{"id":26306,"date":"2023-09-22T12:44:56","date_gmt":"2023-09-22T16:44:56","guid":{"rendered":"https:\/\/www.kaspersky.co.in\/blog\/brand-doppelgangers-dfi\/26306\/"},"modified":"2023-10-05T00:30:37","modified_gmt":"2023-10-04T19:00:37","slug":"brand-doppelgangers-dfi","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.in\/blog\/brand-doppelgangers-dfi\/26306\/","title":{"rendered":"Dangers of your brand&#8217;s doppelgangers"},"content":{"rendered":"<p>As soon as your company becomes more or less famous, more often than not someone starts exploiting your success for their own purposes. At best, they simply hide behind your name in order to promote some dubious quality goods and services. At worst, they prey on your clients, partners, or even employees. The latter \u2013 including the information security department \u2013 often don\u2019t even suspect the existence of malicious doppelgangers until their actions begin to cause a flurry of letters to your customer support, or a scandal on social networks. In any case such incidents negatively affect your company\u2019s reputation. Three types of internet-doppelgangers are the most common.<\/p>\n<h2>Fake apps in stores<\/h2>\n<p>These days, almost every serious business has its own app for convenient customer access to online services \u2013 sometimes more than one. Therefore, it\u2019s no surprise that when you search for this or that app in an online store you get more than one result. Sure, most users will download the most popular option, but most likely some will fall for the scammers\u2019 trick and install a fake one \u2013 especially if they receive a direct link to it. Inside, anything can be lurking \u2013 from a banking Trojan to tools for remote access to your device. Quite recently, our experts <a href=\"https:\/\/www.kaspersky.com\/blog\/telegram-signal-malware-in-google-play\/48937\/\" target=\"_blank\" rel=\"noopener nofollow\">found<\/a> several modified versions of popular instant-messenger apps on Google Play containing spyware code.<\/p>\n<h2>Fake social media accounts<\/h2>\n<p>Social media accounts purporting to relate to your company can be used by criminals in a variety of different schemes. They are often used to spread false information \u2013 to promote some semi-legal (online casinos) or outright fraudulent activities (giveaways for all kinds of prizes, <a href=\"https:\/\/www.kaspersky.com\/blog\/telegram-signal-malware-in-google-play\/48937\/\" target=\"_blank\" rel=\"noopener nofollow\">tickets<\/a> or bitcoins) supposedly affiliated with your brand. However, a fake account can also distribute malicious or phishing links, or serve as a platform for more sophisticated social engineering attacks.<\/p>\n<h2>Phishing sites<\/h2>\n<p>If your website has a member area for clients, partners or employees, then you can rest assured that the personal credentials for their accounts are of interest to attackers. Therefore, you should not be surprised if at some point attackers will try to imitate your site in order to harvest logins and passwords \u2013 at least in order to resell this information to other cybercriminals.<\/p>\n<h2>How to protect a company\u2019s reputation from copy-cats?<\/h2>\n<p>In the vast majority of cases, the target of various illegal schemes involving imitation of your website, app, or a social media account is targeted at someone else (whether individuals or other companies). However, it\u2019s your reputation that suffers. Therefore, such doppelgangers should be identified and eliminated before they can cause significant damage. To share our expertise on this matter and help you to timely detect them we\u2019ve updated our Digital Footprint Intelligence service.<\/p>\n<p>The Kaspersky Digital Footprint Intelligence service is designed to enable customers to monitor their digital footprint and identify potential risks and vulnerabilities associated with it. Some time ago, its functionality was supplemented with monitoring for phishing sites that use brand names or were registered using typosquatting and combosquatting, as well as with a domain takedown service.<\/p>\n<p>Now the service also allows you to track, identify, and take down accounts on social networks and applications in stores that are illegally using your company name. You can learn more about Kaspersky Digital Footprint Intelligence on the <a href=\"https:\/\/dfi.kaspersky.com\/?icid=in_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener nofollow\">solution's website<\/a>.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"mdr\"><input type=\"hidden\" class=\"placeholder_for_banner\" data-cat_id=\"mdr\" value=\"26305\">\n","protected":false},"excerpt":{"rendered":"<p>How to protect a company&#8217;s reputation from illegal use of its name on the internet.<\/p>\n","protected":false},"author":2706,"featured_media":26307,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2036,2609],"tags":[485,76,521],"class_list":{"0":"post-26306","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"tag-digital-footprint","10":"tag-phishing","11":"tag-reputation"},"hreflang":[{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/brand-doppelgangers-dfi\/26306\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/brand-doppelgangers-dfi\/21739\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/brand-doppelgangers-dfi\/28983\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/brand-doppelgangers-dfi\/26589\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/brand-doppelgangers-dfi\/26722\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/brand-doppelgangers-dfi\/29215\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/brand-doppelgangers-dfi\/28066\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/brand-doppelgangers-dfi\/36148\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/brand-doppelgangers-dfi\/49084\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/brand-doppelgangers-dfi\/21825\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/brand-doppelgangers-dfi\/26880\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/brand-doppelgangers-dfi\/32589\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/brand-doppelgangers-dfi\/32246\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.in\/blog\/tag\/digital-footprint\/","name":"digital footprint"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/26306","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/comments?post=26306"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/26306\/revisions"}],"predecessor-version":[{"id":26308,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/26306\/revisions\/26308"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media\/26307"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media?parent=26306"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/categories?post=26306"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/tags?post=26306"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}