overview
Open Source Intelligence Overview
 
Is It Possible to Prevent Data Leaks in an Effective Manner.pdf
Is It Possible to Prevent Data Leaks in an Effective Manner.pdfIs It Possible to Prevent Data Leaks in an Effective Manner.pdf
Is It Possible to Prevent Data Leaks in an Effective Manner.pdf
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.
 
Bp Corp Pres Short
Bp Corp Pres ShortBp Corp Pres Short
Bp Corp Pres Short
 
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
 
21 Cybersecurity Companies You Need to Know.pptx
21 Cybersecurity Companies You Need to Know.pptx21 Cybersecurity Companies You Need to Know.pptx
21 Cybersecurity Companies You Need to Know.pptx
 

Mehr von Digital Shadows

Mehr von Digital Shadows (11)

Threat model of a remote worker | Infographic
Threat model of a remote worker | InfographicThreat model of a remote worker | Infographic
Threat model of a remote worker | Infographic
 
Inadvertant Data Breaches
Inadvertant Data BreachesInadvertant Data Breaches
Inadvertant Data Breaches
 
Digital Shadows and the NIST Cyber Security Framework
Digital Shadows and the NIST Cyber Security FrameworkDigital Shadows and the NIST Cyber Security Framework
Digital Shadows and the NIST Cyber Security Framework
 
Detecting Spoof Domains
Detecting Spoof DomainsDetecting Spoof Domains
Detecting Spoof Domains
 
Digital Shadows Shadow Search
Digital Shadows Shadow SearchDigital Shadows Shadow Search
Digital Shadows Shadow Search
 
Mapping the ASD Essential 8 to the Mitre ATTACK™ framework
Mapping the ASD Essential 8 to the Mitre ATTACK™ frameworkMapping the ASD Essential 8 to the Mitre ATTACK™ framework
Mapping the ASD Essential 8 to the Mitre ATTACK™ framework
 
Mitre ATT&CK and the Mueller GRU Indictment: Lessons for Organizations
Mitre ATT&CK and the Mueller GRU Indictment: Lessons for OrganizationsMitre ATT&CK and the Mueller GRU Indictment: Lessons for Organizations
Mitre ATT&CK and the Mueller GRU Indictment: Lessons for Organizations
 
MITRE ATT&CK and 2017 FSB Indictment
MITRE ATT&CK and 2017 FSB IndictmentMITRE ATT&CK and 2017 FSB Indictment
MITRE ATT&CK and 2017 FSB Indictment
 
Mitre ATTACK and the North Korean Regime-Backed Programmer
Mitre ATTACK and the North Korean Regime-Backed ProgrammerMitre ATTACK and the North Korean Regime-Backed Programmer
Mitre ATTACK and the North Korean Regime-Backed Programmer
 
Digital Shadows Client Feedback
Digital Shadows Client FeedbackDigital Shadows Client Feedback
Digital Shadows Client Feedback
 
Inglorious Threat Intelligence by Rick Holland
Inglorious Threat Intelligence by Rick HollandInglorious Threat Intelligence by Rick Holland
Inglorious Threat Intelligence by Rick Holland
 

Kürzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Kürzlich hochgeladen (20)

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Mobile Application Detected Impersonating Company Brand

  • 1. Use Case Mobile Application Detected Impersonating Company Brand www.digitalshadows.com With Digital Shadows SearchLight™, the IT Manager of a retailer discovered a mobile application impersonating their brand on a mobile app store. The company, who did not have their own mobile application, needed to know the risk this mobile application posed to their customers. The use of copyrighted branding and terms had the potential to mislead customers into believing the application was legitimate. If these customers fell victim to phishing or social engineering, this had the potential to impact the company’s reputation and revenue. ight™, the IT Manager of a retailer n impersonating their brand on a mobile did not have their own mobile application, mobile application posed to their customers. ng and terms had the potential to mislead pplication was legitimate. If these ng or social engineering, this had the ny’s reputation and revenue. ting Company Brand hLightTM etected toring official and third party mobile application stores for references to the company’s g, Digital Shadows SearchLight™ detected a potentially malicious app impersonating their t Reviews and Adds Context hadows analysis of this app in a sandbox environment identified behavior or attributes e indicative of spyware that could steal sensitive information such as documents, videos credentials. The company was provided with an overview of this analysis, alongside ed screenshots, IP ranges, domain names, and developer details. anaged s context, the company used Digital Shadows Managed Takedown Service to remove the Mobile App Stores Search Engines Forums RSS Feeds Network Infrastructure Domain Registrations IRC Closed Forums Tor I2P U.S. Headquarters Digital Shadows, Inc. 332 Pine Street, Suite 600 San Francisco, CA 94104 North American Intelligence Operations Hub 5307 E. Mockingbird Ln. Suite 915 Dallas, TX 75206 UK Headquarters Digital Shadows, Ltd. Level 39 One Canada Square London E14 5AB Overview With Digital Shadows SearchLight™, the IT Manager of a retailer discovered a mobile application impersonating their brand on a mobile app store. The company, who did not have their own mobile application, needed to know the risk this mobile application posed to their customers. The use of copyrighted branding and terms had the potential to mislead customers into believing the application was legitimate. If these customers fell victim to phishing or social engineering, this had the potential to impact the company’s reputation and revenue. Mobile Application Detected Impersonating Company Brand Digital Shadows SearchLightTM What We Did Risk Detected By monitoring official and third party mobile application stores for references to the company’s branding, Digital Shadows SearchLight™ detected a potentially malicious app impersonating their brand. Analyst Reviews and Adds Context Digital Shadows analysis of this app in a sandbox environment identified behavior or attributes that were indicative of spyware that could steal sensitive information such as documents, videos or login credentials. The company was provided with an overview of this analysis, alongside associated screenshots, IP ranges, domain names, and developer details. Risk Managed With this context, the company used Digital Shadows Managed Takedown Service to remove the mobile application from the store and successfully reduce the risk to their customers. Retail Vertical Code-sharing Paste Sites Social Media Mobile App Stores Search Engines Forums RSS Feeds Network Infrastructure Domain Registrations IRC Closed Forums Tor I2P About Digital Shadows Digital Shadows monitors and manages an organization’s digital risk across the widest range of data sources within the visible, deep, and dark web to protect an organization’s business, brand, and reputation. www.digitalshadows.com info@digitalshadows.com +1-888-889-4143 | +44 203 393 7001 About Digital Shadows Digital Shadows enables organizations to manage digital risk by identifying and eliminating threats to their business and brand. We monitor for digital risk across the broadest range of data sources within the open, deep and dark web to deliver tailored threat intelligence, context and actionable remediation options that enable security teams to be more effective and efficient. Our clients can focus on growing their core business knowing that they are protected if their data is exposed, employees and third parties put them at risk, or their brand is being misused. To learn more, visit www.digitalshadows.com. Email: info@digitalshadows.com U.S. Headquarters Widest Collection of Sources SearchLight monitors for data exposure across the widest range of sources, within the open, deep and dark web. No stone is left unturned. Tailored and Targeted Collection A register of key assets that uniquely define your organization and your subsidiaries drives our intelligence machinery. Why Digital Shadows Get Started For more information on Digital Shadows SearchLightTM and how we can help protect your organization from Data Exposure, please contact us Visit www.digitalshadows.com for more information Call us at US 1-800-889-4143 UK +44 (0)203 393 7001 Email info@digitalshadows.com Analyst Added Context Digital Shadows intelligence analysts investigate and add context, impact and recommended action. Asset Registration Organizations register their company assets with Digital Shadows, including code samples, document markings and email footers. Explore View Organizations can view the credential exposure at a strategic level, identifying trends over time. Mitigation Options Each incident comes with a severity level and mitigation options. We also offer Managed Takedown Service, which provides end-to-end management for shutting down malicious activity and offloading this time consuming task from your team. About Digital Shadows Digital Shadows monitors and manages digital risk across the widest range of data sources within the open, deep and dark web to protect an organization’s business, brand and reputation. The Digital Shadows SearchLightTM service combines scalable data analytics with intelligence analysts to manage and mitigate risks of an organization’s cyber threat, data exposure, brand exposure, VIP exposure, infrastructure exposure, physical threat, and third party risk, and create an up-to-the-minute view of an organization’s digital risk with tailored threat intelligence. The company is jointly headquartered in London and San Francisco. For more information, visit www.digitalshadows.com. Data Exposure Example Call us at 1-888-889-4143 UK +44 (0)203 393 7001 U.S. Headquarters Digital Shadows, Inc. North American Intelligence Operations Hub UK Headquarters Widest Collection of Sources SearchLight monitors for data exposure across the widest range of sources, within the open, deep and dark web. No stone is left unturned. Tailored and Targeted Collection A register of key assets that uniquely define your organization and your subsidiaries drives our intelligence machinery. Why Digital Shadows Get Started For more information on Digital Shadows SearchLightTM and how we can help protect your organization from Data Exposure, please contact us Visit www.digitalshadows.com for more information Call us at US 1-800-889-4143 UK +44 (0)203 393 7001 Email info@digitalshadows.com Analyst Added Context Digital Shadows intelligence analysts investigate and add context, impact and recommended action. Asset Registration Organizations register their company assets with Digital Shadows, including code samples, document markings and email footers. Explore View Organizations can view the credential exposure at a strategic level, identifying trends over time. Mitigation Options Each incident comes with a severity level and mitigation options. We also offer Managed Takedown Service, which provides end-to-end management for shutting down malicious activity and offloading this time consuming task from your team. About Digital Shadows Digital Shadows monitors and manages digital risk across the widest range of data sources within the open, deep and dark web to protect an organization’s business, brand and reputation. The Digital Shadows SearchLightTM service combines scalable data analytics with intelligence analysts to manage and mitigate risks of an organization’s cyber threat, data exposure, brand exposure, VIP exposure, infrastructure exposure, physical threat, and third party risk, and create an up-to-the-minute view of an organization’s digital risk with tailored threat intelligence. The company is jointly headquartered in London and San Francisco. For more information, visit www.digitalshadows.com. Data Exposure Example www.digitalshadows.com U.S. Headquarters Digital Shadows, Inc. 332 Pine Street, Suite 600 San Francisco, CA 94104 North American Intelligence Operations Hub 5307 E. Mockingbird Ln. Suite 915 UK Headquarters Digital Shadows, Ltd. Level 39 One Canada Square Widest Collection of Sources SearchLight monitors for data exposure across the widest range of sources, within the open, deep and dark web. No stone is left unturned. Tailored and Targeted Collection A register of key assets that uniquely define your organization and your subsidiaries drives our intelligence machinery. Why Digital Shadows Get Started For more information on Digital Shadows SearchLightTM and how we can help protect your organization from Data Exposure, please contact us Visit www.digitalshadows.com for more information Call us at US 1-800-889-4143 UK +44 (0)203 393 7001 Email info@digitalshadows.com Analyst Added Context Digital Shadows intelligence analysts investigate and add context, impact and recommended action. Asset Registration Organizations register their company assets with Digital Shadows, including code samples, document markings and email footers. Explore View Organizations can view the credential exposure at a strategic level, identifying trends over time. Mitigation Options Each incident comes with a severity level and mitigation options. We also offer Managed Takedown Service, which provides end-to-end management for shutting down malicious activity and offloading this time consuming task from your team. About Digital Shadows Digital Shadows monitors and manages digital risk across the widest range of data sources within the open, deep and dark web to protect an organization’s business, brand and reputation. The Digital Shadows SearchLightTM service combines scalable data analytics with intelligence analysts to manage and mitigate risks of an organization’s cyber threat, data exposure, brand exposure, VIP exposure, infrastructure exposure, physical threat, and third party risk, and create an up-to-the-minute view of an organization’s digital risk with tailored threat intelligence. The company is jointly headquartered in London and San Francisco. For more information, visit www.digitalshadows.com. Data Exposure Example Digital Shadows SearchLight™ What We Did