Darktrace adds early warning system to Antigena Email
Above:
Jack Stockdale OBE, Darktrace CTO.
Courtesy Darktrace
This new capability is now available to Antigena Email users and includes the extension of anonymised, learned domain behavioral profiles across Darktrace’s expansive and diverse group of global customers.
“Darktrace stops all kinds of cyber-attacks against organizations in every sector in over 110 countries globally. That represents a huge bank of knowledge about how malicious payloads behave in the very earliest stage of a cyber-attack,” commented Jack Stockdale OBE, Darktrace CTO. “Antigena Email has now realised the vision of leveraging collaborative, anonymised insights to leave attackers with nowhere to hide.”
Ninety-four per cent of cyber-attacks begin in the inbox. As organisations continue to rely on email as a primary workplace collaboration tool and attacks become increasingly novel and sophisticated, email security technologies that rely on behaviour rather than threat intelligence become more imperative.
Darktrace’s Self-Learning AI observes emails to build bespoke behavioral profiles for each customer and leverages these behavioural profiles, rather than a ledger of binary ‘good’ or ‘bad,’ to accurately determine whether each email belongs in a recipient’s inbox. Antigena Email uniquely analyses domains within email addresses and links in email bodies and attachments to evaluate their popularity and typical presence in the inbox.
Now, when Antigena detects unusual domain behavior in a customer environment, a supplementary interpretation can be made by comparison with this new fleet-wide version of the behavioural profiles. This new functionality can lead to increased suspicion, for example, of a potential account compromise when a fleet-wide popular domain suddenly strays from its usual behavioural patterns – even in a trusted supplier or vendor.
This update recently allowed Darktrace to stop a phishing campaign sent from a compromised government account in South America that was soliciting fake philanthropic donations. Although the government domain was legitimate, the attacker had inserted their own 'reply-to' address into the email headers. This address had zero domain precedent locally or globally and, in combination with other indicators, led Antigena Email to flag this email as suspicious.