The Next Generation of Intellectual Property Protection
Online protection of business reputation
Group-IB Brand Protection supports individual and brand reputation on the Internet. The service monitors negative mentions, analyses their sources and warns of an impending smear campaigns.
Why it is necessary to monitor brand coverage on the Internet
Boost of online usersThere are more than 3.7 billion Internet users around the world, 74% of them actively using social media.
Attacks are swiftIt takes cybercriminals only 2 to 4 days to launch a smear campaign affecting several million users.
Attacks cause huge lossesA major Russian bank lost 22 million dollars within a week in 2014 because of a smear campaign.
How smear campaigns are conducted
Negative reviews published by opinion leaders
Incriminating paid materials or negative information published by opinion leaders attract millions of viewers, provoking viral distribution on the Internet. The coverage is increases each hour, increasing the reputational losses.
Group-IB Brand Protection system monitors 24/7 your brand mentions on blogs, accounts of opinion leaders, media and compromising sites for prompt notification of new negative publications before they can harm you.
Anomalous user activity in social media
Distribution of negative, confidential or knowingly false information about you or your brand causes serious damage to a company's reputation. The highest risk is caused by the publications with a significant user response: likes, comments and shares.
The system automatically tracks discussions of your brand with a high level of user involvement, so that you can quickly respond to negative information.
How Group-IB Brand Protection works
We monitor mentions of your brand on social media (including public pages of popular bloggers), instant messengers, the media, review aggregators, smear websites, in search engines and the dark web 24/7.
We monitor trending topics and identify the sources of smear campaigns using the information distribution evaluation technology.
We inform you about the most widely discussed topics, new smear campaigns and their sources, so that you will be able to resist them.
Group-IB specialists can help to develop a response scenario, to repel a smear campaign, to conduct an investigation and to provide legal support in court.
Find out who launched the smear campaign and how they did it
We discover the entire chain of distribution of negative information and identify smear campaign sources through a detailed analysis. The technology identifying connections between social media accounts enables us to determine if real users or bots posted comments.
Our experienced forensic experts establish the identities of individuals involved in the attack and collect digital evidence to bring the perpetrators to justice. By request, we provide professional legal support in court.
Reputation protection cases
Reputation protection for Sberbank
In early 2015 rumors alleging that Sberbank placed limits on withdrawing funds spread through SMS, email spamming and some websites. People queued up to withdraw their money from the bank’s ATMs on a massive scale. To encourage public panic, the attackers distributed messages via numerous Internet forums seeking people who were interested to “stand in a queue” to specific bank offices.
Massive withdrawals could have caused major damage to the country’s largest bank.
Group-IB specialists provided 24/7 online monitoring of provocative announcements and promptly blocked the most popular topics (including messages seeking people to create artificial queues), as agreed upon by the Bank.
Brand Protection for private person
Ekaterina Mukhina, an editor-in-chief of Elle Russia, is a popular person on Instagram with over 164,000 subscribers. At the end of 2016, cybercriminals compromised her account and extorted money to return control over the profile.
Not only can criminals make discrediting statements acting as a famous person. The main problem is that attackers are not interested in returning control over the account to its real owner. After the ransom is paid, they can continue extorting more money from the victim.
In this case CERT-GIB managed to return control of the account in two days. In some incidents when an account is allegedly hacked by an acquaintance of the victim, Group-IB specialists can also perform an investigation and verify the hypothesis.