Executive Guardian
Your organization’s leadership is 12 times more likely to be the target of a security incident and nine times more likely to be the target of a data breach than they were last year. Find out how they can be protected.
Read the Datasheet
Gift Cardsharks: The Massive Threat Campaigns Circling Beneath the Surface
Learn about the attack group primarily targeting gift card retailers and the monetization techniques they use.
Get the Report
Threat Hunting Workshop Series
Join one of our security threat hunting workshops to get hands-on experience investigating and remediating threats.
Attend an Upcoming Workshop
Inside Magecart: New RiskIQ & Flashpoint Research Report
Learn about the groups and criminal underworld behind the front-page breaches.
Threat Hunting Guide: 3 Must-Haves for the Effective Modern Threat Hunter
The threat hunting landscape is constantly evolving. Learn the techniques, tactics, and tools needed to become a highly-effective threat hunter.
Modern cyber security organizations face significant challenges in the mobile space. Companies like DocuSign use mobile as a competitive advantage and offer a feature-rich user experience. However, its challenge is ensuring external forces external aren’t exploiting DocuSign’s mobile users.
A common misconception is that the mobile application ecosystem is controlled by a small number of well-known tech giants like Google and Apple. However, more than 150 global mobile app stores have well-stocked inventories, totaling more than 10 million mobile apps and counting.
Due to the diversity and global nature of the mobile app ecosystem, regulations are impossible to enforce. Unfortunately, a common practice is for unauthorized third parties to copy and re-insert branded mobile apps into one or many stores with impunity.
Rogue developers also create apps designed to look, feel and act like a brand. The end goal is to use the brand’s value and reputation to attract more users.
In all this mess lurks the cyber thieves whom leverage the same methods mentioned above. Since all mobile apps come pre-configured with data capturing permissions, cyber thieves don’t even need to use malware in most cases to access the desired data.
Users are trained to accept permissions as a prerequisite for downloading mobile apps. Very few would question why a flashlight app is asking for access to their contacts, camera, calendar, accounts, etc.
As a Digital Transaction Management (DTM) platform, DocuSign takes cyber security of its customers, company and employees very seriously. RiskIQ plays a critical role in ensuring DocuSign’s ability to maintain the integrity of its platform, including mobile apps:
“Vendors like RiskIQ are critical to any fast growing and dynamic company. We look to scalable automation to help manage our digital footprint and integrity of our online presence. RiskIQ allows us to continue our rapid worldwide growth while helping to ensure a trusted global network for our customers to transact business,” said Vanessa Pegueros, Chief Information Security Officer for DocuSign.
DocuSign turned to RiskIQ because of the convenience of our SaaS based system and our technology. RiskIQ’s solution for digital footprint security discovers, inventories and monitors all apps associated with DocuSign to detect potential cyber security threats. This allows DocuSign to proactively mitigate risk and enforce their cyber security policies.
Many brands underestimate how many potentially harmful apps have already been created in their name and don’t monitor the bulk of the ecosystem for potential cyber threats. These cyber threats come in the form of mobile apps that look, feel and act like they’re legitimate, easily fooling customers or employees. For detailed information on your organization, please request to be contacted: https://www.riskiq.com/contact or reach out directly via social media @riskiq.
RiskIQFollow
RiskIQ is the leader in attack surface management. We help organizations discover, understand, and mitigate exposures across all digital channels.
RiskIQ's #COVID19 Daily Update for 4/1: ➡️Pentagon to send 2,000 ventilators to #FEMA and the #HHS ➡️US intelligence: China has under-reported cases and fatalities ➡️Carnival Cruise Line will raise ~ $6 billion in debt & equity Read the full update here: https://bit.ly/2Uv3CMV
RiskIQ's #COVID19 Daily #Cybercrime Update for 3/31: ➡️RiskIQ observed a large Iranian #malware campaign impersonating official #WHO representative ➡️#WHOIS reliability issues fueling COVID-19 cybercrime ➡️Updated #spam stats Read the full update here: https://bit.ly/2QwfRHS
"As we’re now all isolating ourselves and homebound, it means online purchases will spike and makes it a prime time for criminals." - @ydklijnsma. Read more about the 20% spike in #Magecart due to #COVID19 in @WIRED https://bit.ly/2UVaC5E
RiskIQ's #COVID19 Daily Update for 3/30: ➡️The U.S. confirms cases jumped by 108,302 (+307%) ➡️FBI warns hospitals of supply-chain scams ➡️FDA issues emergency authorization for the use of hydroxychloroquine and chloroquine Read the full update here: https://bit.ly/2Uv3CMV
According to @campuscodi, @sniko_ was able to use @PassiveTotal to link nine malicious QR code generator sites that have stolen $46,000 to three web servers, which hosted 450+ other websites—all with "shady-looking domains." Read more in @ZDNet https://zd.net/2QRPjkq