Methods and systems for implementing a phishing assessment

ABSTRACT

A system, method, and computer program product for implementing a phishing assessment of a target computer network that includes a phishing assessment platform for generating parameters for the phishing assessment; generating the phishing assessment parameters includes identifying a target domain name for the phishing assessment; identifying a pseudo domain name based on the target domain name; generating a pseudo web page using one or more features and attributes of an entity; and implementing the phishing assessment using the pseudo domain name and pseudo web page.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. application Ser. No.15/337,054, filed on 28 Oct. 2016, which claims the benefit of U.S.Provisional Application No. 62/248,031, filed 29 Oct. 2015, which isincorporated in its entirety by this reference.

TECHNICAL FIELD

This invention relates generally to the computer security field, andmore specifically to a new and useful method and system for phishingrisk analysis.

BACKGROUND

Computer security vulnerabilities come in all shapes and sizes;resultantly, computer security strategy must be varied and diverse toprotect against exploitation of those vulnerabilities. Phishing is aparticularly interesting challenge for computer security implementationbecause it is not solely a technological problem, as phishing relies onexploitation of a vulnerability not easily rectified—human fallibility.

While computer network users can be trained to recognize and reportphishing attacks, it is difficult for such training to achieve learningretention levels necessary for a network to actually achieve sufficientprotection from phishing-based attacks; after all, it is only necessarythat for one user of the computer network to make a mistake for aphishing attack to succeed.

Traditionally, this problem has been addressed by performing phishingrisk analysis. In such traditional methodologies, network administrators(or third parties) conduct phishing campaigns on network users todetermine which phishing campaigns users may be most susceptible to,which users are highly vulnerable to such attacks, and other importantinformation.

Unfortunately, generating sophisticated phishing campaigns is typicallya highly manual process that requires either constant administratorinvolvement or contracting with an external firm (which can be costlyand increase exposure). Thus, there is a need in the computer securityfield to create new and useful methods for phishing risk analysis. Theembodiments of the present application provide such new and usefulmethods.

BRIEF DESCRIPTION OF THE FIGURES

FIG. 1 illustrates a schematic representation of a system 100 of apreferred embodiment of the present application;

FIG. 2 is a chart view of a method 200 of a preferred embodiment of thepresent application;

FIG. 3 is a chart view of a step of a preferred embodiment;

FIG. 4A is an example interface of an analysis page; and

FIG. 4B is an example interface of an analysis page.

DESCRIPTION OF THE PREFERRED EMBODIMENTS

The following description of preferred embodiments of the presentapplication are not intended to limit the inventions to these preferredembodiments, but rather to enable any person skilled in the art to makeand use these inventions.

As illustrated in FIG. 1, a system 100 for implementing phishing riskanalysis includes a phishing assessment server 102, target domain nameidentifying unit 110 (identifying unit 110), target domain name analysisunit 120 (analysis unit 120), auxiliary characters and TLD database 130,pseudo domain name generation unit 140 (generation unit 140), webcrawling unit 150, fictitious web page generation unit 160 (pagegeneration unit 160), user interface and input system 170, and network180. Additionally, the generation unit 140 may include a domain namesimilarity determination (likeness) unit 141 and a pseudo domain nameranking unit 142.

Each of the units described herein including the identifying unit 110,analysis unit 120, generation unit 140, page generation unit 160, andthe like include a computer processing unit (CPU), a processing circuit,microcontroller, or the like and alternatively, in some embodiments, areimplemented by a CPU, processing circuit, microcontroller, or a maincontroller 101 that executes computer-executable code for performing thefunctions of each of the fore-mentioned unit components of the system100. The main controller, in some embodiments, is a computer hardwarecomponent having a computing chip operable coupled to or incommunication with memory. The main controller interfaces with and/orlinks one or more or all of the components or devices of system 100. Ina preferred embodiment, the main controller controls or managesoperations of each of the unit components and other devices operated bysystem 100. Additionally, in the embodiments when the processor orcontroller executes the computer code for implementing the respectiveunit components of the system 100, the processor or controllereffectively mimics or functions as each of the respective unitcomponents of system 100.

Additionally, and/or alternatively, each of the identifying unit 110,analysis unit 120, generation unit 140, and page generation unit 160 maybe a separate component or element in system 100. However, it shall beunderstood that each of these unit components of system 100 may be partof a single component, such as the phishing assessment server 102 orsoftware components of a main controller or computer processor.

The phishing assessment server 102 of a preferred embodimentautomatically and/or semi-automatically implements one or more phishingcampaigns or assessments on one or more computer networks, computernetwork users, and/or computer network devices. That is, the phishingassessment server 102, in such embodiment, is able to performautomatically and without human intervention some or all of thefunctions described herein and, especially, those described in each ofthe methods and processes disclosed in the present application. Forinstance, once a target entity is identified, the phishing server 102 incombination with the unit components and devices of system 100 (e.g.,the phishing assessment platform) is able to identify a target domainname, generate pseudo domain names, rank and register one or more of thepseudo domain names, fabricate fictitious website for the pseudo domainnames, and implement a phishing campaign or assessment.

Additionally, and/or alternatively, the phishing assessment server 102may be an IT computer with functionality or sufficient computing abilityto implement phishing assessments on a computer network. Additionally,and/or alternatively, the phishing assessment server 102 may be one of aplurality of computers and servers that form part of a target computernetwork or another network. In one variation, the phishing assessmentserver 102 is a central server operable to control, manage, and/oraccess one or more additional servers and computers existing one or morenetworks. Alternatively, phishing assessment server 102 may be distinctand independent from the target computer network. The target computernetwork of a preferred embodiment is the computer network that issubject to the phishing risk assessment. Accordingly, phishingassessment server 102 may be maintained and/or operated by an entityassociated with the target computer network or maintained and/oroperated by a third party service provider to the entity associated withthe target computer network.

In a preferred embodiment, after receiving an identification of a targetcomputer network, target user(s), and/or a target entity name forimplementing the phishing campaign against, the target domain nameidentifying unit 110 is able to automatically or in response to,identify one or more target domain names to perform the phishingcampaign against. For example, identifying unit 110 may receive from anIT administrator or the like, a target entity name, such as a targetbusiness name as input. In such example, using the business name, theidentifying unit 110 is able to determine or identify a target domainname to assert the phishing campaign against.

In other embodiments, the identifying unit 110 may simply be providedwith the one or more target domain names for which a phishing campaignis applied against. In this case, the one or more target domain namesmaybe pre-stored on a memory device accessible to the identifying unit110. Additionally, and/or alternatively, the identifying unit 110 mayreceive as input the one or more target domain names from an ITadministrator or the like that is authorized to implement a phishingcampaign.

In the target domain name identification processes of the identifyingunit 110, after receiving the target entity name or the like, theidentifying unit 110 may search a number of different resources foridentifying any and all possible domain names affiliated or otherwise,associated with the target entity. In particular, the identifying unit110 identifies active domain having all, part, or a known abbreviated ofthe target entity name. The identifying unit 110, if provided access,searches entity-maintained or provided resources, such as entity-serversand computer networks of the target entity to identify domain namesassociated with the target entity. Additionally, and/or in combinationtherewith, the identifying unit 110 may search the Internet and/ordomain name registration sites to identify one or more domain namesassociated with or being used by the target entity or otherwise,associated with the target entity name.

The result of the identifying unit 110's search of domain names may bethe identification of one or a plurality of domain names which may beassociated with the target entity or target computer network for thepurposes of using one of these identified target domain names in aphishing campaign. In the case that there are a plurality or multipledomain names associated target entity or computer network that arediscovered by the identifying unit 110, the identifying unit 110determines a popularity of use of each of the identified plurality ofdomain names based on an aggregate number of visits and/or use of eachof the plurality of domain names during a period of time. Theidentifying unit 110 may then identify a rank order for the plurality ofdomain names based on popularity and/or visits. The period of time maybe any period of time in the past or an evaluation period of time inwhich the identifying unit 110 identifies a period of time in which theidentifying unit 110 will measure the usage and/or visits to each of theplurality of domain names. From the evaluation period, the identifyingunit 110 is able to determine aggregate usage and/or aggregate visits toeach of the plurality of domain names and determine a ranking of theplurality of domain names based on these values. The identifying unit110 of a preferred embodiment selects the top domain name of theplurality of identified domain names as the target domain name. Ofcourse, it shall be understood that if the phishing assessment is amulti-domain name phishing assessment, then the identifying unit 110would select the most popular domain names by rank for implementing themulti-domain name phishing assessment. A multi-domain name phishingcampaign or assessment may be run simultaneously or sequentially. In asimultaneous multi-domain name phishing campaign, the multiple targetdomain names of the target entity are implemented in a phishingassessment at a same time. In a sequential multi-domain name phishingcampaign, the multiple target domain names of the target are implementedin a phishing assessment in a sequential order and in some embodiments,the sequential order of implementation is based on rank or target domainname popularity.

Once the identifying unit 110 has identified and/or ranked the one ormore domain names, the identified one or more domain names is shared orotherwise, becomes accessible to the target domain name analysis unit120. For simplicity of explanation, the manner in which the analysisunit 120 processes a single identified domain name is described in thefollowing; however, it shall be understood that any number of identifieddomain names may be analyzed by the analysis unit 120. The analysis unit120 of a preferred embodiment analyzes one or more features andattributes of an identified domain name. In particular, the analysisunit 120 of a preferred embodiment analyzes each of the second-leveldomain (SLD) portion and the top-level domain (TLD) portion of theidentified domain name to identify each of the characters in the SLD andTLD. For example, in the domain name: Example123.net/domain, theanalysis unit 120 identifies each of the letters in the term “Example,”each of the numbers “123,” and the TLD “net,” and also each of theletters in the suffix of the TLD, “domain.” It shall be understood thatthe analysis unit 120 may analyze any portion of a URL including, butnot limited to, the SLD, TLD, and pre-fixes and suffixes thereof.

Additionally, and/or alternatively, subsequent to or contemporaneouslywith the identification of the characters in the identified domain name,the analysis unit 120 further evaluates each of the characters in theSLD and/or TLD to determine whether or not the identified characters inthe SLD and/or TLD has a known or recognized comparable character. Thecomparable character is a like or similar character that has anappearance comparable to an identified character in the SLD and/or TLD.For instance, the characters “vv” would be a comparable character forthe letter “w.” In many instances, if the characters “vv” has asubstantially similar appearance to the letter “w” and thus, if thecharacters “vv” were substituted for the letter “w” in a term in adomain name, it would be very difficult to differentiate the two.

In the evaluation process of the identified characters in the identifieddomain name, the analysis unit 120 of a preferred embodiment compareseach of the identified characters to one or more characters stored inauxiliary characters and TLD database (ACT database) 130 (e.g., pseudodomain name database) to determine whether any of the characters of theidentified domain name has an associated visually similar correspondingcharacter in the ACT database. Upon completion of the comparison, theanalysis unit 120 transmit a communication to the pseudo domain namegeneration unit 140 indicating each of the characters in the identifiedtarget domain name which has a corresponding visually similar characterwithin the ACT database 130 together with an indication of whichvisually similar characters in the ACT database 130 that corresponds tothe characters in the target domain name. The ACT database 130 is,preferably, a database that includes characters including letters,numbers, and symbols (e.g., any character reproducible using an inputdevice) that are electronically linked or otherwise associated withother and/or different characters which share a visual appearance thatis similar. Depending on a selected or identified domain nametransformation process, the visually similar characters which areelectronically associated with original characters are used assubstitutes for original characters appearing in a target domain name.The ACT database 130, in a variation, also includes common variations ofwords and/or characters that often appear in domain names. For instance,if the term “example” is a term that typically appears in domain names,the ACT database 130 will have one or more common variations of thisterm, such as example or example. These variations would be stored inthe ACT database 130 in order to more efficiently process a pseudodomain name generation request for frequently appearing terms in domainnames.

Referring back to the example described above involving“Example123.net/domain,” in the ACT database 130, the character “1” inthe domain name may be linked or associated with the character “t”because these two characters share a visual similarity and when “t” issubstituted into the domain name, upon brief visual inspection, themodified domain name Exampte123.net/domain looks the same as theoriginal domain name. Similarly, the character “m” may be substitutedwith the linked or associated characters “rn” in the ACT database 130and the character “a” may be associated or linked with the character “@”or the like. Each character may be associated with one or a plurality ofvisually similar other characters in the ACT database 130. Thus, theanalysis unit 130 is able to input each of the identified characters ofthe identified domain name into a comparison process involving the datain the ACT database to determine character comparable or simply inputinto the identified characters into the ACT database 130 and comparablecharacters would be returned as output from the ACT database 130.

A similar process may, preferably, be employed for identifyingcomparable or substitute TLDs. In many cases, TLDs do not have visuallysimilar TLDs. Rather, since the TLD is usually located at the end of adomain name, many TLDs may simply be substituted for other commonly usedTLDs. Thus, in the case of identifying a substitute TLD for a TLD of anidentified domain name, the analysis unit 120 may search the ACTdatabase for the most commonly used TLDs other than the current TLD ofthe identified domain name. In some instances, the most commonly usedTLDs in the ACT database 130 may be identified as TLDs with the highestglobal popularity (e.g., .com, .net, .org, and the like). In othercircumstances, the most commonly used TLDs may be based on the entitytype. For instance, for educational entities, the TLD .edu is oftenused; however, if the subject of a phishing campaign is an educationalentity that is partly government funded, a most commonly used TLD may be.gov since many government-based entities use the TLD .gov. Thus, theanalysis unit 130 may identify comparable or substitute TLDs based on,at least, these two basis.

Accordingly, after comparing each of the identified characters in theidentified domain name, the analysis unit 130 identifies a comparablecharacter for each of or one or more of the characters in the identified(e.g., target domain name) domain name. That is, a result of theanalysis by the analysis unit 130 may be a catalog (e.g., SLD catalog)or list of each of or one or more of the characters in the identifieddomain name corresponding to one or more comparable characters from theACT database. Similarly, a catalog (e.g., TLD catalog) identifyingcorresponding TLDs to the current TLD of the identified domain name maybe provided. In some embodiments, the corresponding comparablecharacters and TLDs are ranked in the respective catalogs based onclosest similarity to a character and/or TLD in the target domain name.This allows for generating more similarly appearing pseudo domain namesat the pseudo domain name generation unit 140, as discussed in moredetail below.

The pseudo domain name generation unit 140 is, preferably, configured togenerate one or more fictitious or attack domain names (e.g., pseudodomain names) based on the identified target domain name. The pseudodomain names are, in this application, illegitimate domain namesimitating legitimate target domain names. In particular, the targetdomain name in a preferred embodiment is provided to or received by thegeneration unit 140 and upon receipt or in response to theidentification of the target domain name, the generation unit 140continues to generate a list of pseudo domain names that could be usedin a phishing campaign. In a preferred embodiment, the generation unit140 generates the pseudo domain names based on an identification of thetarget domain name, an SLD catalog for the target domain name, and a TLDcatalog for the target domain name.

In the pseudo domain name generation process, the generation unit 140generates multiple iterations of pseudo domain names based on theidentified target domain name. In some embodiments, the generation unit140 modifies the target domain name to arrive at a pseudo domain name.In other embodiments, the generation unit 140 generates an entirely newpseudo domain name on the basis of the target domain name.

The pseudo domain name generation process at the generation unit 140 ispreferably further based on one or a combination of domain namemodification processes. Specifically, the generation unit 140 selectsone or more of a homoglyph transformation process, TLDalternation/modification process, generic or service-specificprefix/suffix augmentation process, character repositioning and spacing,character transposition process, character deletion, and/or acombination thereof.

In the homoglyph transformation process implemented at the generationunit 140, the generation unit 140 transforms or modifies, mainly, thesecond-level domain portion of the target domain name to generate apseudo domain name with one or more characters, mainly, in thesecond-level portion of the pseudo domain that that are not the same ascorresponding characters in the target domain name, but that have avisually similar appearance such that when viewed at-a-glance the targetdomain name and the pseudo domain name appear visually the same. Thatis, the characters in the pseudo domain name appear to match 1-for-1with the characters of the target domain name although the characters inthe pseudo domain name are different than the characters in the targetdomain name. This type of homoglyphic domain name is achieved primarilyby substituting at least one letter or character in the target domainname with one character or a character combination that appears to bevisually similar to the at least one letter. Similar transformations canbe achieved with several of the above-listed pseudo domain namegeneration processes.

The TLD alternation/modification process involves the substitution ofthe TLD of the target domain name with an alternative TLD or amodification of the TLD. For example, a TLD modification ofexample.com/html-1 may be example.com/html-2. In this example, the mainportion of the TLD (e.g., com) is not change, however, one or more othercharacters in the TLD (e.g., change from html-1 to html-2) is changed.In many instances, the generation unit 140 uses characters and/or wordsin the pre-fix and suffix augmentation processing of a target domainname that would otherwise appear to be a natural extension of theoriginal terms or characters in the second-level domain portion of thetarget domain name.

Implementing the generic or service-specific prefix/suffix augmentationprocess at the generation unit 140 primarily includes modifying thesecond-level domain portion of the target domain name; however, itshould be noted that this process can easily be applied to the TLD ofthe target domain name as well. Specifically, in this process, thegeneration unit 140 adds one or more characters immediately before(e.g., pre-fix) the characters in the second-level domain portion orimmediately after (suffix). For example, in an example target domainname, such as bankofamerica.com, it would be a natural extension of thetarget domain name to add “onlinebanking” as a prefix because manytarget users may access the target domain name to login into onlinebanking. The resulting attack domain name would, therefore, beonlinebanking-bankofamerica.com.

In the character repositioning and spacing processes, the generationunit 140 modifies the target domain name to change slightly the spacingor positioning of the characters in the target domain name. Forinstance, the generation unit 140 may add an underscore or dash inbetween recognizable terms within the target domain name. For instance,in the example target domain name bankofamerica.com, after processing atthe generation unit 140, the resulting attack domain name would bebank_of_america.com or bank-of-america.com. Since the spacing is addedbetween recognizable terms or real words, the medication appears to benatural.

In the character transposition process, two or more characters in atarget domain name are transposed, such that the positions of thecharacters are merely switched or otherwise, moved around between thetwo or more characters. This kind of modification may be most effectivewhen used with only two letters and preferably towards the middle or endof a domain name.

Character deletion involves deleting one or more characters in a targetdomain name. The generation unit 140, preferably, selections one or morecharacters in a target domain name for deletion that usually are notvisually noticeable. For instance, in a target domain name, such asbetterment.com, with one or more repeating letters, the generation unit140 may delete one “t” resulting in beterment.com.

Referring back to the pseudo name generation process implemented by thegeneration unit 140, in some embodiments, the generation unit 140generates a pseudo domain name by only replacing or modifying a singlecharacter in the target domain name. For instance, in the example domainname education.gov, the generation unit 140 may substitute, in a firstiteration, the “t” in education.gov with an “l,” resulting in pseudodomain name educalion.gov. In another iteration, the generation unit 140may substitute only the “0” in education.gov with a “0” (a zero),resulting in the homoglyph, education.gov, which is virtuallyindistinguishable at a first glance from the original domain name.Further, the generation unit 140 in such preferred embodiment may onlymodify the TLD of a domain name by changing the example domain nameeducation.gov to education.edu. Thus, the original TLD of .gov waschanged to .edu. The single character pseudo domain name generationprocess may be based on the rankings provided in or by the SLD and TLDcatalogs, such that the iterations of pseudo domain names first use themost visually similar characters to the original characters of a targetdomain name as identified in the SLD and TLD catalogs. A benefit ofimplementing a single character pseudo name generation process at thegeneration unit 140 is that a single character (or single TLD)substitution is more difficult to recognize as a fictitious domain nameat an initial glance than a multiple character substitution or amultiple character and TLD combination substitution. Accordingly, theless that is changed in a pseudo domain name from an original targetdomain name the higher the similarity characteristics will be betweenthe pseudo domain name and the original target domain name.

It shall be noted that while single character or single TLD substitutionmay be preferred, it is entirely possible for the generation unit 140 toperform multi-character substitutions or modifications for eachiteration of pseudo domain names that the generation unit 140 generates.Thus, in the multi-character substitutions, the generation unit 140 isable to change, at least, two features of an original target domain nameincluding at least two characters of the second-level domain name or atleast one character of the second-level domain name and the TLD. Themulti-character and TLD modifications and/or substitutions may bebeneficial in the instance that all useful single character variationsof a target domain name are registered, in use, or somehow restrictedfrom use in a phishing campaign.

As previously mentioned, the generation unit 140 also includes thesimilarity determination unit (similarity unit) 141 and the pseudodomain name ranking unit (ranking unit) 142. The similarity unit 141determines a similarity between at least two domain names and aftercomparing the at least two domain names, determines a fit score. Thecomparison of domain names at the similarity unit 141 is, preferably,between generated or provided pseudo attack domain name and a targetdomain name. It shall be noted, however, that the comparison at thesimilarity unit 141 can be between any distinct domain names includingtwo or more generated or provided pseudo domain names or even, two ormore legitimate target domain names. The fit score identified at thesimilarity unit 141 is provided or otherwise, accessible to the rankingunit 142 for the purposes of ranking the plurality of pseudo domainnames generated at the generation unit 140.

The fit score may also be referred to herein as a phishing value wherethe phishing value indicates a determined probability or likelihood ofsuccessfully implementing a phishing attack on a target computer networkor target user using an identified pseudo domain name. The probabilityof the phishing value may be indicated generally, as a high,intermediate, or low probability. In one variation, the probability ofthe phishing value may be indicated as a numerical or grade value, suchas 68% or “C” or the like. In some embodiments, both a generalprobability and a numerical or grade value may be assigned to a pseudodomain name. It shall be understood that the probability of the phishingvalue may be communicated or determined in any form factor whichindicates a value of a pseudo domain name as it relates to its use in aphishing assessment or phishing attack. The probability of the phishingvalue may be determined in any manner including using statisticalmethods based on one or more tests involving the success rate of certainand/or different types of pseudo domain names.

The similarity unit 141, preferably, applies a number of similarityschemes against the pseudo domain names generated by the generation unit140 to determine similarities between a pseudo domain name and a targetdomain name. Generally, in one or more of the similarity schemes, thesimilarity unit 141 identifies the target domain name and selects or isprovided one or more pseudo domain names and compares the target domainname to each of the selected or provided pseudo domain names.Additionally, prior to or during the performance of the application ofthe similarity schemes, the similarity unit 141, identifies a number ofcharacters in the target domain name and a number of characters in thepseudo domain name, a position (e.g., 1^(st), 2^(nd), 3^(rd), etc.) ofeach of the characters in the target domain name and the pseudo domainname, and the type of character at each position of the target domainname and the pseudo domain name. These identified characteristics of thetarget domain name and the pseudo domain name are useful characteristicsthat may be used in each of the similarity schemes.

According to a first similarity scheme applied to a pseudo domain nameand target domain name, the similarity unit 141 determines a number ofcharacters in both the target domain name and the pseudo domain name andif the number of characters match between the two, the similarity unit141 proceeds to a subsequent similarity metric in the first similarityscheme. The number of characters identified in the target domain name isthe base value B and the number of characters identified in the pseudodomain name is the non-base value NB. However, if the number ofcharacters between the target domain name and the pseudo domain namedoes not match, the similarity unit 141 either calculates or measuresthe difference between the base value B and the non-base value NB forthe target domain name and the pseudo domain name.

Using the variables identified above, one version of the similarityscoring or fit scoring algorithm would look like the following:

${{Fit}\mspace{14mu}{Score}} = {100 - \lbrack {\lbrack {1 - \frac{B - \lbrack | {B - {NB}} | \rbrack}{B}} \rbrack*100} \rbrack}$

As an example, in evaluating the target domain name example.com and thepseudo domain name examples.com, the similarity unit 141 determines thatthe base value for the target domain name is 11 (e.g., B=11) since thereare a total of 11 characters in the SLD and TLD of the target domain.For the pseudo domain name, the similarity unit determined that thenon-base value is 12 (e.g., NB=12). Applying these example values in theabove fit score algorithm results in the following:

${{Fit}\mspace{14mu}{score}} = {90.91 = {100 - \lbrack {\lbrack {1 - \frac{11 - \lbrack | {11 - 12} | \rbrack}{11}} \rbrack*100} \rbrack}}$

Thus, for the example above, the resulting fit score is 90.91. In thisexample, the values for the fit score are in the range of zero (0) toone hundred (100) and any NB values causing the number of the quotientto be zero or a negative value automatically results in a fit score ofzero (0). According to this example, the greater the fit score value,the greater the similarity between the pseudo domain name and the targetdomain name.

Additionally, and/or alternatively, in evaluating the similarity betweena pseudo domain name and a target domain name, the determines whetherany character in the pseudo domain name is a homoglyphic replacement foran original character in the target domain name. For instance, when thepseudo domain name is example.com and the target domain name isexample.com, the similarity unit 141 would determine that the base valueand the non-base values are the same for the two domain names. However,upon comparison of each individual character in each of the two domainnames, the similarity unit 141 would determine that the single character“l” in the target domain name with a different character “I”. For eachsubstituted character (SB), the similarity unit 141 assigns the SB avalue, such as one (1). Additionally, if the similarity unit 141determines that the substituted character(s) in the pseudo domain nameis also a homoglyph of the original character in the target domain name,the similarity unit 141 assigns a value of one to the SB together with ahomoglyph multiplier (HM), such as five-tenths (0.5), where the value ofHM is between zero and one. It shall be noted that the multiplier can beany dynamic or predetermined value between zero and one and may alsodepend on whether the homoglyph is in the SLD or the TLD. In someinstances, if the homoglyph is in the TLD, the homoglyph multiplier ismade smaller, such as 0.25, to account for the homoglyphic characterbeing located later in the pseudo domain name, which allows for agreater similarity between the pseudo domain name and the target domainname.

Using the variables identified above, a second version of the similarityscoring or fit scoring algorithm would look like the following:

${{Fit}\mspace{14mu}{Score}} = {100 - \lbrack {\lbrack {1 - \frac{B - \lbrack | {B - {NB}} | \rbrack - {{SB}*{HM}}}{B}} \rbrack*100} \rbrack}$

Applying the above values in the second fit score algorithm results inthe following:

${{Fit}\mspace{14mu}{Score}} = {95.45 = {100 - \lbrack {\lbrack {1 - \frac{11 - \lbrack | {11 - 11} | \rbrack - {1*{.5}}}{11}} \rbrack*100} \rbrack}}$

Accordingly, the fit score for the single character homoglyphictransformation of the target domain name, example.com, results in ahigher fit score of 95.45; meaning that the pseudo domain nameexample.com has a higher similarity to the target domain name than thepseudo domain name examples.com.

Additionally, and/or alternatively, in evaluating the similarity betweena pseudo domain name and a target domain name, the determines whetherany characters in the pseudo domain name are transposed. For instance,when the pseudo domain name is examlpe.com and the target domain name isexample.com, the similarity unit 141 would determine that the base valueand the non-base values are the same for the two domain names. However,upon comparison of each individual character in each of the two domainnames, the similarity unit 141 would determine that the two characters“l” and “p” are merely transposed. For each out of position character(P), the similarity unit 141 assigns the P a value, such as one (1).Thus, the P value in this instance would be two (2) since there are twocharacters which are not in their original positions, as determined bythe target domain name. Additionally, if the similarity unit 141determines that the out of position characters in the pseudo domain nameare simply transposed based on the original characters in the targetdomain name, the similarity unit 141 assigns a transposition multiplier(TM) to the P value, such as five-tenths (0.75), where the value of TMis between zero and one. It shall be noted that the transpositionmultiplier can be any dynamic or predetermined value between zero andone and may also depend on whether the transposition is in the SLD orthe TLD. In some instances, if the transposition is in the TLD, thetransposition multiplier is made smaller, such as 0.25, to account forthe transposed characters being located later in the pseudo domain name,which allows for a greater similarity between the pseudo domain name andthe target domain name.

Using the variables identified above, a second version of the similarityscoring or fit scoring algorithm would look like the following:

${{Fit}\mspace{14mu}{Score}} = {100 - \lbrack {\lbrack {1 - \frac{B - \lbrack | {B - {NB}} | \rbrack - {{SB}*{HM}} - {P*{TM}}}{B}} \rbrack*100} \rbrack}$

Applying the above values in the second fit score algorithm results inthe following:

${{Fit}\mspace{14mu}{Score}} = {86.36 = {100 - \lbrack {\lbrack {1 - \frac{11 - \lbrack | {11 - 11} | \rbrack - {0*0} - {2*{.75}}}{11}} \rbrack*100} \rbrack}}$

Accordingly, the fit score for the transposed characters in the pseudodomain name, results in the lowest fit score of 86.36; meaning that thepseudo domain name examlpe.com has a lower similarity to the targetdomain name than the pseudo domain names examples.com and exampIe.com.

It shall be understood that the above example similarity score or fitscore algorithms may be modified to take into account any kind or typeof transformation applied to a target domain name to arrive at a pseudodomain name. Thus, the fit score algorithm should not be limited bythese examples. For example, the fit score algorithm may be modified totake into account domain name transformations that involve addingpre-fixes and suffices, repositioning and spacing, and/or the like. Insuch modifications, it would be possible to add one or more variable inthe numerator of the quotient portion of any of the above examples of afit score algorithm to properly capture the changes in similarityintroduced by any additional transformation process.

The pseudo domain name ranking unit 142, preferably, analyzes the fitscores for each of the pseudo domain names and ranks each of the pseudodomain names accordingly. The pseudo domain names may be rankedaccording to a pseudo domain name ranking spectrum and/or pseudo domainname ranking continuum which illustrates a relative similarity positionof each of the pseudo domain names along a range of value or the like.The ranking spectrum and/or ranking continuum may be visuallyillustrated via a display or the like. In this way, if the illustrationis presented to an administrator, the administrator is able to easilydetermine the relative similarity of each of the pseudo domain names andmake a selection of a pseudo domain name, accordingly. In the aboveexamples, the higher the fit score, the greater the similarity. Thus,taking into account the three examples above, the ranking unit 142 wouldrank the pseudo domain names in the following order:

-   -   1. exampIe.com    -   2. examples.com    -   3. examlpe.com

In this ranking example by the ranking unit 142, the pseudo domain nameat the top which follows 1. would be the most similar to the targetdomain name example.com and examples.com would be the second mostsimilar to the target domain name. By ranking the pseudo domain names,allows for the administrator or the autonomous system to readilyidentify and select the most similar target domain names which wouldallow for a phishing campaign with an increased difficulty.

Additionally, the web crawling unit 150 of system 100 is configured tosearch the web and/or intranet of an entity to identify one or more webpages and record/copy the one or more features and attributes of the webpage. Specifically, upon receipt or based on an identification of atarget entity/organization by the identifying unit 110 or otherwise, theweb crawling unit 150 identifies the web presence of the target entityin order to identify the one or more web pages, social media pages,intranet pages, and other related pages that are associated with theentity or a target domain name of the entity. Accordingly, the webcrawling unit 150 of a preferred embodiment is able to automaticallydiscover many or all of the web pages associated with an identifiedtarget entity name. Thus, it is also possible that the web crawling unit150 uses one or more target domain names of the target entity toidentify the web presence of the target entity. Similarly, the webcrawling unit is able to identify a web presence of one or moreaffiliates and/or service providers of the target entity and perform thesame functions against the web pages associated with each of theaffiliates and/or service providers.

Once the web crawling unit 150 identifies the web presence of the targetentity, the web crawling unit 150 evaluates the one or more web pagesassociated with the target entity and captures the features and/orattributes of the one or more web pages. Thus, the web crawling unit 150is able to copy all of the content, graphics, illustrations, formatting,code, and other features and attributes of the one or more web pages.Subsequently, the web crawling unit 150 transmits to and/or stores thecopied content in a datastore accessible to or otherwise, that is a partof the system 100. In this way, the copied content can be used and/orevaluated by the fictitious web page generation unit 160. Additionally,and/or alternatively, the web crawling unit 150 automatically providesthe copied content directly to the fictitious web page generation unit160 for processing.

The fictitious or pseudo web page generation unit 160 (page generationunit 160) is configured to generate one or more fictitious and/or pseudoweb pages, preferably, to be used in a phishing campaign. In particular,the page generation unit 160 is able to access the web page content ofthe one or more web pages associated with a target entity or targetdomain name that is stored in the datastore and automatically generateone or more fictitious web pages that mirrors or substantially matchesthe one or more legitimate web pages of the target entity. In the pagegeneration process, the page generation unit 160 will substitute theoriginal target domain name of the target entity and replace the targetdomain name with a pseudo domain name that was generated by the pseudodomain name generation unit 140 or otherwise, provided by anadministrator of the phishing campaign.

In a variation of the fictitious domain name generation process, thepage generation unit 160 is able to use portions of copied content ofmultiple legitimate web pages of the target entity to generate a new andnon-copy fictitious web page to be used in a phishing campaign.Similarly, the page generation unit 160 is able to associate thegenerated, non-copy fictitious web page with at least one pseudo domainname generated at the pseudo domain name generation unit 140 orotherwise, provided to the page generation unit 160.

An administrator or the like is able to use the user interface and inputsystem 170 to configure, monitor, and manipulate one or more phishingcampaigns. A user interface of system 170 includes a display, such asone or displays and/or one or more touch panels, which are, preferably,used to implement and monitor a phishing campaign. The system 170,additionally, and/or alternatively includes one or more additional inputand output devices that are used for interacting with the components ofthe system 100 and preferably, for managing the phishing campaign.

As shown in FIG. 2, a method 200 for phishing risk analysis includesverifying campaign authorization S210, generating campaign parametersS240, generating campaign templates S250, performing a campaign S260,and producing campaign analysis S270. The method 200 may additionallyinclude identifying attack domain names S220 and/or collecting targetingdata S230.

As described in the background section, while solutions for phishingcampaign generation exist, they are typically lacking in either or bothof automation level and sophistication. The consequence of this is thattraditionally generated phishing campaigns simply aren't effectiveeither in gauging risk to real-world phishing attacks or in providingany defense against them.

The method 200 functions to make it easy for network administrators togenerate sophisticated phishing campaigns; the method 200 also providespowerful analytical tools to enable companies and organizations to notonly assess, but also reduce phishing risks and thereby reducevulnerabilities in associated computer networks.

The method 200 is preferably enabled by a web-based software platform(e.g., phishing assessment platform) operable on a web server ordistributed computing system. Additionally, or alternatively, the method200 may be performed by any suitable computer system capable ofgenerating, launching, implementing, and analyzing phishing campaigns.The method 200 includes step S210 for verifying authorization forconducting a phishing campaign.

S210 includes verifying campaign authorization. In some embodiments,S210 functions to verify that an entity system or computer is authorizedto autonomously implement a phishing campaign. While in some instancesan administrator or the like assists in the implementation of a phishingcampaign, it is also possible for an entity or organization tospecifically designate an entity server, computer, or the like that isable to automatically and autonomously implement a phishing campaignwithout any human intervention. In such cases, S210 determines whetheror not the entity server has any and/or all permissions, privileges, andaccess rights required for implementing the phishing campaign.

Additionally, and/or alternatively, S210 functions to verify that acampaign administrator (i.e., a user of the method 200 who manages aphishing campaign operable on some domain) is authorized to perform aphishing campaign using one or more computing systems on an entity'scomputer network. Although phishing campaigns conducted via the method200 preferably do not store phished credentials or expose thesecredentials to campaign administrators, unauthorized campaigns may stillhave the potential to be disruptive to an organization's operations.Resultantly, the method 200 preferably verifies that a campaignadministrator or an autonomous entity computing system is authorized toperform a phishing campaign via S210.

S210 is preferably performed on a per-domain basis (i.e., authorizationmust be verified for each domain on which phishing campaigns are to beperformed); but may additionally or alternatively be performed in anymanner. By, preferably, requiring verification on a per-domain basis,allows for a better or stricter control of a phishing campaign as onlythose approved or verified domains may be used in the phishing campaign.For example, S210 may be performed on a sub-domain basis. As anotherexample, S210 may be performed for a set of IP addresses; e.g., if a setof IP addresses is associated with an organization, authorization may begranted for any domains associated with those IP address as determinedby trusted DNS records.

Authorizations granted in S210 are, preferably, temporary in durationand thus, may expire (and/or require reauthorization) according to apredetermined time schedule or any time schedule. For example,authorization granted via S210 may last only for one week. Temporaryauthorizations are also a control parameter for the phishing campaignused to control a duration thereof. Additionally, by providing forexpiring authorizations in S210, reduces the likelihood that one or moreadministrators will exceed the scope of the assessments required in thephishing campaign.

Additionally, and/or alternatively, authorization granted in S210 mayalso have limits. These limits may be predetermined or determinedsituationally based on the campaign administrator or entity campaignsystem or preferably based on factors which affect a quality of aphishing campaign. For example, a campaign administrator may beauthorized only to perform phishing campaigns over email and not viatext message. In this example, the phishing assessment is limited toemail attacks only to control a quality of the phishing campaign becauseit is possible that users of the computer network being tested in thephishing campaign become suspicious of a phishing attack due to themultiple communications initiated by the campaign. It shall be noted,however, that in some circumstances that dual or multiple phishingassessment communications enhances a quality of a phishing campaigndepending on the nature of the communications.

Both authorization limits and expiration settings may be determined inany manner. In one example, authorization limits and/or expirationsettings are determined automatically on the basis of authorizationverification level (discussed in more detail below).

S210 may include verifying campaign authorization in a number of ways.For example, S210 may include verifying campaign authorization by aprimarily manual process; e.g., a service representative for a securitycompany (running a software platform implementing the method 200) mayverify a campaign administrator by visiting a company and confirmingwith the company's head of human resources that the same company's headof information technology is authorized to perform a phishing campaignon the company's computer network. In such a situation, a trusted orverified contact within a company or organization could provide not onlyauthorization but also authorization limits/expiration for a phishingcampaign. In very large companies, this manual process may be timeconsuming due to large human resource departments, multiple officelocations, and generally a decentralized decision-making or employeeinformation confirmation process. Thus, a less manual process forverifying authorization of a campaign administrator, as described inmore detail below, may be more suitable for an efficient and morestreamlined verification process.

Thus, S210 may alternatively verify campaign authorization using asemi-manual process. In the semi-manual process, many of the traditionalverification steps in the verification process may be automated or themanual verification process may be augmented with one or more automatedsteps that reduce the requirements of one or more of the manualverifications steps. For example, S210 may include requesting that apotential campaign administrator demonstrates domain management/accesscredentials. This verification may be accomplished in a form of a testof the administrator's management/access credentials of a targetcomputer network. In one instance, S210 may include verifying that aparticular piece of data (e.g., a string, a code, a number, a particularimage, etc.) has been placed in a location that demonstratesdomain-level access; such as inserting something into a DNS record, ormodifying a company's website (e.g., by placing a special html page atdomain.com/verify.html, or by inserting some JavaScript into ahomepage). The request to the potential administrator is not limited tothese examples. The request to the potential campaign administrator maybe a request that sufficiently demonstrates the typical managementand/or access controls expected of an IT administrator with sufficientcomputer network authorizations to properly implement a phishingcampaign. The request may be sent in the form of an electroniccommunication, such as email. If a particular email address is known tobe associated with a person of access (e.g., admin@domain.com), averification code or link may be sent to that email address. While emailis a generally acceptable manner to communicate the authorizationverification request, it is possible to use any form of electroniccommunication, such as chat, text messaging, and/or related workcommunication applications.

Additionally, and/or alternatively, S210 may verify campaignauthorization using an automatic verification process. In the automaticverification process, S210 may use one or more profiles or the likeassociated with a prospective campaign administrator to confirm and/orverify the administrator's credentials. The one or more profiles may beany kind of profile having biographical, business, and/or personalinformation about the administrator. These one or more profiles of theadministrator include, but is not limited to, a company profile,business profiles, social media profiles, and/or social networkprofiles. For example, by accessing a potential campaign administrator'ssocial network profile (e.g., LinkedIn profile) after verification ofthe campaign administrator's identity via email address or anotherauthentication process, such as “Connect with LinkedIn”. After accessingthe social network profile, S210 may retrieve data about the potentialcampaign administrator (e.g., title, department, number of connectionswithin the organization, titles of connections within the organization,length of employment, etc.) which can be analyzed to determine if apotential campaign administrator is authorized to perform a phishingcampaign. In the analysis, it may be determined that the aggregate ofthe information about the administrator is sufficient such that areasonable entity would identify the administrator as being authorizedto conduct the phishing campaign. In such instance, the data and/orinformation about the administrator may be compared against apredetermined checklist of data that includes a plurality of items whichare typically associated with an administrator with proper authority toconduct a phishing assessment. In the analysis, if the data and/orinformation about the administrator sufficiently matches the pluralityof items in the predetermined checklist or predetermined specificationsthen the administrator is determined to be authorized and the phishingassessment is approved. In some instances, the data and/or informationmust achieve a minimum match level of greater than 50% of the items andin other instances, the administrator's information must match asupermajority (e.g., 67% or the like) of the items in the checklist. Itshall be understood that the degree to which the administrator's profileinformation matches the predetermined checklist can be set at any amountthat indicates sufficient authority to implement, conduct, and/or managea phishing assessment.

Similarly, an automatic process employed by S210 may include retrievingdata from any platform capable of providing information that a potentialcampaign administrator may be authorized to perform a phishing campaign.For example, S210 may include accessing a set of web applications, suchas Google Apps, data to confirm that a particular potential campaignadministrator is an administrator of the Google Apps account associatedwith the organization's domain. In such automatic verification process,an administrator's management/access rights to particular applicationsor target computer network components is compared against apredetermined list of typical application and/or computer networkcomponents which an approvable administrator should have. The automaticverification process approves the administrator when one or more of theadministrator's current management/access rights matches one or moreitems within the predetermined specification. As another example, acompany's website may be scraped to retrieve data about a potentialcampaign administrator. If the retrieved data about the potentialcampaign administrator indicates the appropriate titles, relationships,and/or authorities typically associated with an administrator authorizedto perform a phishing campaign, then the automatic verification processapproves the potential campaign administrator. Of course, in any of theabove-mentioned processes, if the administrator's information does notsufficiently match items within the predetermined checklist orpredetermined specification list(s), then the process does not approveor declines to approve the prospective administrator for implementingthe phishing campaign.

Note that some of the processes described above are binary (e.g., apotential campaign administrator either enters the correct code from anemail or he/she doesn't), and some are non-binary (e.g., a potentialadministrator has a LinkedIn profile with some set of characteristics asdescribed above. S210 may include performing authorization with anynumber of the aforementioned processes (or any suitable verificationprocesses). For example, if S210 includes performing authorizationsolely using binary authorization processes, a threshold number of saidprocesses may need to be completed successfully. In another example, ifthe potential administrator is responsible for managing computernetworks and systems with highly sensitive information, it may benecessary to perform a combination of the fore-mentioned automaticprocesses to ensure that a comprehensive check of the potentialadministrator's credentials is performed.

As another example, S210 may include generating an authorization score.The authorization score provides an indication of a level ofauthorization of a potential administrator. The authorization score maybe a numerical value (e.g., 89) or some other value (e.g., A-E) in arange of predetermined values associated with one or more levels ofauthorization. In a preferred embodiment, a potential campaignadministrator's authorization score must equal or exceed predeterminedor dynamic threshold level for a particular authorization level. Notethat as previously mentioned, authorization may have limits;resultantly, a set of authorizations with different limits may compriseauthorization levels (e.g., unlimited authorization may be at a higherauthorization level than authorization for a particular domain). Thus,in some embodiments, higher authorization scores correspond with higherauthorization levels and lower authorization scores correspond withlover authorization levels. Likewise, expiration conditions may beaffected by authorization level. Accordingly, an authorization continuumhaving a range of authorization levels may be provided in which each ofthe authorization levels within the authorization continuum correspondwith an authorization score and have a corresponding authorizationlimits and a corresponding authorization expirations in a related limitscontinuum and in a related expirations continuum, respectively.

Such an authorization score would preferably be determined by assigningweights and/or scoring algorithms to each process contributing to theauthorization score. For example, a potential campaign administrator mayneed a score of 70 to receive authorization at a particular level.Verifying that the campaign administrator is a Google Apps administratormay result in a score of 50, while data from the admin's LinkedInProfile may be determined by scoring algorithm; e.g.,

$C\lbrack {{10L} + \frac{N}{10}} \rbrack$where C is one (1) if the profile indicates the admin is employed at theorganization and zero (0) otherwise; L is 1 if the admin has beenemployed over two years and o otherwise; and N is the number ofconnections the admin has within the company that are older than sixmonths. Thus, the total authorization score algorithm might look like

${50G} + {C\lbrack {{10L} + \frac{N}{10}} \rbrack}$where G is simply a binary variable indicating verification of GoogleApps administrator access.

In a preferred embodiment, the admin's control or management of thesuite of web applications, such as Google Apps, may be afforded greaterweight since the control and/or management of such entity webapplications provides a greater indication of the admin's authoritywithin an entity with respect to IT matters and further, because thecontrol and/or management of such entity web applications is more likelyto be readily verifiable whereas some aspects of social media data froma admin's profile that are usually strictly within the admin's controland therefore, subject to unverifiable manipulation. However, it shallbe noted that depending on the type of profile used for the admin, adifferent and additional weight may be afforded which equals or isgreater than the weight afforded to IT-related functions and managements(e.g., Google Apps or the like). For instance, if the profile type ofthe administrator used in the verification process is a company profile,possibly provided by HR or available on the company's internal orexternal web pages, in those circumstances where the information withinthe company profile is most likely provided by and/or managed by someoneother than the administrator, the verification value and/or weight ofsuch profile type is greater than a social media profile of a user, forexample.

S220 includes identifying attack domain names (e.g., pseudo domainnames). An attack domain name, in this case, is a domain name that isused in phishing and specifically, to attack users of a computer networkand/or to attack the computer network, itself. Thus, in S220, one ormore attack domain names are determined and in various manners for thepurpose of misleading one or more users. While in some cases phishingmay occur from within an organization's domain (e.g., if a low-levelemail account is comprised and used to perform a targeted phishingattack on other targets within the domain), phishing typically occursfrom an external domain other than an internal domain that belongs to oris registered by the organization. Accordingly, the external domain nameis a domain name that is not registered as belong to a target computernetwork of a target entity/organization. To trick phishing targets intotrusting content from external domains, phishers may either attempt tohide any information related to the external domain (e.g., by usingmisleading HTML links, by using JavaScript to alter a browser's addressbar, etc.) or by making the external domain itself appear to belegitimate although the external domain name is not legitimate. To giveoff the appearance of legitimacy, phishers commonly use look-alikedomain names. As the name suggests, a look-alike domain name is anillegitimate domain name that looks like a legitimate domain name. Forexample, a phisher may user the look-alike and illegitimate domain name“bankfoamerica.com” instead of the legitimate domain name“bankofamerica.com” (note that the letters in the term “of” from thelegitimate domain name is transposed in the former). As discussedearlier, the generation unit 140 is programmed or otherwise, capable ofgenerating such attack domain names using a transposition processapplied to a target domain name or based on the target domain name.

Look-alike domain names may be formed in a number of ways, includingintentionally misspelling domain names (as above), changing top-leveldomains (TLDs) (e.g., “company.org” instead of “company.com”), addinggeneric prefixes or suffixes (e.g., “company-login.com” instead of“company.com” or “login.company.com”), adding service specific prefixesor suffixes (e.g., “vpn-company.com” instead of “vpn.company.com”), andusing any combination of the fore-mentioned. In particular,look-alike-based domain names used in phishing attacks may use domainnames exploiting homoglyphs (sets of characters that look similar butare not). In a relatively simple example of a homoglyph exploitingdomain, “google.com” may be used instead of “google.com” (note that thetwo ‘o’s have been replaced by zeroes in the former). Thus, thehomoglyph attack domain name using the zeroes looks like the legitimatedomain name. Slightly more advanced is a multi-letter homoglyph: e.g.,vvave.com vs. wave.com. The most advanced homoglyphic exploits surroundthe Unicode character set, which contains many strongly homoglyphiccharacters. For example, in most fonts, the Greek letter ‘A’, theCyrillic letter ‘A’, and the Latin letter ‘A’ are visually identical. Asanother example, the Simplified Chinese variant of a particularcharacter is often homographic with the Traditional Chinese variant.These type of homoglyphic and homographic variants of legitimate domainnames are very difficult to identify by a user even when the attackdomain name is read or studied carefully. Thus, homoglyphic andhomographic attack domain names can be very useful in a phishingcampaign.

S220 functions to generate, rate, and/or register attack domain nameswith a reasonable likelihood and/or probability that they may trick orconfuse phishing targets into trusting content presented by those attackdomain names (and/or may bypass filters or other security measurespresent on a network). As shown in FIG. 3, S220 may include generatingphishing domain names S221, rating phishing domain names S222, andregistering phishing domain names S223. Alternatively, S220 may includeany sub-combination of these steps.

S221 includes generating phishing domain names. S221 functions togenerate attack domain names based on a target domain name (i.e., a nameof a domain targeted by the phishing campaign). S221 preferably includesgenerating phishing domain names by modifying the target domain namewith alternate TLDs, homoglyphs, generic prefixes/suffixes, and/orservice-specific prefixes/suffixes. Other subtle methods for generatingdomain names include transposition of letters of a target domain name,adding non-letter characters (e.g., dashes, underscores, or the like)between characters of a target domain (especially between distinctwords, e.g., bank-of-america), abbreviating a target domain name usingwell-known acronyms or short names of an entity (e.g., bankofamerica.comto bofa.com), and the like. S221 may additionally or alternativelyinclude modifying the target domain name in any manner, or generatingdomain names in any suitable manner (e.g., by a method other thanmodifying the target domain name, such as modifying a different domainname like “Microsoft.com”). In such a case, domains specificallyassociated or assigned to the target entity may not be modified, butinstead, domain names of services or common services providers of theentity may be modified in an illegitimate manner to generate a phishingdomain name. Thus, in S221, the generation of a phishing domain name isnot limited to generating phishing domain names based on domain namesexpressly affiliated with the target entity of the phishing campaign.

S221 preferably includes determining that generated domain names areavailable, so that a list of phishing domain names provided to S222 isactionable. In this instance, S221 compares one or more phishing domainnames in the list of generated phishing domain names to domain nameslisted in a registry or otherwise, inputs each of the listed phishingdomain names in a registry service to determine whether or not thelisted phishing domain name is registered or actively being used byanother. If, after the comparison of the phishing domain names with aregistry or the like is completed, S221 provides a new list of only thephishing domain names which are not registered for the purpose ofimplementing one or more of the newly listed phishing domain names in aphishing campaign.

Additionally, or alternatively, S221 may provide a list of phishingdomain names without verifying availability. In some instances, by notverifying availability of the phishing domain names on the list,expedites the phishing campaign implementation process since theavailability verification process may be a time consuming step in thephishing domain name generation process. However, an obvious drawback infailing to verify the availability of a phishing domain name is that thephishing domain name, if selected for a phishing campaign, may not beavailable and thus, may set back one or more subsequent steps requiredfor implementing a phishing campaign including creating a phishingwebsite based on the selected phishing domain name.

S222 includes rating phishing domain names. S122 functions to ratephishing domain names generated in S221 or provided from another source(e.g., manually specified by the campaign administrator). A purpose forrating the phishing domain names is to provide an indication of probableeffectiveness for misleading or tricking a target. A benefit ofperforming the rating in S222 is the ability to scale the difficulty ofa prospective phishing campaign. For instance, if a phishing domain nameis highly rated, the more likely that the phishing campaign will bedifficult for a target to identify, whereas if the phishing domain nameis not highly rated, then the more likely that at least some users willidentify the phishing domain name as a fictitious domain name used forphishing information. By scaling the difficulty of a phishing campaignbased on the ratings provided in S222, an administrator or the like maybe able to perform controlled experimentation based on the phishingdomain names for the purpose of studying targets affected or tricked interms of percentages or the like and further, associate resultantexperimental values with the ratings. This type of information can beinsightful with respect to the configuration of a subsequent phishingcampaign and further, for refining the phishing campaign generationprocess.

S222 preferably includes rating phishing domain names according to ametric that specifies how valuable the names are for a phishingcampaign. Additionally, and/or alternatively, the rating metric mayindicate a probability or a likelihood that a target would be tricked ormislead by a rated phishing domain name. This metric is preferablycalculated for a generated domain name (or a specified domain name)according to visual similarity between the targeted domain name and thegenerated domain name. (or specified domain name). Although otherfactors including phonics of the generated domain name may also be takeninto account in determining a rating, the primary test used fordetermining a rating for a generated domain name is visual similarity.

Additionally, or alternatively, S222 may include rating domain names onany attributes; for example, S222 may include rating domain names on ametric that includes both a similarity score based on visual similarityor the like and a ‘fit’ score; wherein the fit score represents how wella given domain name fits the image of the targeted organization (e.g.,as calculated based on text available on the organization's website).The fit score of a domain name may be determined in a number ofdifferent manners, as described above with respect to system 100.

The ratings provided by S222 are preferably provided to the campaignadministrator (e.g., in a GUI that lists domain names evaluated by S222)or a phishing computing system autonomously implementing the phishingcampaign. From there, the campaign administrator may register domainnames manually, or may authorize the method 200 to register selecteddomain names automatically. In the case of the phishing computingsystem, the system may automatically determine whether or not the domainname is available, register the domain name if available, and generate aphishing campaign based on the domain name.

Additionally, or alternatively, the list of ratings and associateddomain names may be provided by S222 directly to S223. S223 functions toautomatically register the domain names on the list associated with thetop or high ratings. In this way, a campaign administrator'sintervention is not required for the purpose of selecting a domain namefor a phishing campaign. This automation of the campaign generationprocess clearly provides a benefit of improving an efficiency forimplementing the phishing campaign.

S223 includes registering one or more of the generated domain names.S223 functions to register domain names selected either automatically asa result of ratings generated in S222 or manually as a result ofcampaign administrator selection. S223 preferably includes registeringdomain names at a domain name provider using an API, but mayadditionally or alternatively register domain names in any manner. Inaddition to registering domain names, S223 may include any preparationof the domain name (e.g., updating DNS records to point to a phishingcampaign site, etc.).

In a variation of a preferred embodiment, S223 may provide informationuseful in domain name registration (as opposed to completing domain nameregistration). For example, S223 may open a domain name registrationwebsite with pre-populated forms. The pre-populated forms, in thisembodiment, includes the selected domain names and any or mostinformation required for registering the domain name and associated saiddomain name with the phishing campaign. S223 may provide, in associatedwith or included in the pre-populated forms, instructions beyond thepre-populated form for registering the domain name and/or submitting thepre-populated form for the purpose of registering the domain name. Thismay be very helpful in the case that the domain name service provider orregistration service limits the amount of automation used in itsregistration process. Thus, by including registration instructions in orin associated with the pre-populated form, an administrator can easilynegotiate the registration process and proceed with implementing thephishing campaign.

S230 includes collecting targeting data. S230 functions to collect dataabout a target organization's web presence (e.g., website, publiclyavailable data, social media presence, etc.) and/or about web presencesof individuals associated with the organization. The targeting datacollected can include any data, and not solely web presence data, aboutthe organization and/or individuals associated with the organization.For instance, the data collected at S230 may include internal data, suchas data available on the organizations intranet, data provided by theadministrator, and data that is not electronic data (e.g., physicaldocuments and the like) but that may be converted into a useableelectronic form. This data could be used to generate one or morecampaign control and configuration parameters (e.g., how a campaign isrun) in S240 and/or campaign templates in S250.

S230 preferably includes collecting targeting data using a number ofmethods and via a number of sources, but may additionally oralternatively collect targeting data through a single method and asingle source. Examples of targeting data collection include scrapingorganizational websites and/or websites owned by individuals associatedwith an organization, scraping websites of service providers and/oraffiliated partners/collaborators of the organization, retrieving socialmedia data (e.g., an organization's LinkedIn/Facebook pages,LinkedIn/Facebook profiles of employees, the organization, and thelike). S230 preferably includes collecting publicly available data, butmay additionally or alternatively includes collecting private data. Forexample, S230 may include receiving internal company organizationaldata, as noted above.

S230 preferably includes collecting targeting data by retrieving targetdata from web platforms, but may additionally or alternatively includecollecting targeting data provided by campaign administrators directly.For example, the internal company organizational data of the lastparagraph may be pulled automatically from a Human Resources program(with authorization), a human capital database within the organizationor it may be supplied directly by campaign administrators, etc.

Targeting data preferably includes general information about theorganization (e.g., organization type, size, style) as well asinformation about individuals within the organization (e.g., names,roles, connections, contact information). Additionally, and/oralternatively, targeting data includes information about entities orother organizations that are affiliated/partnered/collaborated orotherwise, provide a service to the targeted organization. Targetingdata may additionally or alternatively include any data capable ofaiding in phishing campaign generation. For example, S230 may includecollecting data about the services used by an organization, as describedin U.S. Provisional Application No. 62/138,197, the entirety of which isincorporated by reference.

S230 preferably includes collecting targeting data automatically basedon one or more of the organization's domain names and/or one or more ofthe domain names of an affiliated entity or service provider to theorganization, but may additionally or alternatively include collectingtargeting data via any parameters. For example, a campaign administratormay specify that a particular website provides login to a corporateintranet, while another website provides login to webmail, etc.

In one implementation, at least some of the targeting data is collectedduring campaign authorization (S210). For instance, preliminarytargeting information about the organization may be necessary, as baseinformation, for initializing one or more of the automatic orsemi-automatic search and collection processes for targeting data. Forinstance, base information may include, but is not limited to, theorganization's name, physical locations, services provided and/or goodssold, and the like. Accordingly, base information of the or Additionallyor alternatively, S230 may include collecting targeting data at anytime. This base information may be used as a starting point to identifytargeting data.

S240 includes generating control and configuration campaign parameters.S240 functions to generate control parameters used to define thephishing campaign; e.g., phishing targets, phishing vectors, phishingcampaign duration, and phishing campaign timing. S240 also functions togenerate configuration parameters used to define one or morecharacteristic and operational components of the phishing campaign;e.g., website template configuration, number website templates, routingof phished targets, and the like.

S240 preferably includes generating campaign parameters based ontargeting data collected by S230, but S240 may additionally oralternatively include generating campaign parameters based on anysuitable information (e.g., parameters supplied by a phishing campaignadministrator). For example, S240 may include identifying persons withhigh levels of network access by analyzing LinkedIn data, and thentargeting those persons with a phishing campaign.

The targeting data collected at S230 may indicate times at which networktraffic is high and email counts to one or more targeted user emailaccounts are high and thus, S240 may generate a control parameterrelated to the timing of the phishing campaign in order to align thephishing campaign with the timing of high traffic and high email countsof the one or more targeted users. Accordingly, when network traffic ishigh and a targeted users email count is high, there is a higherpossibility of tricking the user with the contents of the phishingcampaign.

Additionally, the targeting data collected at S230 may indicate one ormore frequently visited web pages of the targeted organization. Based onthis data, S240 generates website template parameters for emulating themost popular or one of the most popular web pages associated with theorganization.

S240 preferably includes identifying phishing targets. S240 may includeidentifying targets specifically (e.g., from social network data, fromthe organization's website, from internal company lists) and/or broadly(e.g., whoever uses a particular website or service). S240 mayadditionally or alternatively include classifying and/or groupingphishing targets. For example, S240 may include classifying targets intohigh-access and low-access targets. alternatively, S240 may includeclassifying targets by predicted technical sophistication. In someembodiments, the sophistication of the phishing campaign may be directlylinked or tied to the grouping type identified for the targeted users.For instance, when the targeted entity or users are grouped ashigh-access, the corresponding phishing campaign may be moresophisticated and difficult phishing campaign due to the implied orpredicted sophistication of high-access users. In such instance, theconverse would apply where a relatively low-sophistication phishingcampaign parameters are used based on low-access targets. It should benoted, however, that while phishing campaigns may be generated based onthe high or low-access dichotomy, the level of sophistication does nothave correspondingly follow a low or high classification. Any level ofphishing campaign sophistication may be implemented.

S240 preferably also includes configuring phishing vectors. Phishingvectors may include email, instant messaging, social networks, phonecalls, text messages, or any other communication platform (e.g., Yammer,HipChat, Slack). Configuring phishing vectors may include configuringvectors to operate individually (e.g., a text message and/or an emailboth link to a phishing site) or may include configuring vectors to workin concert (e.g., a text message directs a user to read an email, whichcontains a link to a phishing site).

Configuring phishing vectors preferably includes configuring vectorsources. For example, S240 may include receiving access to an employeecommunications platform in order to configure phishing messages to besent on that employee communications platform.

S240 may include configuring phishing vectors on a per-individual basis,on a per-campaign basis, on a per-organization basis, or on any suitablebasis. If S240 includes configuring phishing vectors on a per-individualbasis, S240 may include automatically identifying optimal vectors for aparticular individual; e.g., by vector usage. For example, an employeethat uses Slack frequently may be targeted on Slack, while an employeethat uses Slack infrequently may be targeted via some other vector, suchas email.

S240 preferably includes setting phishing campaign timing. Here timingmay refer to how often phishing attacks are attempted, when phishingattacks are attempted, how many phishing attacks are attempted, andoverall time limits on the campaign (if present). Campaign timing ispreferably set according to a drip schedule; that is, selectedindividuals are tested at different times during a campaign (as opposedto a one-shot schedule, wherein the entire targeted audience receivesphishing messages at the same time). Alternatively, campaign timing maybe set according to a one-shot schedule. Setting the campaign timing maybe based on a number of different factors, such as the number ofemployees within an organization, number of targeted users, locationand/or decentralization of the organization, and the like. For instance,in a decentralized organization where many of the targeted users workfrom home or work in offices with relatively a small number ofemployees, it may be optimal to use a one-shot campaign schedule sincethe targeted users may be less likely to notice or discuss a potentialphishing correspondence with another targeted user. Oppositely, in anorganization that is mainly centralized, in which a large number ofemployees are located in only a few offices or the like, a drip schedulefor a phishing campaign may raise the least amount of suspicion amongthe targeted users since only a limited number of users would be exposedto the phishing campaign.

Campaign timing is preferably conditional (i.e., the length of thecampaign is based on response to the campaign) but may alternatively beunconditional. For example, in an unconditional campaign, S240 couldinclude generating campaign parameters that dictate a phishing campaigntest an entire population of 500 users every six months by randomlyselecting 20 or 21 employees a week to receive a phishing attack. Asanother example, in a conditional campaign, a campaign may run forparticular users until those users successfully avoid succumbing tothree phishing attacks in a row. It shall be understood that theconditions applied in a campaign or otherwise used for determining theduration of a campaign may be any condition set by the administratorand/or automatically by a computing system implementing the phishingcampaign.

S240 may include adjusting phishing campaign parameters based onresponse to phishing attacks; for example, S240 may include providingmore obvious phishing campaigns to persons who repeatedly fail phishingattack tests (allowing them to train on easier material until they aremore sophisticated, for instance). In one implementation, S240 mayinclude generating phishing campaign parameters according to a spacedrepetition technique, wherein the length of time between phishingattacks and/or the sophistication level of phishing attacks is increasedbased on successful user identification of phishing attacks (which maybe judged by non-response to phishing attacks).

S250 includes generating campaign templates. S250 functions to generatephishing campaign material (e.g., websites, emails, instant messages,text messages, images, etc.) to be used in phishing attacks according toone or more configuration parameters identified at S240 and otherwise,programmed into the method or provided by the administrator or the like.S250 preferably includes generating campaign templates based ontargeting data collected by S230 and phishing campaign parametersgenerated in S240 (e.g., which vectors are to be used), but mayadditionally or alternatively include generating campaign templatesbased on any suitable data.

S250 preferably includes generating phishing websites by mirroringwebsites already in use by an organization and modifying them to preparefor the phishing attack (e.g., by removing the ability to actuallysubmit sensitive data, by inserting JavaScript that records targeteduser activities and/or behavior on the phishing websites, etc.).Specifically, S250 preferably is able to automatically identify servicesassociated with a targeted organization and automatically construct aphishing website by using technique that involves crawling the one ormore websites or web content associated with the targeted organization.As described herein, by crawling the one or more websites associatedwith the targeted organization, S250 is able to identify services andcapture the content existing on the one or more websites. The captureddata is then used at S250 to replicate fictitious websites together withcopied services for implementing a phishing campaign with an attackdomain name.

Additionally, or alternatively, S250 may incorporate generating phishingwebsites in any manner. These websites are preferably identifiedautomatically in S230 and/or S240, but may additionally or alternativelybe specified by campaign administrators.

Templates generated by S250 may be generic or personalized; for example,a phishing email may include a field that automatically incorporates theemail address owner's name.

S250 may include generating phishing templates according to a setsophistication criterion; for example, a phishing template generatedwith a low sophistication criterion might appear obviously suspicious tomost users, while a phishing template generated with a highsophistication criterion may not appear suspicious to many users. Thesophistication criterion may be determined in some embodiments based ona predetermined sophistication threshold; where, in one example, if thequality of the content, images, and other information used in a phishingtemplate is below the predetermined sophistication threshold, then thesophistication criterion is determined to be low, but if thecharacteristics and quality of the phishing template is equal to orexceeds the predetermined sophistication threshold, then thesophistication criterion is determined to be high.

S250 preferably enables campaign template generation with low campaignadministrator involvement, but may additionally or alternatively allowcampaign administrators to produce and/or edit campaign templatesmanually. In some embodiments, S250 enables campaign template generationwithout any human intervention, including intervention by theadministrator, once a phishing campaign is initialized (e.g., byselecting a start button or simply running the program).

S250 may include generating campaign templates based on past or previouscampaign data; for example, if a particular style of campaign templateis identified as successful, S250 may include increasing the likelihoodthat that style of campaign template is used or components thereof areconsidered in campaign template generation.

In a variation of a preferred embodiment, S250 may include inserting aphishing service signature into a phishing email, phishing site, and/orany other phishing template. Such a phishing service signature could beverified by an external provider or vendor possessing a correspondingpublic key (e.g., an asymmetric public key) in order to distinguish realphishing attacks from the phishing campaign and prevent phishing serviceservers from being automatically blacklisted (e.g., by Google Apps Mailused in an organization). The signature preferably includes a phishingservice identity, but may additionally or alternatively include anidentifier that uniquely identifies a piece of content generated in S250(e.g., the URL of a phishing website, the hash of a phishing emailbody). The signature may be embedded in any suitable manner, includingembedding in a DNS record, in an HTTP header, and in HTML of thephishing website itself. Alternatively, the signature may be hosted at aspecial designated URL.

S260 includes performing a campaign. S260 functions to run a phishingcampaign using the phishing campaign templates generated in S250,according to the phishing campaign parameters generated in S240. Forexample, S260 may include sending out phishing text messages and emailsthat direct users to a phishing website (all generated by S250)according to a user list and timing schedule set by S240.

In addition to producing a phishing attack as specified by S240/S250,S260 preferably includes collecting response data (e.g., did a userenter text into a password box on a phishing page, did a user click on aphishing website). S260 preferably includes collecting response data ata finely-grained level in order to provide detailed data for campaignanalysis produced by S270.

S260 may additionally include collecting endpoint health data (e.g., howvulnerable a user system is to attack as measured by OS version, browserversion, configuration etc.) as described in U.S. ProvisionalApplication No. 62/169,254, the entirety of which is incorporated bythis reference.

S270 includes producing campaign analysis. S270 functions to enablecampaign administrators to understand the results of a phishing campaignand to take action in response to those results. Specifically, based onone or more of the response data, user activity and behavior data, andthe like, S270 is able to generate comprehensive information andillustrations (e.g., graphs, charts, and the like) about the results ofthe phishing campaign for consideration and possibly, furtherexploration by an administrator. The comprehensive information andillustrations may include selectable elements which may be selected bythe administrator to expand information therein and/or to performfurther analysis on the information and/or illustration. Therefore, anadministrator is able to analyze the results at a fine-grained levelusing one or more tools provided with the phishing campaign results.

S270 preferably includes providing a real-time campaign analysisinterface (e.g., phishing assessment interface) that tracks activitiesof users being assessed and how users respond to a phishing campaign.This interface could take the appearance of an interface that shows allusers currently interacting with the phishing campaign with someindication of their status (e.g., “seen campaign”, “clicked on phishinglink”, “entered credentials into link”, and the like), as shown in FIG.4A, or it could take any other appearance. Such an interface could thenallow individual users to be selected, prompting a user-detail page tobe displayed as shown in FIG. 4B. Event tracking may be performed byS270 according to any level of detail; for example, S270 may track usercursor location every looms to determine how the user interacts withphishing campaign material.

S270 preferably additionally includes providing post-campaign (orduring-campaign) analysis on the progress of the campaign over time. Forexample, S270 may generate analysis on which users are most at risk forphishing attacks, so those users may be given special training. Asanother example, S270 may track phishing response rate over time todetermine if the employee base of an organization is improving atdetecting phishing attacks.

In addition to producing campaign analysis, S270 may additionally oralternatively include providing suggestions to campaign administratorson how to improve security. For example, S270 may include suggestingthat a department be subject to a higher frequency of phishing campaignsin response to repeated failures by members of that department.

Any of real-time campaign analysis, post-campaign analysis, and securitysuggestions may be augmented or aided by endpoint health data collectedin S260 (or in any other manner).

S270 may also include exporting campaign analysis; for example, acampaign administrator may send campaign analysis produced in S270 to acomputer security company to receive suggestions on how to improveeducation and/or policy within the organization.

The method of the preferred embodiment and variations thereof can beembodied and/or implemented at least in part as a machine configured toreceive a computer-readable medium storing computer-readableinstructions. The instructions are preferably executed bycomputer-executable components preferably integrated with a phishingcampaign service. The computer-readable medium can be stored on anysuitable computer-readable media such as RAMs, ROMs, flash memory,EEPROMs, optical devices (CD or DVD), hard drives, floppy drives, or anysuitable device. The computer-executable component is preferably ageneral or application specific processor, but any suitable dedicatedhardware or hardware/firmware combination device can alternatively oradditionally execute the instructions.

As a person skilled in the art will recognize from the previous detaileddescription and from the figures and claims, modifications and changescan be made to the preferred embodiments of the invention withoutdeparting from the scope of this invention defined in the followingclaims.

What is claimed is:
 1. A method for implementing a phishing campaignthat tests for computer security vulnerabilities in a target computernetwork, the method comprising: at a phishing assessment computer thatautomatically configures and/or generates one or more test parameters ofthe phishing campaign including: automatically generating a pseudodomain name and a pseudo web page using target entity data, wherein thetarget entity data includes one or more of a name of a target entity anda legitimate web page associated with the target entity; automaticallyselecting a plurality of target users of the target computer network astargets of the phishing campaign; using one or more of the pseudo domainname and the pseudo web page to generate one or more phishing attackcommunications; configuring one or more phishing communication vectorsfor the phishing campaign to transmit the one or more phishing attackcommunications; setting a predetermined drip schedule that implementsthe phishing campaign over a predetermined period and that transmits theone or more phishing attack communications to different subsets of theplurality of target users during different times during thepredetermined period: transmitting the one or more phishing attackcommunications, via the one or more phishing communication vectors, tothe different subsets of the plurality of target users according to thepredetermined drip schedule; collecting target user activity data,wherein the target user activity data includes data describinginteractions of the one or more target users with the one or morephishing attack communications; identifying at-risk target users basedon the collected target user activity data, wherein the at-risk targetusers include a set of the plurality of target users that succumbed tothe one or more phishing attack communications; generating a phishingrisk analysis of the target computer network based on the collectedtarget user activity data; and wherein the configuring and/or generatingthe one or more test parameters of the phishing campaign includes:configuring at least two of the one or more phishing communicationvectors to work in concert, wherein a first of the at least two phishingcommunication vectors includes a message that directs a target user tointeract with a phishing attack communication message of a second of theat least two phishing communication vectors.
 2. The method of claim 1,wherein further at the phishing assessment platform: collecting responsedata obtained via the pseudo web page, wherein the response datacomprises user credentials of one or more of the plurality of targetusers.
 3. The method of claim 1, wherein generating the one or more testparameters for the phishing campaign further includes: identifyingtarget devices operating on or having access to the target computernetwork as attack mediums of the phishing campaign; and wherein the oneor more communication vectors comprise the identified target devices,wherein the one or more phishing attack communications transmitted tothe identified target devices.
 4. The method of claim 1, furthercomprising: at the phishing assessment computer: verifying authorizationof an administrator for implementing the phishing campaign, wherein theverifying authorization includes: (i) identifying one or more profilesassociated with the administrator to verify credentials of theadministrator; (ii) comparing profile data obtained from the one or moreprofiles associated with the administrator to a predeterminedspecification list for authorized administrators; and (iii) approvingthe administrator if the retrieved data sufficiently corresponds toelements within the predetermined specification list.
 5. The method ofclaim 1, further comprising: at the phishing assessment computer:verifying authorization of an administrator for implementing thephishing campaign, wherein the verifying authorization of theadministrator is performed on a per-domain basis or for a set ofInternet protocol (IP) addresses, such that for each domain or set of IPaddresses separate verification of authorization of the administrator isrequired.
 6. The method of claim 1, further comprising: at the phishingassessment computer: verifying authorization for implementing thephishing campaign, wherein when the phishing campaign is autonomouslyimplemented by a server or a computer associated with the phishingassessment computer, verifying that the server or the computer hasproper permissions and access rights to one or more devices operating onthe target network which are subjects of the phishing campaign.
 7. Themethod of claim 1, further comprising: at the phishing assessmentcomputer: verifying authorization of an administrator for implementingthe phishing campaign, wherein the verifying authorization includestesting the administrator to determine whether the administrator has themanagement and/or access rights to perform a modification to one or morecomponents of the target compute network.
 8. The method of claim 1,wherein the generated pseudo domain name is a look-alike domain namewith respect to the legitimate target domain name, such that when thepseudo domain name is compared to the legitimate target domain name,there are visual similarities between the pseudo domain name and thelegitimate target domain name.
 9. The method of claim 8, whereingenerating the one or more test parameters for the phishing assessmentfurther includes: configuring the phishing campaign as a multi-vectorphishing campaign that includes transmitting the phishing attackcommunications to the target computer network or the one or more targetusers via at least a first communication vector and a secondcommunication vector, wherein the first and second communication vectorsare different.
 10. The method of claim 1, wherein the generated pseudodomain name is generated according to a selection of one or of acombination of domain name transformation processes including ahomoglyph transformation process, a TLD alternation/modificationprocess, generic or service-specific prefix/suffix augmentation process,character repositioning and spacing, character transposition process,and character deletion process.
 11. The method of claim 1, furthercomprising: implementing a phishing assessment interface that presentsreal-time activity information, wherein the real-time activityinformation indicates one or more activities performed by the one ormore target users that received a phishing attack communication, thephishing attack communication comprising a reference to one or more ofthe generated pseudo domain name and the pseudo web page.
 12. The Systemof claim 1, wherein the configuring and/or generating the one or moretest parameters of the phishing campaign includes: confirming a grant ofauthorization to implement the phishing campaign against target computernetwork.
 13. The system of claim 1, wherein: the phishing assessmentcomputer operates to: perform event tracking that tracks a target user'sinteraction with the one or more phishing attack communications based atleast on the target user's use of a cursor to interact with the one ormore phishing attack communications.
 14. The system of claim 1, whereinin response to phishing risk analysis of the target computer network,modifying computer security policy thereby reducing computer securityvulnerabilities of the target computer network.
 15. A system thatimplements a phishing campaign that tests for computer securityvulnerabilities in a target computer network, the system includes: aphishing assessment computer that automatically configures and/orgenerates one or more test parameters of the phishing campaignincluding: automatically generating a pseudo domain name and a pseudoweb page using target entity data, wherein the target entity dataincludes one or more of a name of a target entity and a legitimate webpage associated with the target entity; automatically selecting aplurality of target users of the target computer network as targets ofthe phishing campaign; using one or more of the pseudo domain name andthe pseudo web page to generate one or more phishing attackcommunications; configuring one or more phishing communication vectorsfor the phishing campaign to transmit the one or more phishing attackcommunications; setting a predetermined drip schedule that implementsthe phishing campaign over a predetermined period and that transmits theone or more phishing attack communications to different subsets of theplurality of target users during different times during thepredetermined period: transmitting the one or more phishing attackcommunications, via the one or more phishing communication vectors, tothe different subsets of the plurality of target users according to thepredetermined drip schedule; collecting target user activity data,wherein the target user activity data includes data describinginteractions of the one or more target users with the one or morephishing attack communications; identifying at-risk target users basedon the collected target user activity data, wherein the at-risk targetusers include a set of the plurality of target users that succumbed tothe one or more phishing attack communications; generating a phishingrisk analysis of the target computer network based on the collectedtarget user activity data; and wherein the configuring and/or generatingthe one or more test parameters of the phishing campaign includes:configuring at least two of the one or more phishing communicationvectors to work in concert, wherein a first of the at least two phishingcommunication vectors includes a message that directs a target user tointeract with a phishing attack communication message of a second of theat least two phishing communication vectors.
 16. The system of claim 15,wherein performing the phishing attack includes: identifying one or morecommunication vectors associated with the target computer network or theone or more target users associated with the target computer network;generating a phishing attack communication message, the phishing attackcommunication message comprising a reference to one or more of thegenerated pseudo domain name and the pseudo web page; and transmittingthe phishing attack communication message, via the identified one ormore communication channels, to the target computer network or the oneor more target users associated with the target computer network.
 17. Asystem according to claim 16, further comprising: a phishing assessmentinterface, wherein the phishing assessment interface comprises one ormore output components that present activity tracking informationrelating to activities of the one or more target users receiving thephishing attack communication message, wherein the activity trackinginformation comprises data associated with the one or more target users'interactions with the phishing attack communication message.
 18. Anon-transitory computer program product comprising computer-executableinstructions that, when executed by one or more computer processors,performs: automatically generating a pseudo domain name and a pseudo webpage using target entity data, wherein the target entity data includesone or more of a name of a target entity and a legitimate web pageassociated with the target entity; automatically selecting a pluralityof target users of the target computer network as targets of thephishing campaign; using one or more of the pseudo domain name and thepseudo web page to generate one or more phishing attack communications;configuring one or more phishing communication vectors for the phishingcampaign to transmit the one or more phishing attack communications;setting a predetermined drip schedule that implements the phishingcampaign over a predetermined period and that transmits the one or morephishing attack communications to different subsets of the plurality oftarget users during different times during the predetermined period;transmitting the one or more phishing attack communications, via the oneor more phishing communication vectors, to the different subsets of theplurality of target users according to the predetermined drip schedule;collecting target user activity data, wherein the target user activitydata includes data describing interactions of the one or more targetusers with the one or more phishing attack communications; identifyingat-risk target users based on the collected target user activity data,wherein the at-risk target users include a set of the plurality oftarget users that succumbed to the one or more phishing attackcommunications; generating a phishing risk analysis of the targetcomputer network based on the collected target user activity data; andwherein the configuring and/or generating the one or more testparameters of the phishing campaign includes: configuring at least twoof the one or more phishing communication vectors to work in concert,wherein a first of the at least two phishing communication vectorsincludes a message that directs a target user to interact with aphishing attack communication message of a second of the at least twophishing communication vectors.