RPost Updates its Security AI Model to Auto Lock Out Seller, Supplier, Staffing Impersonation Fraud
October 03, 2024 - Los Angeles, CA
RPost announces updates to its security AI model to tackle emerging impersonation fraud. This RPost technology update identifies cybercriminal impersonation fraud and automatically locks out the cybercriminals in the early stages of their attack. This RPost Impostor Detection™ technology builds on RPost’s Eavesdropping AI™ model and its Right Recipient™ and AI Auto-Lock™ services to protect across all RPost’s products: RMail® email and file share security, Registered™ email and text message compliance, RDocs™ document controls, and RSign® digital transactions, forms, and eSignatures.
A cadre of sophisticated cybercriminals have learned that a combination of researching targets, gathering contextual information by eavesdropping on targets through compromised email accounts, patience, and generative AI are powering up their approach and their (stolen funds) earnings. They are today, for example, using generative AI tools to rapidly spin up online content across web and social media platforms that enhance the trickery in their impersonation schemes through properly written (language, grammar, context) content to support their Seller, Supplier, Staffing, Customer, and Advisor Impersonated identities.
“Ultimately, these complex single and multi-party impersonation schemes are very hard for people going about their normal business to see,” adds RPost CEO Zafar Khan. “Simply put, RPost empowers staff to see the unseen.” This is next-gen Business Email Compromise wire fraud trickery; seller, supplier, advisor impersonation fraud that often leads to cybercriminals luring one’s staff, clients, and clients’ clients into mis-sending funds, paying fake invoices, or sending transaction closing funds to a cybercriminal account. Staffing fraud can be much more nefarious, with aim to gain access to systems and ultimately exfiltrate data and offer to return it for ransom or lock critical files in a ransomware schema.
Researchers are seeing a massive uptick in cyber impersonation crimes, where the cybercriminal uses extracted information from email and documents accessed via compromised email accounts to then drop this contextual information into GenAI tools to rapidly spin up impostor schemes that appear authentic, and provide a colorful backdrop on social media, websites, and in email domain names. In the eyes of the unsuspecting target, this validates the persona that the cybercriminal is portraying for the purpose of (a) gaining access to systems often via staffing impersonation that results in ransomware or exfiltration of data, (b) tricking into mis-sends of money due to consultant/advisor or seller impersonation often resulting in sending large amounts of transaction or invoice related funds to cybercriminal accounts, or (c) receiving mis-sent goods purchased on credit of others (impersonated party, customer impersonation) with the goods being received and swiftly sold.
“This RPost security AI is really a must-have, as there is no easy way for inbound filters to detect this and those in the midst of transactions are often distracted by the flurry of back-and-forth to get the deal done and don’t see these impersonation schemes inserted into the message and digital document flow,” adds Khan. “Cybercriminals today are targeting across business operations. You are a target. You are being researched. Your invoice, procurement, human resources, contract management, accounting, payroll, billing, collections, M&A, and legal operations are high risk today for these newer impersonation schemes.”
RPost has received accolades by IDC naming RPost a worldwide leader in eSignatures (see IDC quadrant chart), Aragon Research naming RPost a worldwide leader in digital transaction management (see chart) and innovator in enterprise content platforms (read news), Frost & Sullivan, among others, due in part to its newest AI-infused security. Among these innovations are RPost AI Auto-Lock™ leak-un-leak technology that automatically locks document attachments, file share links, agreements, and more just as a cybercriminal is attempting to eavesdrop on content with aim to use context to build an impersonation attack.
Visit RPost at the Gartner ITxpo in Orlando, stand #744, and/or register for RPost’s pre-conference webinar covering this topic (register here).
About RPost
We’re the global leader in premium, feature-rich and more affordable eSignature and cybersecurity services, and we’ve been continuously innovating for our customers the world over since 2000. From within our three main platforms: RMail email security and compliance, RSign eSignatures and RDocs document security and intelligence, we’re everything our customers need when it comes to email, document and form security, compliance, and workplace acceleration — track, prove, eSign, encrypt, share, certify, control. We do what no other company does — all in one.
We thrive on ensuring that we are artisans and experts in everything we do: secure and certified email encryption for privacy and compliance; eSignatures and web forms to ease digitization of workflows; e-delivery tracking to prove important communications; managed file transfer to simplify secure sharing of large documents and sets of files; document-level digital rights management to empower control of document access even after transmission; and AI-infused appsto prevent data leaks by minimizing human e-security errors and locking out cybercriminal from exposed content. This is why more than 25 million users have enjoyed our RMail®, RSign® and RDocsTM services for over two decades across 193 countries. Learn more at the RPost website.
November 07, 2024
October 03, 2024
September 27, 2024
August 02, 2024
July 18, 2024