Phishing and Impersonation Risk Intelligence Service
Provides enterprises with a full-lifecycle anti-phishing and impersonation solution covering "monitoring - early warning - remediation.
Background and Challenges
In the era of digitalization, the landscape of phishing attacks has become increasingly severe. Data as of 2022 indicates that the number of online phishing pages in China has reached nearly 2 million, impacting various industries including banking, payments, insurance, and education. Regulatory bodies such as the China Banking and Insurance Regulatory Commission (CBIRC) and the People's Bank of China (PBOC) have successively issued risk advisories and regulations related to phishing scams.
Refinement of Black
Market Labor Division
Phishing scams have formed a mature, highly specialized black industrial chain.
nCorporate insiders, hackers, telecom operator channels, third-party service providers, etc.
Mostly active on platforms like the dark web, black market forums, Telegram, Potato, etc.
Includes telemarketing companies, scam groups, etc.
Top 3
Phishing Types: Websites, Apps, Customer Service Calls
Phishing Official Accounts
Difficult External Risk Monitoring
Lacking comprehensive monitoring and remediation capabilities is a key factor leading to enterprise complaints and regulatory penalties.
1. Lack of Monitoring and Remediation Capabilities
Phishing is too diverse to fully monitor; leads rarely enable effective takedowns, and platform remediation is slow and inefficient.
2. Customer Complaints and Brand Damage
Scams spur complaints, claims, churn, and negative PR—damaging the brand.
3.Compliance and Regulatory Penalties:
If a risk incident occurs, NFRA (formerly CBIRC), CSRC, and PBOC will interview the entity, require remediation within a set timeframe, and impose administrative penalties.
Threat Hunter Anti-Phishing and Impersonation Product
Threat Hunter offers end-to-end anti-phishing and impersonation:
monitor, alert, remediate.
Monitors online phishing via intel sharing, DNS-request monitoring, active probes, knowledge-graph analysis, and app-channel data.
Instant phishing-lead alerts via email, WeChat, QQ, SMS, and phone.
Enables interception and takedown/remediation of phishing sites, apps, and official accounts.
Threat Hunter Anti-Phishing and Impersonation Product
Threat Hunter offers end-to-end anti-phishing and impersonation:
monitor, alert, remediate.
Fulfill Regulatory Compliance Requirements
Enables enterprises to detect and counter phishing ahead of regulators, closing info gaps and meeting PBOC, NFRA, and CSRC monitoring/remediation requirements.
Reduce Customer Complaints and Ensure Business Development
Reduces the rate of customer complaints (due to being scammed), prevents customer churn, protects brand equity, and ensures the healthy development of enterprise business.