How RPost's AI Technology Stops Cybercriminals Using Generative AI for Impersonation Fraud

How RPost's AI Technology Stops Cybercriminals Using Generative AI for Impersonation Fraud

October 04, 2024 / in Blog / by Zafar Khan, RPost CEO

Unimaginable Identity Thieves - They Steal Your ID to Trick YOUR Colleagues.

Armand here, your sporty armadillo product evangelist of all things RPost. Rather than show my sporty side this week, I thought I would get back to security tech, as there is a new trend that you and all your staff, clients, and colleagues should be aware of. (By the way, you can read my sporty article about the Oakland A’s and cybercrime, here)

A cadre of sophisticated cybercriminals have learned that a combination of researching targets, gathering contextual information by eavesdropping on targets through compromised email accounts, patience, and generative AI are powering up their approach and their (stolen funds) earnings. They are today, for example, using generative AI tools to rapidly spin up online content across web and social media platforms that enhance the trickery in their impersonation schemes through properly written (language, grammar, context) content to support their Seller, Supplier, Staffing, Customer, and Advisor Impersonated identities. 

Ultimately, these complex single and multi-party impersonation schemes are very hard for people going about their normal business to see. Simply put, RPost empowers staff to see the unseen. This is next-gen Business Email Compromise wire fraud trickery; seller, supplier, advisor impersonation fraud that often leads to cybercriminals luring one’s staff, clients, and clients’ clients into mis-sending funds, paying fake invoices, or sending transaction closing funds to a cybercriminal account. Staffing fraud can be much more nefarious, with aim to gain access to systems and ultimately exfiltrate data and offer to return it for ransom or lock critical files in a ransomware schema.

Researchers are seeing a massive uptick in cyber impersonation crimes, where the cybercriminal uses extracted information from email and documents accessed via compromised email accounts to then drop this contextual information into GenAI tools to rapidly spin up impostor schemes that appear authentic, and provide a colorful backdrop on social media, websites, and in email domain names.

In the eyes of the unsuspecting target, this validates the persona that the cybercriminal is portraying for the purpose of (a) gaining access to systems often via staffing impersonation that results in ransomware or exfiltration of data, (b) tricking into mis-sends of money due to consultant/advisor or seller impersonation often resulting in sending large amounts of transaction or invoice related funds to cybercriminal accounts, or (c) receiving mis-sent goods purchased on credit of others (impersonated party, customer impersonation) with the goods being received and swiftly sold.

Fortunately, RPost has a winning solution here, RPost just announced (read news here) updates to its security AI model to tackle emerging impersonation fraud. This RPost technology update identifies cybercriminal impersonation fraud and automatically locks out the cybercriminals in the early stages of their attack. This RPost Impostor Detection™ technology builds on RPost’s Eavesdropping AI™ model and its Right Recipient™ and AI Auto-Lock™ services to protect across all RPost’s products: RMail® email and file share security, Registered™ email and text message compliance, RDocs™ document controls, and RSign® digital transactions, forms, and eSignatures.

In my humble armadillo opinion, this RPost security AI is really a must-have, as there is no easy way for inbound filters to detect this and those in the midst of transactions are often distracted by the flurry of back-and-forth to get the deal done and don’t see these impersonation schemes inserted into the message and digital document flow. Cybercriminals today are targeting across business operations. You are a target. You are being researched. Your invoice, procurement, human resources, contract management, accounting, payroll, billing, collections, M&A, and legal operations are high risk today for these newer impersonation schemes.

It’s great that RPost has a solution for this impersonation fraud – an affordable solution easy to install into Microsoft and other platforms.

This builds on RPost’s inspiration for continuous innovation. For this reason among others, as you know, RPost received accolades by IDC naming RPost a worldwide leader in eSignatures (see IDC quadrant chart), Aragon Research named RPost a worldwide leader in digital transaction management (see chart) and innovator in enterprise content platforms (read news), Frost & Sullivan named RPost a leader, among others, due in part to its newest AI-infused security. Among these innovations are RPost AI Auto-Lock™ leak-un-leak technology that automatically locks document attachments, file share links, agreements, and more just as a cybercriminal is attempting to eavesdrop on content with aim to use context to build an impersonation attack.

Visit RPost at the Gartner ITxpo in Orlando, stand #744, and/or register for RPost’s pre-conference webinar covering this topic (register here).