×

Method and system for assessing data security

  • US 10,432,656 B2
  • Filed: 04/28/2016
  • Issued: 10/01/2019
  • Est. Priority Date: 04/28/2016
  • Status: Active Grant
First Claim
Patent Images

1. A method for conducting a simulated phishing attack on one or more phishing attack target devices associated with an administrator, comprising:

  • selecting, with a processor, one or more phishing attack target devices from a plurality of phishing attack target devices,generating, with the processor, a test message intended for the one or more phishing attack target devices, the test message comprising a message body and a message hyperlink referring to a website associated with the administrator, andsending, with the processor, the test message intended for the one or more phishing attack target devices to the one or more phishing attack target devices;

    electronically recording, in a computer readable storage medium, one or more devices that have accessed the website;

    identifying, with the processor, a device in the one or more devices that have accessed the website that is also a phishing attack target device in the one or more phishing attack target devices, and identifying a user associated with the device;

    prompting the user associated with the device to authorize a download of a malicious app from the website, and, after the authorization is received, downloading the malicious app;

    installing a malicious app on a phishing attack target device, and, upon initiation of the malicious app, identifying, with the malicious app, at least one phishing attack target device vulnerability;

    installing, from the malicious app, on a phishing attack target device that has downloaded the malicious app, using the at least one phishing attack target device vulnerability, an on-device agent configured to automatically send test messages using the processor of the phishing attack target device, the on-device agent further configured to scan a memory of the phishing attack target device using the processor of the phishing attack target device for at least one of;

    personal data, corporate data, network information, an exploitable device vulnerability created by one or more of the user'"'"'s programs, or an exploitable network vulnerability created by the presence of the phishing attack target device on the network;

    retrieving, from the memory of the phishing attack target device, contact information for a second phishing attack target device of another user, and automatically sending, with the on-device agent and using the processor of the phishing attack target device, a second test message directly to the second phishing attack target device, the second test message comprising a second message body and a second message hyperlink referring to the website; and

    automatically enrolling, with the processor, the user in a security course.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×