Menu
bg-impersonation

Impersonations and Fake Account Detection

Make sure that the only accounts, sites, and apps that reach your customers are yours

Find and stop fake accounts, emails, and domains

Opportunistic cybercriminals see the brand you’ve worked hard to build, and they want to profit from it, too. Fake social media profiles, email impersonations, and spoofed domains are used to launch phishing campaigns, scam customer, distribute counterfeit and pirated content, traffic in stolen intellectual property, and perpetrate social engineering attacks. In short, they put your good name to work for their criminal activity.

How does an impersonation attack work?

An impersonation attack targets businesses and high profile individuals and creates a fraudulent account using that company’s or individual’s digital assets. Then, using the fake accounts, bad actors gain access to, and the trust of, your connections, exploiting them for financial gain or personal data.. When the target interacts with malicious infrastructure, their data may be stolen or spyware may be installed and used to steal their access credentials for secure systems.

We find the fakes so you don’t have to.

Malicious hackers create fake accounts using your branded digital assets, making it difficult for customers and employees to distinguish between the real and fake pages. Manually finding these fakes takes hours. We can find them in minutes and get them taken down for you.

Brand attacks and impersonations are growing

%

The percentage of year-over-year increase in security incidents relating to impersonation scams

%

Increase in HR scams, such as impersonating a company’s HR department to steal information

%

Year-over-year increase in impersonating profiles

impersonation-block1_v2

Why ZeroFox for account takeover protection? We pull off the mask on impersonators.

AUTOMATED FAKE ACCOUNT DETECTION ACROSS SOCIAL, EMAIL, AND WEB
Identify fraudulent profiles on social media platforms, impersonating email accounts, and spoofed domains in real-time.

DISMANTLE AND TAKEDOWN FRAUD AND ATTACK INFRASTRUCTURE
Take down fake social profiles, dismantle email infrastructure, and shut down spoofed domains with the industry-leading automated takedown capability.

STOP FRAUD AND SCAMS IN THEIR TRACKS
Keep your customers safe when they engage with your brand by eliminating digital fraud across the web – in their inbox, social media accounts, and mobile app stores.

impersonation-block2_v2

Don’t wait for followers to find impersonators. Explore our impersonation detection solutions.

BRAND PROTECTION
Protect your organization, reputation, and revenue against targeted attacks including phishing, impersonations, fraud, and piracy.

Learn more >

DOMAIN PROTECTION
Protect owned websites through identification and remediation of impersonating domains, trademark infringement, and spoofing.

Learn more >

EXECUTIVE PROTECTION
Protect key personnel against spear phishing attacks, impersonations, account hacking, violence, threats, and more.

Learn more >

bg

See ZeroFox in action

Frequently asked questions

An impersonation attack works by targeting businesses and high profile individuals and creating a fraudulent account using that person’s or company’s owned digital assets. Then, using the impersonating accounts, bad actors are able to gain access to, and the trust of, your followers or connections to exploit them for financial gain, personal information, or other relevant data. When the target interacts with malicious infrastructure, their data may be stolen or spyware may be installed on their machine and used to steal their access credentials for secure systems.

Resources