Web Analytics
Anti Phishing | Rogue Mobile Apps monitoring

Online fraud protect

Phishing is the predominant attack method used by cybercriminals to steal account data and carry out online fraud. Digital channels such as social media and mobile apps are increasingly becoming the attack of choice.

Phishing Protect

Traditional anti-phishing strategies focus narrowly on shutting down the phishing web page used in the attack. This stops the immediate attack, but is ineffective at stopping the cybercriminal. With vulnerable websites and hosting options readily available, it is easy for cybercriminals to stage new phishing pages and continue launching attacks.


Monitoring and Detection
Ingressum has developed world-class phishing detection capabilities that combine automated high-volume data processing with human expertise to identify phishing attacks targeting your brand and customer.

  • Website Tracking Monitoring

  • DMARC Feedback loop

  • Monitoring of Client Data Sources

  • Domain Name Monitoring

  • Webserver Referer Logs

Fake Mobile App Protect

Online app stores are filled with mobile applications for gaming, mobile banking, shopping, social media and other purposes. Mobile Apps are available from trusted App stores and from not so trusted marketplaces, and from general websites on the internet.

Criminals are increasingly deploying malicious fake mobile Apps with the objective of stealing credentials and eventually funds from the owner’s banking accounts or other Personal Identifiable Information.

Ingressum actively monitors official and unofficial application repositories, analysing current mobile apps, updates and new mobile applications. ​

Mobile Phone

Fake Social Media Protect

Organisations are increasingly relying on social media as an important medium to communicate with their customers and to conduct their business. Brand trust with customers is built over many years. 

Consumers and organisations both need to protect their brand from malicious activity.
The ease at which social media profiles can be created has introduced a new security challenge to both consumers and organisations

social media.png

Criminals perpetrate impersonations and other malicious activity. The purpose of the impersonations is varied but can include:

  • Basic marketing redirection to an alternative product or service offering that is in competition with your brand,

  • Identify theft,

  • Harvesting personal identifiable information, and

  • Links to malicious websites that can download malware

Brand Protect

Protecting an organisation's digital assets is vital for every organisation. The online presence across many social platforms becomes your identity - how you want to be seen by your customers, your community or the broader industry.


Protection from fraudsters, eager to capitalize on the success of your brand, using a variety of techniques  to direct your visitors and fans to

Counterfeit or impersonation websites,

Illegal use of copyright or trademark material

Misrepresentation or implied association.

DMARC + Online Fraud Protect

DMARC Compliance enhances the Online Fraud Protect service by removing the possibility of frausters impersonating your brand by simply using your email domain,
such as

accounts@mybrand.com, or

How effective is it ? You be the judge !

WhatsApp Image v2.jpg

Implement a substantial framework of detection, mitigation and enforcement processes covering:

  • Website copying detection

  • SPAM and honeypot monitoring

  • Client based data sources such as inbound spam and website referrer logs

  • DMARC data analysis

  • Establishing ongoing governance model to enable more effective process from threat hunting to enforcement


Copyright © Ingressum Pty Ltd 2020

Ingressum refers to the Ingressum network and/or one or more of its member firms, each of which is a separate legal entity. Please see www.ingressum.com/structure for further details.

  • Facebook Clean