Links that Lie: Stop URL- based Attacks Before They Start

Links that Lie: Stop URL- based Attacks Before They Start


The most damaging cyber threats today don’t target machines or systems—they target humans. Today, 74% of data breaches rely on exploiting the human element. From employees clicking on malicious links to being deceived by emails posing as executives and suppliers, human-targeted attacks jeopardize businesses worldwide every day. 

When it comes to targeted email threats, Proofpoint has seen attackers pivot away from static file attachments toward malicious links which must be triggered by human clicks to initiate a wider attack. Whether their goal is to launch a phishing attack and steal credentials or direct users to malware-laden websites and unleash ransomware, adversaries now count malicious URLs as one of their favored tactics to further their attacks.

To help organizations stop URL-based attacks before they even start, Proofpoint is introducing the industry’s first pre-delivery suspicious URL hold and sandboxing capability as part of Proofpoint Threat Protection. When combined with our click-time protections, it creates the most formidable set of defense-in-depth measures available for organizations to prevent attacks from reaching their human targets. 

Recent Proofpoint threat intelligence and research data shows that the average number of daily URL-based threats has increased to over 4.5 million. This is an alarming 119% rise over the past three years. 

Infographic: 1 in 7 clicks on malicious links happen in 60 seconds of delivery. 

Proofpoint

What’s equally concerning is the speed at which these attacks can cause damage. Research from Proofpoint shows that 1 in 7 clicks on an unsafe link happens in less than 60 seconds after an email’s delivery. This rapid click response demonstrates the critical nature of strong pre-delivery protection to reduce risk of users clicking on malicious links.

Enhanced predelivery protection for URL-based threats

Our new capability allows organizations to hold suspicious messages with URLs for sandbox analysis, minimizing the risk of a user engaging with the malicious URL. We use behavioral signals and threat intelligence to determine if a message should be held for more thorough inspection. Our sandbox technology conducts an exhaustive analysis of the URL using static and dynamic analysis, as well as analyst-assisted execution to maximize detection and intelligence extraction.

Hold and sandbox messages with suspicious URLs stops threats before they reach users.

Proofpoint

Continuous defense with click-time protection

URLs are not always born malicious. They can become weaponized post-delivery. As such, emails containing links require constant scrutiny to protect against advanced threats. That’s why continuous analysis from pre-delivery through to click-time is so important for stopping URL-based attacks. With our new pre-delivery hold & sandbox for suspicious URL capability, Proofpoint uniquely provides the most advanced, end-to-end protection against URL threats.

Proofpoint uniquely delivers continuous defense for URL-based threats.

Proofpoint

Predelivery detection. Proofpoint identifies and blocks attacks before they land in users’ inboxes, eliminating the chance a user may activate them. We’ve enhanced this capability by holding suspicious messages with URLs for sandbox analysis. 

Click-time protection. Proofpoint continues to monitor delivered messages for links that may change over time. URLs in delivered messages are re-written and sandboxed at time of click. Customers can also enable isolation for another layer of protection post-delivery.

Learn more 

If you want more details about how to build a comprehensive email security strategy for your business, see this guide from Proofpoint. And to gain more insight into the changing threat landscape and the risks for your users, be sure to read our latest State of the Phish report



Source link
lol

The most damaging cyber threats today don’t target machines or systems—they target humans. Today, 74% of data breaches rely on exploiting the human element. From employees clicking on malicious links to being deceived by emails posing as executives and suppliers, human-targeted attacks jeopardize businesses worldwide every day.  When it comes to targeted email threats, Proofpoint…

Leave a Reply

Your email address will not be published. Required fields are marked *