This application claims priority to UK Application No. GB2301006.9, filed Jan. 24, 2023, under 35 U.S.C. § 119(a). Each of the above-referenced patent applications is incorporated by reference in its entirety.
The present invention relates to a method, server system, and non-transitory computer-readable storage medium for processing and handling a request from a sender for data pertaining to a recipient of an electronic communication.
Electronic communications are sent from senders to recipients over a network and can have contents which are designed to obtain certain details about the recipient. The contents of the communication may elicit information from the recipient to enable the sender to maliciously access data associated with the recipient. Communications such as these are often called phishing communications and have the aim of obtaining personal information, such as login details for the recipient's accounts.
Being able to detect such communications quickly and efficiently, can be relatively time-consuming and resource intensive. It is desirable to detect such communications and monitor actions undertaken by malicious parties who have gained access to the recipient's account and who attempt to obtain data associated with the recipient's account.
According to aspects of the present disclosure, there are provided a method, a computer program product such as a non-transitory storage medium carrying instructions for carrying out the method, and a server system comprising at least a sending device, a recipient device, a storage system and a remote server configured to perform the method.
The method is one of determining unauthorised requests, from a sender, for data pertaining to a recipient of an electronic communication, the recipient being a user of, and having an authorized account with, a server system, wherein the server system comprises at least a remote server and a storage system, and maintains accounts for a plurality of users.
The method includes receiving, at the remote server, the electronic communication addressed to the recipient; determining, by the remote server, that the electronic communication is a potentially malicious communication, and then instantiating, by the remote server, a first pseudo account with associated login credentials of a first type, the first pseudo account being associated with, and unused by, the recipient, and wherein the first, empty, pseudo account is different to the authorized account; and the login credentials of the first type are login credentials comprising characters that have been randomly generated for use in accessing the first pseudo account; transmitting, to the sender of the electronic communication, by the remote server, at least the login credentials of the first type; monitoring, by the remote server, access to the first pseudo account by a given user of the server system, using the login credentials of the first type, wherein the given user is not associated with any of the accounts maintained by the server system; and associating, by the remote server and in the storage system, at least one characteristic of the access, by the given user of the server system, to the first pseudo account with the login credentials of the first type, wherein the at least one characteristic of the access to the first pseudo account is used in determining unauthorised requests for the data.
By instantiating a pseudo account and transmitting login credentials for the pseudo account, rather than the login credentials associated with the recipient's authorized account when it is determined that the communication is potentially malicious, analysis can be undertaken regarding whether the sender of the communication is in fact acting in a malicious manner. This prevents a potential attacker from gaining access to the authorized account of the recipient, whilst the storing of characteristics associated with the pseudo account enables future analysis to be undertaken improving the determination of whether subsequently received communications are likely to be malicious. Furthermore, this also enables information to be gathered about the type of access and information sought out by the attacker enabling feedback to the recipient, and/or system manager, to be provided thereby informing future security decisions/policies.
The method may also comprise instantiating, by the remote server, at least a second pseudo account with associated login credentials of a second type, the second pseudo account being associated with, and unused by, the recipient, and wherein the second pseudo account is different to the authorized account and the first pseudo account. The second pseudo account comprises dummy data representative of a given account of the server system and the login credentials of the second type represent dummy login credentials for accessing the given account. The method may further comprise transmitting, to the sender of the electronic communication, by the remote server, the login credentials of the second type; monitoring, by the remote server, access to the second pseudo account by the given user of the server system, with the login credentials of the second type; and associating by the remote server, and in the storage system, at least one characteristic of the access by the given user of the server system, to the second pseudo account with the login credentials of the second type, wherein the at least one characteristic of the access to the second pseudo account is used in determining unauthorised requests for the data.
By instantiating a second pseudo account with login credentials of a different type, checks can be made to determine whether access is also attempted to the second pseudo account. Characteristics associated with the access to the second pseudo account can also be stored enabling further future analysis of communications to be more efficient and accurate. This also provides additional information regarding what information the malicious party was attempting to access thereby informing security policy/decisions by the recipient and/or system manager.
Optionally, the method comprising determining whether access, by the given user, to the first pseudo account or the second pseudo account is automated, based on a comparison of the at least one characteristic of the access to the first pseudo account by the given user, and the at least one characteristic of the access to the second pseudo account by the given user, wherein the at least one characteristic of the access to the first pseudo account and the at least one characteristic of the access to the second pseudo account are indicative of at least whether the login credentials are of the first type or the second type.
By comparing the access to the first pseudo account and the second pseudo account by a given user, the characteristics and/or features of the given user and the actions or intentions may be determined. An analysis of the login credentials used to access the pseudo account(s) indicates that the login credentials of the first type are machine-generated, that is they comprise random characters and therefore this may be used to indicate that the first pseudo account is a fake account in comparison to the second pseudo account which comprises more realistic login credentials alongside dummy data.
Optionally, an analysis of data that is accessible via the Internet from one or more repositories is undertaken to determine whether at least the login credentials of the first type, associated with the first pseudo account, have been made available via the one or more repositories, or the login credentials of the second type, associated with the second pseudo account, have been made available via the one or more repositories. This enables data held by remote servers to analysed for the login credentials provided to the pseudo account or further pseudo account. These remote servers may be known to comprise illicitly obtained information and provides useful information regarding how the attacker is using the credentials and potentially what their aims are. Furthermore, this also helps to improve the analysis/determination as to whether future communications are potentially malicious.
The at least one characteristic of the access to the first pseudo account and the at least one characteristic of the access to the second pseudo account may comprise information associated with one or more actions undertaken by the given user. By monitoring actions undertaken by a user accessing the pseudo account(s) using the login credentials, information about what malicious third parties are doing with the credentials and what information they are attempting to access can be obtained. This helps to further inform the security policy of the recipient and also improve future detections/actions likely to be classed as malicious activity.
The at least one characteristic of the access to the first pseudo account, and the at least one characteristic of the access to the second pseudo account may be any of identification information associated with the given user accessing the first pseudo account with the login credentials of the first type or the given user accessing the second pseudo account with the login credentials of the second type; and a time associated with the access, by the given user, to the first pseudo account with the login credentials of the first type or the access to the second pseudo account with login credentials of the second type. Storing identification information of a malicious third party, or any other user accessing the pseudo account(s) using their respective login credentials enables further access to accounts to be monitored, whether they be an authorized account of the server system, or pseudo accounts, by those malicious third parties. Furthermore, other communications received from those malicious third parties can also be identified quickly and flagged as potentially malicious. This improves the detection and accuracy of the identification of potential attackers.
Optionally, a difference between a transmission time of the login credentials of the first type or the login credentials of the second type to the sender, and the time associated with the access to the first pseudo account or the access to the second pseudo account by the given user may is determined. When the difference is below a predetermined threshold, it may be determined that the given user is the sender of the electronic communication. By tracking the time between providing the sender with the login credentials and access to the pseudo account(s), information can be gleaned as to whether the sender is likely to have used the information themselves, or whether it is likely that the credentials have been shared with another malicious third party. The credential may be used by either party in a number of ways, such as by providing them to a bot for automated attacks, or by manually inputting the login credentials.
A time period between the time associated with the access to the first pseudo account or the access to the second pseudo account by the given user, and an action time associated with an action undertaken by the given user in the first pseudo account or the second pseudo account may also be determined. By tracking the time between accessing the account and a time a user undertakes an action within the pseudo account, an indication of whether the attack is automated can be determined. If the action happens very quickly after access, it may be indicative of an automated attack. Actions detected may include the sending a communication using the pseudo account, the downloading data from the pseudo account and/or attempting to modify or create administrative rules associated with the pseudo account. This helps to inform the security policy of the recipient and also improves future detections/actions likely to be classed as malicious activity.
Optionally, previous access characteristics stored in the storage system are identified, where the previous access characteristics are associated with one or more of: previous accesses to one or more accounts of the server system; and a comparison between the previous access characteristics to the characteristics associated with the access to the first pseudo account by the given user of the server system. A similarity between the previous access to the one or more accounts of the server system and the access to the first pseudo account by the given user may be determined and an indication may be transmitted to the recipient based on the comparison. By providing an indication based on a comparison between characteristics of a given access to the pseudo account and previous accesses, patterns and analysis can be undertaken, and malicious activity detected. This helps to inform the security policy of the recipient and also improves future detections/actions likely to be classed as malicious activity.
Further features and advantages of the invention will become apparent from the following description of preferred embodiments of the invention, given by way of example only, which is made with reference to the accompanying drawings.
Electronic communications may be sent between senders and recipients on a data network. Due to the increased number of interconnected devices, such as smartphones, laptop computers, wearable devices and desktop computers, users can access data at various physical locations, provided they have an appropriate connection. Accordingly, users may be able to send and/or receive electronic communications from various locations, at various times, using different devices. Being able to manage, track, and determine the devices that a user sends and receives data packages from, enables a system to make determinations as to the veracity of the sender and/or recipient, and as such determine whether additional measures need to be employed. For example, determining whether indicate to a recipient the risk of a potential threat or prevent the recipient from opening or sending a data package.
Determining the level and type of processing to apply, may comprise analysing several pieces of information, such as information relating to previous interactions between the sender and recipient, the content of the electronic communication, and in some examples, data from additional data services.
Information relating to the sender and recipient of the electronic communication, as well as the contents of the electronic communication may be used as the basis for determining handling actions to apply, wherein a particular handling action is indicative of the risk associated with the given electronic communication. For example, a high-risk electronic communication may result in specific safeguards being put in place to prevent recipients from accessing the electronic communication. Alternatively, if the risk score is high enough to indicate a severe risk, it may be determined that the electronic communication should be quarantined and/or amended in such a way as to negate and/or reduce at least some of the risk.
Determining the risk a given electronic communication poses may involve the use of different functions, and in some examples may involve machine learning functions configured to analyse different characteristics of the electronic communication, the sender, and the recipient. Being able to determine the risk and apply handling actions quickly and efficiently is necessary to ensure that users are not frustrated due to the delay in receiving the electronic communication. If they are frustrated or annoyed due to the amount of time, and lag or latency in determining the risk and providing access to the electronic communication, or a notification of a risky electronic communication, then this may lead them to deactivate, or simply never enable the system, and as such serve to increase the risk of a threat.
By analysing the content of the electronic communication in such a way, further measures can be put in place to determine the type and level of threat, and track any malicious activity associated with the electronic communication, as will be described below.
The header 110 of the electronic communication 100 may comprise information regarding the payload data, for example, the header may include data portions relating to the length of the electronic communication 100, synchronization data, a package number, network protocols that define what type of information is contained in the payload data, a destination address, an originating address, and a location of the sender and/or recipient. It will be appreciated that other types of data portions and any combination of those data portions may be included in the header 110.
The payload 120 of the electronic communication 100 may comprise data associated with the content to be transmitted from the sender to the recipient. For example, the payload 120 may comprise data associated with an email message or multimedia file, or a combination of files such as an email with an attachment. The payload 120 may comprise at least one data portion, which as mentioned above may be representative of individual bits of data. The data portions may also represent collections of individual bits, or even different data items. For example, the payload 120 of an electronic communication 100 may comprise data relating to an email, and a number of attachments to the email. As such, the payload 120 need not be representative of a single data item to be transmitted from a sender to a recipient. Similarly, the payload 120 may represent a portion of a data item. For example, where the data item to be transmitted from a sender to a recipient is a large data file, such as a multimedia file, the electronic communication 100 may represent only a portion of that data file. In such examples, the header 110 may be used to indicate the order of the electronic communications 100 making up the large data file.
The electronic communication 100 may also comprise a footer 130. The footer 130 may be used for verifying the contents of the electronic communication 100 on transmission, but it will be appreciated that the footer 130 may also comprise other data. For example, the footer 130 may be a checksum and comprise a data portion F0 used for error checking, such as a cyclic redundancy check or other similar methods. As with the header 110 and payload 120, whilst the footer 130 is shown as a single data portion F0, it will be appreciated that the footer 130 may comprise more than a single data portion.
The server system may be the server system 500 described below with reference to
At step 210, an electronic communication, such as electronic communication 100 described above with reference to
The electronic communication, or data package, may contain hyperlinks, and/or other code configured to obtain user account and/or other personally identifying information, such as names, addresses, date of birth, and bank account information, associated with the recipient. The user account data and/or other personally identifying information may be stored on the recipient's device and/or stored remotely but associated with their authorized account.
Following receipt of the electronic communication, it is determined at step 220, by the remote server, whether the electronic communication is potentially malicious. It will be appreciated by the skilled person that there are a number of methods for determining whether a given electronic communication is potentially malicious. Examples of such methods include analysing the data contained within the electronic communication, such as the sender's address, other recipients, whether there is an attachment to the electronic communication, and the content of any message and/or attachment. Other features of the electronic communication may also be used to determine whether it is malicious, such as the time the electronic communication has been received, data in the header such as redirection information, and an analysis of any hyperlinks within the body of the electronic communication.
Analysing the electronic communication to determine whether it is a potentially malicious communication based on any of the above-mentioned data associated with the received electronic communication, may be undertaken by a machine learning algorithm, or other forms of analysis as will be appreciated by the skilled person. The analysis of the electronic communication may be based on a plurality of the data in order to obtain a holistic view as to whether the electronic communication poses a potential threat.
Following the determination, by the remote server, as to whether the electronic communication is a potentially malicious communication, at step 230, the remote server instantiates at least a first pseudo account. The first pseudo account is associated with the recipient of the electronic communication and may have a number of features specific to it. More particularly, the first pseudo account contains no data and has not been used by the recipient, therefore it is completely separate from their authorized account. For example, the first pseudo account may be the pseudo account 300 of
For example, a user may receive a communication from a sender which is deemed, at step 220 to be malicious, and which is requesting the recipient's banking information. The remote server may deem this message to be malicious using various methods as will be appreciated by the skilled person. Following the determination, the remote server would instantiate a pseudo banking account. The pseudo banking account has associated login credentials, such as a username and password. As part of the instantiation of the pseudo banking account, there is no other data or structure set up. This is in contrast to the user's ‘real’ banking account would have data associated with it, such as transaction history or direct debit information, etc. However, the pseudo banking account does not have any of this associated data.
In another example, a user may receive a communication from a sender which is deemed, at step 220, to be malicious and which is requesting the user's email login information. The remote server will then instantiate a pseudo email account on the remote server. The pseudo email account has login credentials associated with it. As part of the instantiation of the pseudo email account, there is no other data or structure set up. This is in contrast to the user's ‘real’ email account, which would have data associated with it such as a mailbox or contacts list. However, the pseudo email account does not have any of this associated data.
In some examples, at step 230, the remote server may instantiate a second pseudo account with associated login credentials of a second type. As with the first pseudo account, the second pseudo account may be associated with the recipient of the electronic communication and may have a number of features specific to it. The second pseudo account, much like the first pseudo account, has not been used by the recipient, such that it is completely separate from their authorized account. The second pseudo account may be the pseudo account 310 of
Both the first pseudo account 300 and/or second pseudo account 310 may be generated and then instantiated by the server system, on detection of the potentially malicious communication. In other examples, the first pseudo account 300 and/or second pseudo account 310 may be configured from one or more pseudo accounts objects stored in a storage associated with the server system. As part of the instantiation, the pseudo account object may be configured with the login credentials (either of the first type or second type), and in the case of the second pseudo account 310, configured with dummy data from a database stored on the storage.
Once the pseudo account—either the first pseudo account 300 on its own, or the first pseudo account 300 and the second pseudo accounts 310—has been instantiated, at step 240, at least the login credentials associated with the pseudo account(s) 300, 310 are transmitted to the sender of the electronic communication. The transmission of the login credentials may be via the internet, or a direct connection to a server of other computing devices, such as a user device and/or recipient device. In some examples, the transmission of the login credentials may occur automatically if it was determined that the electronic communication is a potentially malicious communication. For example, upon detection, by the remote server at step 320, that a received electronic communication is potentially malicious, the remote server may instantiate and then transmit the details associated with the first pseudo account 300 and/or the second pseudo account 310 to the sender instead of the recipient's authorized account information.
Following the transmission of the pseudo account information (whether it is the first and/or second pseudo account information), at step 250, the remote server monitors access to the pseudo account(s) 300, 310 by a user of the system, using the login credentials associated with the pseudo account(s) 300, 310. Monitoring access to the pseudo account(s) may involve tracking whether a user has logged in using the associated login credentials. For example, where a first pseudo account 300 is instantiated, the first pseudo account 300 can be monitored to determine whether any user of the server system or any third party logs in using the login credentials of the first type. Similarly, where a second pseudo account 310 is instantiated, the second pseudo account 310 can be monitored to determine whether a user has logged in using the login credentials of the second type. Furthermore, in some examples, different login credentials may be provided for different requests, therefore it is possible to monitor which request the access is associated with.
As the user accessing the first or second pseudo account 300, 310 is not associated with any other account of the server system, then by providing the potentially malicious user with access to the pseudo account instead of a user's authorized account, security is maintained, and access to personally identifiable and/or other confidential information, by such an unauthorized user, is prevented. Following on from the banking and email examples described above in relation to step 230, the pseudo banking account is implemented on the remote server which is distinctly separate from the user's banking provider's server. Similarly, the pseudo email account is implemented on the remote server, and that is also distinctly separate from the user's email provider's server. This allows access to and actions performed by the malicious third party to be undertaken at a safe distance from the legitimate servers, ensuring that information about the malicious third party can be determined at a safe distance as will be described in further detail below.
Each access to the first and/or second pseudo account 300, 310 may have a number of associated characteristics. For example, the type of login credentials used for the access, identification information associated with the user accessing the pseudo account(s) 300, 310, and a time of the access to the pseudo account(s) 300, 310. The identification information associated with the malicious user accessing the pseudo account(s) 300, 310 may include information such as an Internet Protocol (IP) address associated with the malicious user's device, the geographic location of the malicious user, and a domain of the source of the of the access. It will be appreciated that other characteristics may also be associated with the access.
In other examples, the characteristics may comprise information associated with one or more actions undertaken by the malicious user when they have gained access to the pseudo account(s) 300, 310 using the login credential provided. Such actions include but are not limited to an attempt to send one or more electronic communications using the pseudo account(s) 300, 310, an attempt to download data associated with the pseudo account(s) 300, 310, and an attempt to change one or more administrative rules associated with the pseudo account(s) 300, 310 such as forwarding rules. Other actions may also be monitored and tracked.
Further information about the access may also be gleaned based on whether the login credentials of the first and/or second type for the first pseudo account 300 and the second pseudo account 310 respectively have been provided to one or more third parties via an online repository accessible via the Internet. For example, if the login credentials to either of the first or the second pseudo account 300, 310 are detected on known malicious sites, it can be determined that the request for data from the recipient was malicious. Characteristics of that request can then be stored and used when analysing further electronic communications as an indication that a given electronic communication may be malicious.
Once an attempted access to the first and/or second pseudo account 300, 310 has been detected, and the characteristics of that access have been determined, then, at step 260, the access to the pseudo account 300, 310, and characteristics of the access attempt are associated with the pseudo account 300, 310. These access characteristics are used to determine whether the request for data from the sender is likely to be unauthorized, for example by analysing the characteristics and determining whether they have the features of similar unauthorized requests. This association may be stored in storage associated with the server system, such that the access and its characteristics can be used in future determinations regarding whether a request for data from a recipient is likely to be malicious, further improving the accuracy of the detection algorithms used in step 220, for example.
Features of an unauthorized request may be determined in a number of ways which are apparent to the skilled person, and may for example, comprise determining whether the access to the pseudo account 300, 310 was undertaken by a real-world malicious third party, or the sender. This access may be automated, such as using a bot, or may be undertaken manually by entering the login credentials associated with pseudo account(s) 300, 310. Determining whether the access was automated may be based on the pseudo account 300, 310 accessed and/or the type of login credentials used. Access to the first pseudo account 300, which contains no data (or bogus data as described above), and may have login credentials comprising randomly generated characters may be used to indicate that the access was automated. This is because it is unlikely that a real-world malicious third party would analyse the pseudo account and/or its login credentials and consider them to be representative of a so-called ‘real’ account. Conversely, if an access is detected to the second pseudo account 310, which comprises data that emulates a so-called ‘real’ account of the server system, and has login credentials of the second type representative of realistic login credentials as described above, this may be indicative of a real-world malicious third party accessing the second pseudo account 310.
Other indications of whether the access to the pseudo account 300, 310 is undertaken automatically or by a real-world malicious third party may include determining a difference between the transmission time of the login credentials to the sender and the time that the access to the pseudo account 300, 310 was detected.
In yet further examples, the time between the transmission of the login credentials and the time at which an action was attempted/undertaken may be indicative of whether the access and/or action was performed by the sender of the electronic communication. If, for example, the action was attempted within a short period of time after the transmission of the login credentials associated with the pseudo account(s) 300, 310, such as when the time period is below a given predetermined threshold, this may be indicative that the sender of the communication is the one attempting to access and/or perform an action. Otherwise, if the time between the transmission of the login credentials associated with the pseudo account(s) 300, 310 exceeds the given predetermined threshold, then this may be indicative that a malicious third party, who is not the sender of the electronic communication, is attempting to access the pseudo account(s) and/or perform an action. For example, the malicious third party may have obtained the login credentials associated with the pseudo account(s) 300, 310 via one or more online repositories as described above.
It will be appreciated that other indications as to whether the access and/or actions were undertaken automatically or by a real-world malicious third party may also be used and/or combine with the above-described examples.
By allowing access to and actions to be performed by the malicious third party on the remote server, using the pseudo account, the malicious activity can be undertaken at a safe distance from the legitimate servers of the user. This ensures that information about the malicious third party can be determined at a safe distance.
In some examples, it is desirable to notify the recipient of the electronic communication of an attempt to access their authorized account. In such an example, the characteristics of the access to the pseudo account(s) 300, 310, such as the time of the access and the attempted actions, may be compared to previous access and/or action information associated with one or more given accounts of the server system, which are stored in a storage system associated with the server system. Similarities between the attempted access to the pseudo account(s) 300, 310, and previous access to one or more accounts may then be used to determine whether the access has the hallmarks of a malicious access. An indication may then be transmitted to the recipient based on the comparison, to alert the recipient of the fact that an attempt to obtain data associated with their account has been detected. Details regarding the attempt may be provided in the indication, such that the recipient can provide feedback indicating whether it is a malicious access attempt. The recipient's feedback may be stored in the storage system and then used to determine whether future attempts to access the recipient's authorized account (or other recipients with authorized accounts associated with the server system) are malicious or not.
Upon receipt of the electronic communication 430, an analysis is undertaken to determine whether the electronic communication 430 is likely to be malicious. If it is determined that the electronic communication 430 is unlikely to be a malicious message, it may be passed directly to the recipient 420. It will be appreciated that this may involve the electronic communication 430 passing through a server, such as server 460 before being delivered to the recipient 430. The server 460 may be different to the remote server 450 configured to undertake the method 200 described above in relation to
Where the server 460 is different to the remote server 450 undertaking the method 200 described above, the server 460 may be configured to first transmit the electronic communication 430 to the remote server 450 such that it can be handled in accordance with method 200 described above. It will be appreciated that in some examples the functionality of method 200 described above may be split between the server 460 and the remote server 450. For example, the server 460 may be configured to identify/determine whether the electronic communication 430 is a malicious communication, whereas the remote server 450 may be configured to instantiate pseudo accounts and monitor access and/or actions undertaken by a third party.
When it is determined that the electronic communication 430 is likely to be malicious, and as will be described in further detail below with reference to the server system 500 of
In addition to monitoring access to the pseudo account(s) 300, 310, the remote server 450 may also be configured to monitor for one or more actions undertaken by a user when they access the pseudo account(s) 300, 310 using the associated login credentials. For example, the remote server 450 may be configured to monitor for attempts to send an electronic communications using the pseudo account(s) 300, 310, to download data associated with the pseudo account(s) 300, 310, and/or any attempt to change one or more settings or administrative rules of the pseudo account(s) 300, 310. It will be appreciated that the remote server 450 may be configured to monitor for other actions undertaken by the malicious user when they achieve access to the pseudo account(s) 300, 310.
The remote server 450 may also be configured to monitor one or more online repositories accessible via the Internet. These repositories may be known to store login credentials that have been maliciously obtained, however, it will be appreciated that they may also store other data. By monitoring such repositories, information about the purpose of the electronic communication 430 sent to the sender 410 can be deduced and used to determine whether future electronic communications are malicious.
Data and/or characteristics associated with the access and any actions attempted and/or undertaken in the pseudo account(s) 300, 310 may be used to generate an indication which is transmitted to the recipient 420.
As described above with reference to method 200 of
The system 500 also comprises a storage system 440 having storage for storing at least the data associated with previous access to one or more pseudo accounts 300, 310. The storage system may also be configured to store a plurality of pseudo accounts which may be instantiated by the remote server for use in the method 200 described above. The storage of the storage system 440 may be a solid-state drive (SSD) or other semiconductor-based RAM; a ROM, for example, a CD ROM or a semiconductor ROM; a magnetic recording medium, for example, a floppy disk or hard disk; optical memory devices in general, although it will be appreciated that other storage mediums may be used. The storage system 440 may be accessed via a local area LAN, a WAN, and/or a public network (e.g. the Internet) via the network adaptor. Whilst the storage system 440 is shown as separate from the other resources of the system 500, it will be appreciated that the storage system 440 may form part of the remote server 450, or another server such as an email server, or may be a virtual component associated with a cloud computing implementation of the system 500. In yet further examples, the storage system 440 may be located on another server in a different location than the remote server 450.
The system 500 comprises a remote server 450 which may be implemented in hardware, or may be an AWS server or other server provided by a cloud services provider; furthermore, multiple remote servers may be used, each being provided by separate cloud computing service providers to provide the services required to implement the method 200 described above. The remote server 450 may be configured on the same network as the sender and recipient devices 510, 530, or alternatively may be accessed via an external network such as the Internet. It will be appreciated that the remote server 450 may be on the same network as at least one of the sender or recipient devices 510, 530, for example where the remote server 450 belongs to an organization's network and the recipient and/or sender are part of that organization connecting to the organization's network using their respective devices. The sender and recipient devices 510, 530 may interact with the remote server 450 using an API (not shown). The API may be arranged to send and/or receive commands and data between the sender and recipient devices 510, 530, and the remote server 450.
The remote server 450 comprises at least some of the components for implementing method 200 described above in relation to
The remote server 450 comprises a number of modules 452, 454, 456, 458, 460, 462, and 464 arranged to implement the method 200 described above. These modules 452, 454, 456, 458, 460, 462, and 464 may be hardware-implemented or software-implemented and configured to implement at least some of the steps described above with reference to method 200.
The remote server 450 comprises an input module 452 configured to receive at least the electronic communication from the sender who has transmitted the electronic communication to the recipient via a sending device 510. Upon receipt of the electronic communication, a determination module 454 associated with the remote server 450 is configured to determine, on receipt of the electronic communication, whether the electronic communication is potentially malicious. As described above with reference to
Determining whether the electronic communication is a potentially malicious communication may be undertaken in a number of different ways. For example, characteristics associated with previous malicious communications compared with characteristics associated with received electronic communication may be used as an indicator. Other examples of determining whether the electronic communication is a potentially malicious communication include analysing the data contained within the electronic communication, such as the sender address, other recipients, whether there is an attachment to the electronic communication, and the content of any message and/or attachment. Other features of the electronic communication may also be used to determine whether it is malicious, such as the time the electronic communication has been received, data in the header such as redirection information, and an analysis of any hyperlinks within the body of the electronic communication.
Analysing the electronic communication to determine whether it is a potentially malicious communication based on any of the above-mentioned data associated with the received electronic communication, may be undertaken by a machine learning algorithm. Other forms of analysis may also be used as will be appreciated by the skilled person. The analysis of the electronic communication may be based on a plurality of the data to obtain a holistic view as to whether the electronic communication poses a potential threat.
When it is determined that the electronic communication is potentially malicious, at least one pseudo account is instantiated by an instantiation module 456 of the remote server 450. The instantiation module 456 is configured to instantiate pseudo accounts with associated login credentials, for example, a first pseudo account 300 is instantiated with login credentials comprising randomly generated characters and no data, and/or a second pseudo account 310 is instantiated with dummy data representative of an account of the server system 500, and login credentials that are representative of the dummy login credentials for accessing a given account of the server system 500. Further details regarding the first and/or second pseudo accounts 300, 310 are described above in relation to
Following the instantiation of at least one pseudo account 300, 310 a transmission module 458 of the remote server 450 transmits at least the login credentials of the pseudo account(s) 300, 310 to the sending device 510. The transmission module 458 may be configured to transmit the login credentials via a network 520 such as a local area network (LAN), a general wide area network (WAN), and/or a public network (e.g. the Internet), using the previously described network adaptor (not shown).
Once at least the login credentials of the pseudo account(s) 300, 310 have been sent to the sending device 510, the remote server 450 monitors, using a monitoring module 458 for access to the at least one pseudo account 300, 310 using the associated login credentials by a third party who is not associated with any of the accounts maintained by the server system 500. The monitoring module 458 may also be configured to monitor for actions undertaken in the pseudo account(s) 300, 310.
The remote server 450 also comprises an association module 460 for generating an association between characteristics of the access to the pseudo account(s) 300, 310 and the pseudo account(s) 300, 310 themselves. It will be appreciated that a large number of characteristics may be associated with the access, including but not limited to the type of login credentials used for the access, identification information associated with the user accessing the pseudo account(s) 300, 310, and a time of the access to the pseudo account(s) 300, 310. The identification information associated with the user accessing the pseudo account(s) 300, 310 may include information such as an Internet Protocol (IP) address associated with the user's device, the geographic location of the user, and a domain associated with the source of the access. It will be appreciated that other characteristics may also be associated with the access.
In other examples, the characteristics may comprise information associated with one or more actions undertaken by the user when they have gained access to the pseudo account(s) 300, 310 using the login credential provided. Such actions include but are not limited to an attempt to send one or more electronic communications using the pseudo account(s) 300, 310, an attempt to download data associated with the pseudo account(s) 300, 310, and an attempt to change one or more administrative rules associated with the pseudo account(s) 300, 310 such as forwarding rules. Other actions may also be monitored and tracked.
Further information about the access may also be determined based on whether the login credentials of the first and/or second type for the first pseudo account 300 and the second pseudo account 310 respectively have been provided to one or more third parties via an online repository accessible via the Internet. For example, if the login credentials to either of the first or the second pseudo account 300, 310 are detected on known malicious sites, it can be determined that the request for data from the recipient was malicious. Characteristics of that request can then be stored and used when analysing further electronic communications as an indication that a given electronic communication may be malicious.
Once the association has been made between the characteristics and the pseudo account(s) 300, 310, an output module 462 outputs the association to the storage system 440. Whilst the example system 500 shown in
Following the storage of the association in the storage system 440, the association can be used in future determinations to determine whether a request for data from a recipient is likely to be malicious, further improving the accuracy of the detection algorithms used by the determination module 454, for example.
In some examples, the remote server 405 may comprise an analysis module 464 configured to obtain data from one or more repositories 540 via a network 520 such as the Internet. The analysis module 464 analyses the data obtained from these repositories, which may be known to store login credentials that have been maliciously obtained, however, it will be appreciated that the repositories may also store other data. By monitoring such repositories, information about the purpose of the electronic communication 430 sent to the sender can be deduced and used to determine whether future electronic communications are malicious. By using the data from the online repositories 540, further information about accesses to the pseudo account(s) 300, 310 may also be gleaned based on whether the login credentials of the first and/or second type for the first pseudo account 300 and the second pseudo account 310 respectively have been provided to one or more third parties via the online repository 540. For example, if the login credentials associated with either of the first or the second pseudo account 300, 310 are detected on known malicious sites, it can be determined that the request for data from the recipient was malicious. Characteristics of that request can then be stored and used when analysing further electronic communications as an indication that a given electronic communication may be malicious.
In some examples, the remote server 450 may comprise a comparison module 466 to compare characteristics of the pseudo accounts 300, 310, this comparison may feed into an access determination module 468 configured to determine whether access to a given pseudo account is automated or whether it was undertaken by a real-world malicious third party. Determining whether the access was automated may be based on the pseudo account 300, 310 accessed and/or the type of login credentials used. Access to the first pseudo account 300, using the login credentials comprising randomly generated characters may be used to indicate that the access was automated. This is because no real-world malicious third party would analyse the pseudo account and its login credentials and consider them to be representative of a so-called real account. Conversely, if an access is detected to the second pseudo account 310, which comprises data that emulates a so-called ‘real’ account of the server system, and has login credentials of the second type representative of realistic login credentials as described above, this may be indicative of a real-world malicious third party accessing the second pseudo account 310.
The remote server 450 may also comprise an indication module 470 configured to generate an indication to be sent to the recipient device 530 to notify the recipient of the electronic communication of an attempt to access their authorized account. In such an example, the characteristics of the access to the pseudo account(s) 300, 310, such as the time of the access and the attempted actions, may be compared to previous access and/or action information associated with one or more given accounts of the server system, which are stored in a storage system associated with the server system 500. Similarities between the attempted access to the pseudo account(s) 300, 310, and previous access to one or more other accounts may then be used to determine whether the access has the hallmarks of a malicious access. An indication may then be transmitted to the recipient device 530 based on the comparison to alert them to the fact that an attempt to obtain data associated with their account has been prevented. Details regarding the attempt may be provided in the indication, such that the recipient can provide feedback indicating whether it is a malicious access attempt. The recipient's feedback may be stored in the storage system and then used to determine whether future attempts to access the recipient's authorized account (or other recipients with authorized accounts associated with the server system), which have similar characteristics, are malicious or not.
At least some aspects of the embodiments described herein with reference to
It is to be understood that although some of the disclosure above relates to the use of cloud computing, the implementation described is not limited to a cloud computing environment. Rather, embodiments of the present disclosure are capable of being implemented in conjunction with any other type of computing environment.
In the preceding description, for purposes of explanation, numerous specific details of certain examples are set forth. Reference in the specification to “an example” or similar language means that a particular feature, structure, or characteristic described in connection with the example is included in at least that one example, but not necessarily in other examples.
The above embodiments are to be understood as illustrative examples of the disclosure. Further embodiments of the disclosure are envisaged. It is to be understood that any feature described in relation to any one embodiment may be used alone, or in combination with other features described, and may also be used in combination with one or more features of any other of the embodiments, or any combination of any other of the embodiments. Furthermore, equivalents and modifications not described above may also be employed without departing from the scope of the disclosure, which is defined in the accompanying claims.
Number | Date | Country | Kind |
---|---|---|---|
GB2301006.9 | Jan 2023 | GB | national |