Overview
What is Phish Report?
Phish Report, developed by Phish Report Ltd, is a brand protection service designed to assist organizations in detecting, disrupting, and deterring consumer phishing attacks. According to the vendor, Phish Report offers various features that can benefit businesses of all sizes. These features include:...
Leaving a review helps other professionals like you evaluate Email Spam Filter Software
Be the first one in your network to review Phish Report, and make your voice heard!
Get StartedPricing
Entry-level set up fee?
- No setup fee
Offerings
- Free Trial
- Free/Freemium Version
- Premium Consulting/Integration Services
Would you like us to let the vendor know that you want pricing?
Alternatives Pricing
Product Details
- About
- Tech Details
What is Phish Report?
Phish Report, developed by Phish Report Ltd, is a brand protection service designed to assist organizations in detecting, disrupting, and deterring consumer phishing attacks. According to the vendor, Phish Report offers various features that can benefit businesses of all sizes. These features include:
Automated phishing site analysis: Phish Report automatically analyzes phishing sites, identifies the best ways to report them, and speeds up the takedown process. It goes beyond WHOIS lookups and utilizes a verified abuse contact database to determine the true hosting provider. Phish Report captures evidence screenshots using a real Chrome browser and can detect and bypass anti-analysis techniques.
Collaborate on cases with your team: The Phish Report case timeline tracks every report sent by the team and the response from the hosting provider, ensuring efficient collaboration. It helps avoid duplicating effort, enables follow-up with unresponsive hosting providers, and allows users to understand the timeline of an attack.
Classify known phishing kits and discover new variants: Phish Report's open-source language enables users to create detections for phishing kits impersonating their brand. It scans millions of domains daily, checking each against signatures of phishing kits to identify matches. Real-time alerts are triggered as soon as a new site matches signatures for a specific brand.
Website monitoring and takedown: Phish Report ingests millions of URLs daily from threat intelligence feeds, scanning for abuse. Real-time feeds of new URLs allow users to detect phishing sites within minutes of their creation. It checks every registered domain name for brand impersonation and can identify malicious sites attempting to hide on compromised hosts.
Analyse a phishing site: Users can analyze a phishing site by entering its URL and selecting specific conditions like country and user agent. Phish Report provides automated analysis and captures evidence screenshots using a real Chrome browser. It also identifies known threat actors, anti-analysis techniques, and specific phishing kits in use on a page.
Indicator Of Kit: Phish Report offers open-source detection rules for phishing site techniques, kits, and threat actors. These simple detection rules, based on Sigma language, come with descriptions, tags, and links to related resources. Users can use these rules to identify fingerprints of known threat actors, discover anti-analysis techniques, and classify specific phishing kits.
Look up the hosting providers for any website: Phish Report uses a combination of WHOIS data, RDAP, and a curated list of shared hosting providers to identify website hosting providers. WHOIS data provides details about domain ownership and registration, RDAP offers a standardized format for accessing registration data, and the curated list enhances the identification process.
Phishing detection doesn't have to be a black box: Phish Report scans millions of sites daily, looking for abuse and impersonation of brands. Simple signatures are used to scan each site, alerting users if any match their brand's impersonation. Real-time URL feeds and accurate detection signatures ensure high-confidence alerts.
Phish Report Features
- Supported: Reporting/Analytics
- Supported: Spam Blocker
- Supported: Spam Detection
Phish Report Technical Details
Deployment Types | Software as a Service (SaaS), Cloud, or Web-Based |
---|---|
Operating Systems | Web-Based |