Movatterモバイル変換


[0]ホーム

URL:


US20180307844A1 - Using smart groups for simulated phishing training and phishing campaigns - Google Patents

Using smart groups for simulated phishing training and phishing campaigns
Download PDF

Info

Publication number
US20180307844A1
US20180307844A1US15/951,551US201815951551AUS2018307844A1US 20180307844 A1US20180307844 A1US 20180307844A1US 201815951551 AUS201815951551 AUS 201815951551AUS 2018307844 A1US2018307844 A1US 2018307844A1
Authority
US
United States
Prior art keywords
group
user
users
campaign
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US15/951,551
Inventor
Greg Kras
Alin Irimie
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Knowbe4 Inc
Original Assignee
Knowbe4 Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Knowbe4 IncfiledCriticalKnowbe4 Inc
Priority to US15/951,551priorityCriticalpatent/US20180307844A1/en
Assigned to KnowBe4, Inc.reassignmentKnowBe4, Inc.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: IRIMIE, ALIN, KRAS, GREG
Publication of US20180307844A1publicationCriticalpatent/US20180307844A1/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

This disclosure describes systems and methods for adding users to user groups based on interactions with simulated phishing emails and completion of remediation training. The systems and methods allow a server to automatically add a user of a first user group to a second user group responsive to that user interacting with a simulated phishing email that was sent as part of a simulated phishing campaign. For example, the user added to the second user group is removed from the first user group. The systems and methods further allow the server to electronically track the remediation training completed by that user, and responsive to the completion of remediation training, the server may automatically add the user, who is a member of the second user group, back to the first user group (for embodiments where the user was removed from the first user group) or to a third user group.

Description

Claims (20)

What is claimed is:
1. A method for using a dynamically identified group of users by a campaign, the method comprising
(a) establishing, by a server, a group identified by an identifier and comprising criteria for identifying one or more users, the group configured to identify the one or more users matching the criteria dynamically at a time the group is executed;
(b) receiving, by the server, an indication to execute a campaign that identifies the group;
(c) performing, by the server responsive to the campaign, a query of a plurality of users that match the criteria of the group;
(d) adding, by the server, to the campaign the one or more users identified as a result of the query; and
(e) executing, by the server, the campaign for the one or more users.
2. The method ofclaim 1, wherein (a) further comprises establishing the group with a plurality of criteria combined by a logical operator.
3. The method ofclaim 1, wherein (b) further comprises receiving, by the server, a selection of a group from a plurality of groups for use with the campaign.
4. The method ofclaim 1, wherein (b) further comprising receiving, by the server, the indication to start the campaign comprising one of a training campaign or a simulated phishing attack campaign.
5. The method ofclaim 1, wherein (c) further comprising compiling a list of users as members of the group responsive to the query
6. The method ofclaim 1, wherein (d) further comprises adding, by the server, the one or more users to this instance of execution of the campaign.
7. The method ofclaim 6, further comprising no longer associating the one or more users as members of the group upon completion of the campaign.
8. The method ofclaim 1, wherein (e) further comprises executing, by the server, the campaign with the one or more users identified by the group different from a previous execution of the same campaign.
9. The method ofclaim 1, receiving, by the server, a second indication to execute the campaign identifying the group and identifying via a second query a different one or more users for which to run the campaign.
10. The method ofclaim 1, further comprising establishing a plurality of groups in which in which a first group of the plurality of group is used to query the results of the group of the plurality of groups to identify the one or more users using criteria of the first group.
11. A system for using a dynamically identified group of users by a campaign, the system comprising:
a server comprising one or more processors, coupled to memory and configured to:
establish a group identified by an identifier and comprising criteria for identifying one or more users, the group configured to identify the one or more users matching the criteria dynamically at a time the group is executed;
receive an indication to execute a campaign that identifies the group;
perform, responsive to the campaign, a query of a plurality of users that match the criteria of the group;
add to the campaign the one or more users identified as a result of the query; and
execute the campaign for the one or more users.
12. The system ofclaim 11, wherein the group comprises a plurality of criteria combined by a logical operator.
13. The system ofclaim 11, wherein the server is further configured to receive a selection of a group from a plurality of groups for use with the campaign.
14. The system ofclaim 11, wherein the server is further configured to receive the indication to start the campaign comprising one of a training campaign or a simulated phishing attack campaign.
15. The system ofclaim 11, wherein the server is further configured to compile a list of users as members of the group responsive to the query
16. The system ofclaim 11, wherein the server is further configured to add the one or more users to this instance of execution of the campaign.
17. The system ofclaim 16, wherein the one or more users are no longer associated as members of the group upon completion of the campaign.
18. The system ofclaim 11, wherein the server is further configured to execute the campaign with the one or more users identified by the group different from a previous execution of the same campaign.
19. The system ofclaim 11, wherein the server is further configured to receive a second indication to execute the campaign identifying the group and identifying via a second query a different one or more users for which to run the campaign.
20. The system ofclaim 11, wherein the server is further configured to establish a plurality of groups in which a first group of the plurality of group is used to query the results of the group of the plurality of groups to identify the one or more users using criteria of the first group.
US15/951,5512017-04-212018-04-12Using smart groups for simulated phishing training and phishing campaignsAbandonedUS20180307844A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US15/951,551US20180307844A1 (en)2017-04-212018-04-12Using smart groups for simulated phishing training and phishing campaigns

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
US201762488474P2017-04-212017-04-21
US15/951,551US20180307844A1 (en)2017-04-212018-04-12Using smart groups for simulated phishing training and phishing campaigns

Publications (1)

Publication NumberPublication Date
US20180307844A1true US20180307844A1 (en)2018-10-25

Family

ID=62104401

Family Applications (6)

Application NumberTitlePriority DateFiling Date
US15/951,551AbandonedUS20180307844A1 (en)2017-04-212018-04-12Using smart groups for simulated phishing training and phishing campaigns
US15/958,644ActiveUS10581868B2 (en)2017-04-212018-04-20Using smart groups for computer-based security awareness training systems
US16/750,580ActiveUS10812493B2 (en)2017-04-212020-01-23Using smart groups for computer-based security awareness training systems
US17/074,079ActiveUS11122051B2 (en)2017-04-212020-10-19Using smart groups for computer-based security awareness training systems
US17/473,464ActiveUS11349849B2 (en)2017-04-212021-09-13Using smart groups for computer-based security awareness training systems
US17/826,566Active2038-07-06US12047383B2 (en)2017-04-212022-05-27Using smart groups for computer-based security awareness training systems

Family Applications After (5)

Application NumberTitlePriority DateFiling Date
US15/958,644ActiveUS10581868B2 (en)2017-04-212018-04-20Using smart groups for computer-based security awareness training systems
US16/750,580ActiveUS10812493B2 (en)2017-04-212020-01-23Using smart groups for computer-based security awareness training systems
US17/074,079ActiveUS11122051B2 (en)2017-04-212020-10-19Using smart groups for computer-based security awareness training systems
US17/473,464ActiveUS11349849B2 (en)2017-04-212021-09-13Using smart groups for computer-based security awareness training systems
US17/826,566Active2038-07-06US12047383B2 (en)2017-04-212022-05-27Using smart groups for computer-based security awareness training systems

Country Status (3)

CountryLink
US (6)US20180307844A1 (en)
EP (2)EP4044055B1 (en)
WO (2)WO2018194906A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20190319983A1 (en)*2018-04-112019-10-17Barracuda Networks, Inc.Method and apparatus for neutralizing real cyber threats to training materials
CN114430405A (en)*2021-12-172022-05-03北京飞讯数码科技有限公司 An instant communication method, device, equipment and storage medium for command terminal
US11488490B2 (en)*2019-05-072022-11-01Vantage PointServer, system, and method for immersive training
US12003536B2 (en)2019-01-172024-06-04IT-Seal GmbHMethod for the automated creation of a phishing document addressed to a predefined person

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US10812527B2 (en)*2017-12-012020-10-20KnowBe4, Inc.Systems and methods for aida based second chance
US10749890B1 (en)2018-06-192020-08-18Architecture Technology CorporationSystems and methods for improving the ranking and prioritization of attack-related events
US10917439B2 (en)*2018-07-162021-02-09Securityadvisor Technologies, Inc.Contextual security behavior management and change execution
US11429713B1 (en)*2019-01-242022-08-30Architecture Technology CorporationArtificial intelligence modeling for cyber-attack simulation protocols
US11128654B1 (en)2019-02-042021-09-21Architecture Technology CorporationSystems and methods for unified hierarchical cybersecurity
AU2020262970A1 (en)*2019-04-232021-11-11Commonwealth Scientific And Industrial Research OrganisationMitigation of phishing risk
US11403405B1 (en)2019-06-272022-08-02Architecture Technology CorporationPortable vulnerability identification tool for embedded non-IP devices
US11444974B1 (en)2019-10-232022-09-13Architecture Technology CorporationSystems and methods for cyber-physical threat modeling
US11503075B1 (en)2020-01-142022-11-15Architecture Technology CorporationSystems and methods for continuous compliance of nodes
US11928212B2 (en)*2020-06-152024-03-12Proofpoint, Inc.Generating simulated spear phishing messages and customized cybersecurity training modules using machine learning
US12160441B2 (en)*2020-07-022024-12-03Proofpoint, Inc.Modeling simulated cybersecurity attack difficulty
US11552982B2 (en)2020-08-242023-01-10KnowBe4, Inc.Systems and methods for effective delivery of simulated phishing campaigns
US11297095B1 (en)*2020-10-302022-04-05KnowBe4, Inc.Systems and methods for determination of level of security to apply to a group before display of user data
CN113347511B (en)*2021-05-242023-05-12广西电网有限责任公司Method, device and system for defending hop-by-hop attack in optical transmission network
US20230046788A1 (en)*2021-08-162023-02-16Capital One Services, LlcSystems and methods for resetting an authentication counter
US12355789B2 (en)*2021-08-182025-07-08KnowBe4, Inc.Auto smart groups trend analytics
US20230308471A1 (en)*2022-02-282023-09-28KnowBe4, Inc.Determining template difficulty based on security maturity
US12284224B1 (en)*2023-10-032025-04-22strongDM, Inc.Virtualized permission and security enforcement
US12242599B1 (en)2024-09-272025-03-04strongDM, Inc.Fine-grained security policy enforcement for applications
US12348519B1 (en)2025-02-072025-07-01strongDM, Inc.Evaluating security policies in aggregate
US12432242B1 (en)2025-03-282025-09-30strongDM, Inc.Anomaly detection in managed networks

Family Cites Families (74)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US7599992B2 (en)2002-02-222009-10-06Uievolution, Inc.Autonomous rendering of email attachments
US9384348B2 (en)2004-04-292016-07-05James A. RoskindIdentity theft countermeasures
US8041769B2 (en)2004-05-022011-10-18Markmonitor Inc.Generating phish messages
US8165893B1 (en)*2005-02-162012-04-24Ideal Life Inc.Medical monitoring and coordinated care system
US7577424B2 (en)2005-12-192009-08-18Airdefense, Inc.Systems and methods for wireless vulnerability analysis
US9171419B2 (en)2007-01-172015-10-27Touchtunes Music CorporationCoin operated entertainment system
US8464346B2 (en)2007-05-242013-06-11Iviz Techno Solutions Pvt. LtdMethod and system simulating a hacking attack on a network
US8769684B2 (en)2008-12-022014-07-01The Trustees Of Columbia University In The City Of New YorkMethods, systems, and media for masquerade attack detection by monitoring computer user behavior
US20100211641A1 (en)2009-02-162010-08-19Microsoft CorporationPersonalized email filtering
WO2012068255A2 (en)2010-11-162012-05-24Art FritzsonSystems and methods for identifying and mitigating information security risks
RU2453917C1 (en)2010-12-302012-06-20Закрытое акционерное общество "Лаборатория Касперского"System and method for optimising execution of antivirus tasks in local area network
US9558677B2 (en)2011-04-082017-01-31Wombat Security Technologies, Inc.Mock attack cybersecurity training system and methods
WO2012139127A1 (en)2011-04-082012-10-11Wombat Security Technologies, Inc.Context-aware training systems, apparatuses, and methods
US9373267B2 (en)2011-04-082016-06-21Wombat Security Technologies, Inc.Method and system for controlling context-aware cybersecurity training
US10749887B2 (en)2011-04-082020-08-18Proofpoint, Inc.Assessing security risks of users in a computing network
US20150229664A1 (en)*2014-02-132015-08-13Trevor Tyler HAWTHORNAssessing security risks of users in a computing network
US9824609B2 (en)2011-04-082017-11-21Wombat Security Technologies, Inc.Mock attack cybersecurity training system and methods
US8484741B1 (en)*2012-01-272013-07-09Chapman Technology Group, Inc.Software service to facilitate organizational testing of employees to determine their potential susceptibility to phishing scams
US9241009B1 (en)2012-06-072016-01-19Proofpoint, Inc.Malicious message detection and processing
US9215242B2 (en)2012-12-192015-12-15Dropbox, Inc.Methods and systems for preventing unauthorized acquisition of user information
US9253207B2 (en)2013-02-082016-02-02PhishMe, Inc.Collaborative phishing attack detection
US8966637B2 (en)2013-02-082015-02-24PhishMe, Inc.Performance benchmarking for simulated phishing attacks
US9053326B2 (en)2013-02-082015-06-09PhishMe, Inc.Simulated phishing attack with sequential messages
US9356948B2 (en)2013-02-082016-05-31PhishMe, Inc.Collaborative phishing attack detection
US9398038B2 (en)2013-02-082016-07-19PhishMe, Inc.Collaborative phishing attack detection
GB2520987B (en)2013-12-062016-06-01Cyberlytic LtdUsing fuzzy logic to assign a risk level profile to a potential cyber threat
US9262629B2 (en)2014-01-212016-02-16PhishMe, Inc.Methods and systems for preventing malicious use of phishing simulation records
FR3016998B1 (en)2014-01-292022-08-26Etude Et Realisation De Materiels Electroniques Speciaux Ermes DEVICE FOR VISUALIZING PHOTON RADIATION, SUITABLE FOR WORKING IN A RADIOACTIVE ENVIRONMENT AND CAMERA USING SUCH DEVICE
US20150287336A1 (en)2014-04-042015-10-08Bank Of America CorporationAutomated phishing-email training
US9398029B2 (en)2014-08-012016-07-19Wombat Security Technologies, Inc.Cybersecurity training system with automated application of branded content
US20190215335A1 (en)2014-10-302019-07-11Ironscales Ltd.Method and system for delaying message delivery to users categorized with low level of awareness to suspicius messages
US9398047B2 (en)2014-11-172016-07-19Vade Retro Technology, Inc.Methods and systems for phishing detection
US9419989B2 (en)2014-12-152016-08-16Sophos LimitedThreat detection using URL cache hits
US9648036B2 (en)2014-12-292017-05-09Palantir Technologies Inc.Systems for network risk assessment including processing of user access rights associated with a network of devices
AU2016215226A1 (en)2015-02-052017-08-17Phishline, LlcSocial engineering simulation workflow appliance
US9253208B1 (en)2015-03-052016-02-02AO Kaspersky LabSystem and method for automated phishing detection rule evolution
US9906539B2 (en)2015-04-102018-02-27PhishMe, Inc.Suspicious message processing and incident response
WO2016164844A1 (en)2015-04-102016-10-13PhishMe, Inc.Message report processing and threat prioritization
JP2018517204A (en)2015-04-142018-06-28フィッシュライン, エルエルシーPhishLine, LLC A system for susceptibility analysis and benchmarking for social engineering based on characterization attributes and themes
US9892260B2 (en)2015-04-202018-02-13SafeBreach Ltd.System and method for creating and executing breach scenarios utilizing virtualized elements
US9635052B2 (en)2015-05-052017-04-25Christopher J. HADNAGYPhishing as-a-service (PHaas) used to increase corporate security awareness
US9729573B2 (en)2015-07-222017-08-08Bank Of America CorporationPhishing campaign ranker
US9942249B2 (en)2015-07-222018-04-10Bank Of America CorporationPhishing training tool
US10110623B2 (en)*2015-07-222018-10-23Bank Of America CorporationDelaying phishing communication
IL248241B (en)2015-10-122020-04-30Verint Systems LtdSystem and method for assessing cybersecurity awareness
US9674213B2 (en)*2015-10-292017-06-06Duo Security, Inc.Methods and systems for implementing a phishing assessment
US10021126B2 (en)2016-02-262018-07-10KnowBe4, Inc.Systems and methods for creating and running heterogeneous phishing attack campaigns
US9998480B1 (en)2016-02-292018-06-12Symantec CorporationSystems and methods for predicting security threats
US10432656B2 (en)2016-04-282019-10-01Shevirah Inc.Method and system for assessing data security
US10069856B2 (en)2016-05-132018-09-04King Abdulaziz City For Science And TechnologySystem and method of comparative evaluation for phishing mitigation
US10986122B2 (en)2016-08-022021-04-20Sophos LimitedIdentifying and remediating phishing security weaknesses
US9912687B1 (en)2016-08-172018-03-06Wombat Security Technologies, Inc.Advanced processing of electronic messages with attachments in a cybersecurity system
US10855706B2 (en)2016-10-112020-12-01Battelle Memorial InstituteSystem and methods for automated detection, reasoning and recommendations for resilient cyber systems
US11044267B2 (en)2016-11-302021-06-22Agari Data, Inc.Using a measure of influence of sender in determining a security risk associated with an electronic message
US9876753B1 (en)2016-12-222018-01-23Wombat Security Technologies, Inc.Automated message security scanner detection system
US10243904B1 (en)2017-05-262019-03-26Wombat Security Technologies, Inc.Determining authenticity of reported user action in cybersecurity risk assessment
US11119632B2 (en)2018-01-032021-09-14Mimecast Services Ltd.Systems and methods for proactive analysis of artifacts associated with information resources
US10924517B2 (en)2018-02-072021-02-16Sophos LimitedProcessing network traffic based on assessed security weaknesses
DE102018113994A1 (en)2018-06-122019-12-12IT-Seal GmbH A method of determining a level of deception for a single phishing attack against a person
LU101105B1 (en)2019-01-172020-07-17It Seal Gmbh Process for the automated creation of a phishing document addressed to a specified person
US11481486B2 (en)2019-03-272022-10-25Webroot Inc.Behavioral threat detection engine
US12034767B2 (en)2019-08-292024-07-09Darktrace Holdings LimitedArtificial intelligence adversary red team
US11489868B2 (en)2019-09-052022-11-01Proofpoint, Inc.Dynamically initiating and managing automated spear phishing in enterprise computing environments
US11729200B2 (en)2019-12-122023-08-15Proofpoint, Inc.Dynamic message analysis platform for enhanced enterprise security
US10904186B1 (en)2020-03-272021-01-26Etorch, Inc.Email processing for enhanced email privacy and security
US11847935B2 (en)2020-06-242023-12-19Proofpoint, Inc.Prompting users to annotate simulated phishing emails in cybersecurity training
US12160441B2 (en)2020-07-022024-12-03Proofpoint, Inc.Modeling simulated cybersecurity attack difficulty
US20220005373A1 (en)2020-07-022022-01-06Proofpoint, Inc.Dynamically Adapting Cybersecurity Training Templates Based on Measuring User-Specific Phishing/Fraud Susceptibility
US11297094B2 (en)2020-08-242022-04-05CyberCatch, Inc.Automated and continuous cybersecurity assessment with measurement and scoring
US11973799B2 (en)2020-09-042024-04-30Proofpoint, Inc.Domain name processing systems and methods
CA3131635A1 (en)2020-09-242022-03-24University Of WindsorSystem and method for social engineering cyber security training
US11184393B1 (en)2020-10-012021-11-23Vade Secure Inc.Automated collection of branded training data for security awareness training
US20220130274A1 (en)2020-10-262022-04-28Proofpoint, Inc.Dynamically Injecting Security Awareness Training Prompts Into Enterprise User Flows
US12052208B2 (en)2021-03-022024-07-30Proofpoint, Inc.System and method for improving detection of bad content by analyzing reported content

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Hawthorn US Pub No 2015/0229664*

Cited By (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20190319983A1 (en)*2018-04-112019-10-17Barracuda Networks, Inc.Method and apparatus for neutralizing real cyber threats to training materials
US11145221B2 (en)*2018-04-112021-10-12Barracuda Networks, Inc.Method and apparatus for neutralizing real cyber threats to training materials
US11645943B2 (en)2018-04-112023-05-09Barracuda Networks, Inc.Method and apparatus for training email recipients against phishing attacks using real threats in realtime
US12003536B2 (en)2019-01-172024-06-04IT-Seal GmbHMethod for the automated creation of a phishing document addressed to a predefined person
US11488490B2 (en)*2019-05-072022-11-01Vantage PointServer, system, and method for immersive training
CN114430405A (en)*2021-12-172022-05-03北京飞讯数码科技有限公司 An instant communication method, device, equipment and storage medium for command terminal

Also Published As

Publication numberPublication date
US20220294801A1 (en)2022-09-15
US20210409418A1 (en)2021-12-30
US10581868B2 (en)2020-03-03
US11349849B2 (en)2022-05-31
US11122051B2 (en)2021-09-14
EP4044055B1 (en)2025-04-02
US20180309764A1 (en)2018-10-25
EP4044055A1 (en)2022-08-17
US10812493B2 (en)2020-10-20
WO2018195445A1 (en)2018-10-25
EP3613190A1 (en)2020-02-26
US20210037021A1 (en)2021-02-04
US12047383B2 (en)2024-07-23
EP3613190B1 (en)2022-06-08
WO2018194906A1 (en)2018-10-25
US20200162475A1 (en)2020-05-21

Similar Documents

PublicationPublication DateTitle
US11349849B2 (en)Using smart groups for computer-based security awareness training systems
US11431747B2 (en)Systems and methods for an artificial intelligence driven agent
US11792225B2 (en)Systems and methods for subscription management of specific classification groups based on user's actions
US9781160B1 (en)Systems and methods for discovering suspect bot IP addresses and using validated bot IP address to ignore actions in a simulated phishing environment
US12081574B2 (en)Systems and methods for performing a simulated phishing attack

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:KNOWBE4, INC., FLORIDA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KRAS, GREG;IRIMIE, ALIN;REEL/FRAME:045522/0908

Effective date:20180326

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp