Blog
/
/
July 12, 2020

Darktrace AI Email Finds Chase Fraud Alert

Stop Chase fraud alerts! Learn how Darktrace AI email security caught a malicious email impersonating Chase bank, preventing credential theft in real time.
No items found.
Inside the SOC
Darktrace cyber analysts are world-class experts in threat intelligence, threat hunting and incident response, and provide 24/7 SOC support to thousands of Darktrace customers around the globe. Inside the SOC is exclusively authored by these experts, providing analysis of cyber incidents and threat trends, based on real-world experience in the field.
No items found.
Default blog imageDefault blog imageDefault blog imageDefault blog imageDefault blog imageDefault blog image
12
Jul 2020

In a previous blog, we analyzed a phishing attack that impersonated QuickBooks, an accounting software, in an attempt to install malware across an organization. This blog demonstrates another recent threat find where the brand of a trusted financial organization was leveraged to launch an email attack.

With an annual revenue of over $100 billion, Chase is the second largest issuer of credit cards in the US. It is unsurprising that this well-known, trusted brand is used by attackers in phishing attacks. With the recent surge in e-commerce transactions, together with increased scrutiny regarding digital security, consumers are on high-alert when it comes to the security of their banking details. A ‘fraud alert’ from a financial institution triggers stress and anxiety, and recipients may rush to take action, forgetting security training and clicking on links even if they appear to be suspicious. By playing on human emotions, attackers increase their likelihood of success.

The anatomy of an attack

An attacker appears to have invested a significant amount of research and preparation into crafting a legitimate-looking Chase fraud alert.

Figure 1: A partial recreation of the malicious email

In the phishing email above the recipient is asked to confirm that a listed transaction is legitimate. The notification, whether received through email, text message, or an app, will usually include the name of the vendor, date and time of the transaction, and the amount of money. The attacker has gone to the trouble to replicate this, listing specific suspicious transactions.

Attackers often leverage well-known brands like Chase to indiscriminately target a large pool of inboxes. They are statistically likely to find a Chase customer without having to go through the effort of actually hacking Chase’s CRM.

But while emails like these bypass legacy tools and often fool the human recipient, they are easily detected by Antigena Email’s contextual understanding of anomalous activity and stopped by its autonomous response.

How AI caught the fake fraud alert

In this case, as soon as the spoofed fraud alert hit the inbox, Antigena Email detected that the email was unusual, giving the email an 100% anomaly score.

100%

Mon Jun 22 2020, 10:38:34

From:Chase Fraud Alert <chase@fraudpreventino.czh.com>

Recipient:Kirsty Dunhill <kirsty.dunhill@holdingsinc.com>

Action Needed: Confirm you made these purchases

Email Tags

Suspicious Link

New Contact

Unknown Correspondent

Actions on Email

Lock Link

Hold Message

Figure 2: Darktrace’s AI surfacing the email as 100% anomalous

With this high anomaly score indicating a highly unusual email, Antigena Email automatically held it back from the user’s inbox.

The sender’s domain, ‘fraudpreventino’, is visually similar to ‘fraudprevention’ – the domain of the legitimate website – so the look-a-like could be easily misread as legitimate by a user.

However, in Antigena Email dashboard’s advanced tab, we see the metrics for KCE and KCD are both 0, indicating that this is a new email address that has not previously corresponded with either the recipient or anyone else within the organization. Additionally, we can see that DKIM failed and there is no SPF record, and so there were no records to validate the authenticity of the email.

Figure 3: The Threat Visualizer shows the emails have failed SPF and DKIM checks

Antigena Email detected other unusual aspects of the email indicating that it was an attack. The email contained a number of anomalous links and there was an inconsistency between the displayed link address and the actual destination of the hyperlink.

The display link in this particular email was a newly registered domain at the time the email was sent. Not surprisingly, this domain is now being identified as a malicious page. However, at the time the email was sent, the domain was not listed on ‘deny lists’ and would have slipped past spam filters or legacy security tools.

Upon clicking the link, the user would have been presented with a fraudulent Chase login screen. This is a common credential harvesting technique – when the user enters their credentials, they unknowingly hand over this information to the attacker.

Figure 4: The fake Chase login screen with credential harvesting malware

The website has now also been recognized as malicious, with users now presented with a warning encouraging them to think twice before entering sensitive information.

Figure 5: The page is later recognized as harmful by the web browser

It is not clear how long the fake login page was in existence before it was added to ‘denylists’, but what is certain is that Antigena Email was able to prevent the attack by holding back the email even without any threat intelligence on the attacker technique, ensuring no damage was done.

Figure 6: Antigena Email recognizes when a malicious link is hidden behind a misleading button

In addition to this button, the attacker also took time to add many legitimate Chase links and images. By padding the email with mostly valid content and links, the attacker attempted to deceive legacy email security tools into perceiving the email as benign. Notice below that these all link to the legitimate address for ‘fraudprevention,’ which itself was used as the source of the altered domain name for the sender.

Figure 7: The full list of links contained in the email

Defending against sophisticated phishing attacks

Attackers continue to leverage social engineering tactics to play on human error and fear in increasingly targeted phishing attacks, crafting nuanced misspellings in their domain names, padding emails with legitimate links, and creating a false sense of urgency. Self-learning AI that can spot and stop threats with both machine speed and precision becomes a critical tool at a time when humans have become even more susceptible as people’s stress and anxiety levels have become heightened by global disruption.

Of course, in this attack there is an irony in that the order of operations is directly inverted: first comes the notification, then comes the fraud. But with Antigena Email, attacks like this are stopped in their tracks, protecting employees and organizations from harm.

No items found.
Inside the SOC
Darktrace cyber analysts are world-class experts in threat intelligence, threat hunting and incident response, and provide 24/7 SOC support to thousands of Darktrace customers around the globe. Inside the SOC is exclusively authored by these experts, providing analysis of cyber incidents and threat trends, based on real-world experience in the field.
No items found.

More in this series

No items found.

Blog

/

/

September 23, 2025

It’s Time to Rethink Cloud Investigations

Default blog imageDefault blog image

Cloud Breaches Are Surging

Cloud adoption has revolutionized how businesses operate, offering speed, scalability, and flexibility. But for security teams, this transformation has introduced a new set of challenges, especially when it comes to incident response (IR) and forensic investigations.

Cloud-related breaches are skyrocketing – 82% of breaches now involve cloud-stored data (IBM Cost of a Data Breach, 2023). Yet incidents often go unnoticed for days: according to a 2025 report by Cybersecurity Insiders, of the 65% of organizations experienced a cloud-related incident in the past year, only 9% detected it within the first hour, and 62% took more than 24 hours to remediate it (Cybersecurity Insiders, Cloud Security Report 2025).

Despite the shift to cloud, many investigation practices remain rooted in legacy on-prem approaches. According to a recent report, 65% of organizations spend approximately 3-5 days longer when investigating an incident in the cloud vs. on premises.

Cloud investigations must evolve, or risk falling behind attackers who are already exploiting the cloud’s speed and complexity.

4 Reasons Cloud Investigations Are Broken

The cloud’s dynamic nature – with its ephemeral workloads and distributed architecture – has outpaced traditional incident response methods. What worked in static, on-prem environments simply doesn’t translate.

Here’s why:

  1. Ephemeral workloads
    Containers and serverless functions can spin up and vanish in minutes. Attackers know this as well – they’re exploiting short-lived assets for “hit-and-run” attacks, leaving almost no forensic footprint. If you’re relying on scheduled scans or manual evidence collection, you’re already too late.
  2. Fragmented tooling
    Each cloud provider has its own logs, APIs, and investigation workflows. In addition, not all logs are enabled by default, cloud providers typically limit the scope of their logs (both in terms of what data they collect and how long they retain it), and some logs are only available through undocumented APIs. This creates siloed views of attacker activity, making it difficult to piece together a coherent timeline. Now layer in SaaS apps, Kubernetes clusters, and shadow IT — suddenly you’re stitching together 20+ tools just to find out what happened. Analysts call it the ‘swivel-chair Olympics,’ and it’s burning hours they don’t have.
  3. SOC overload
    Analysts spend the bulk of their time manually gathering evidence and correlating logs rather than responding to threats. This slows down investigations and increases burnout. SOC teams are drowning in noise; they receive thousands of alerts a day, the majority of which never get touched. False positives eat hundreds of hours a month, and consequently burnout is rife.  
  4. Cost of delay
    The longer an investigation takes, the higher its cost. Breaches contained in under 200 days save an average of over $1M compared to those that linger (IBM Cost of a Data Breach 2025).

These challenges create a dangerous gap for threat actors to exploit. By the time evidence is collected, attackers may have already accessed or exfiltrated data, or entrenched themselves deeper into your environment.

What’s Needed: A New Approach to Cloud Investigations

It’s time to ditch the manual, reactive grind and embrace investigations that are automated, proactive, and built for the world you actually defend. Here’s what the next generation of cloud forensics must deliver:

  • Automated evidence acquisition
    Capture forensic-level data the moment a threat is detected and before assets disappear.
  • Unified multi-cloud visibility
    Stitch together logs, timelines, and context across AWS, Azure, GCP, and hybrid environments into a single unified view of the investigation.
  • Accelerated investigation workflows
    Reduce time-to-insight from hours or days to minutes with automated analysis of forensic data, enabling faster containment and recovery.
  • Empowered SOC teams
    Fully contextualised data and collaboration workflows between teams in the SOC ensure seamless handover, freeing up analysts from manual collection tasks so they can focus on what matters: analysis and response.

Attackers are already leveraging the cloud’s agility. Defenders must do the same — adopting solutions that match the speed and scale of modern infrastructure.

Cloud Changed Everything. It’s Time to Change Investigations.  

The cloud fundamentally reshaped how businesses operate. It’s time for security teams to rethink how they investigate threats.

Forensics can no longer be slow, manual, and reactive. It must be instant, automated, and cloud-first — designed to meet the demands of ephemeral infrastructure and multi-cloud complexity.

The future of incident response isn’t just faster. It’s smarter, more scalable, and built for the environments we defend today, not those of ten years ago.  

On October 9th, Darktrace is revealing the next big thing in cloud security. Don’t miss it – sign up for the webinar.

darktrace live event launch
Continue reading
About the author
Kellie Regan
Director, Product Marketing - Cloud Security

Blog

/

/

September 22, 2025

Understanding the Canadian Critical Cyber Systems Protection Act

Default blog imageDefault blog image

Introduction: The Canadian Critical Cyber Systems Protection Act

On 18 June 2025, the Canadian federal Government introduced Bill C-8 which, if adopted following completion of the legislative process, will enact the Critical Cyber Systems Protection Act (CCSPA) and give Canada its first federal, cross-sector and legally binding cybersecurity regime for designated critical infrastructure providers. As of August 2025, the Bill has completed first reading and stands at second reading in the Canadian House of Commons.

Political context

The measure revives most of the stalled 2022 Bill C-26 “An Act Respecting Cyber Security” which “died on Paper” when Parliament was prorogued in January 2025, in the wake of former Prime Minister Justin Trudeau’s resignation.

The new government, led by Mark Carney since March 2025, has re-tabled the package with the same two-part structure: (1) amendments to the Telecommunications Act that enable security directions to telecoms; and (2) a new CCSPA setting out mandatory cybersecurity duties for designated operators. This blog focuses on the latter.

If enacted, Canada will join fellow Five Eyes partners such as the United Kingdom and Australia, which already impose statutory cyber-security duties on operators of critical national infrastructure.

The case for new cybersecurity legislation in Canada

The Canadian cyber threat landscape has expanded. The country's national cyber authority, the Canadian Centre for Cybersecurity (Cyber Centre), recently assessed that the number of cyber incidents has “sharply increased” in the last two years, as has the severity of those incidents, with essential services providers among the targets. Likewise, in its 2025-2026 National Cyber Threat Assessment, the Cyber Centre warned that AI technologies are “amplifying cyberspace threats” by lowering barriers to entry, improving the speed and sophistication of social-engineering attacks and enabling more precise operations.

This context mirrors what we are seeing globally: adversaries, including state actors, are taking advantage of the availability and sophistication of AI tools, which they have leverage to amplify the effectiveness of their operations. In this increasingly complex landscape, regulation must keep pace and evolve in step with the risk.

What the Canadian Critical Cyber Systems Protection Act aims to achieve

  • If enacted, the CCSPA will apply to operators in federally regulated critical infrastructure sectors which are vital to national security and public safety, as further defined in “Scope” below (the “Regulated Entities”), to adopt and comply with a minimum standard of cybersecurity duties (further described below)  which align with those its Five Eyes counterparts are already adhering to.

Who does the CCSPA apply to

The CCSPA would apply to designated operators that deliver services or systems within federal jurisdiction in the following priority areas:

  • telecommunications services
  • interprovincial or international pipeline and power line systems, nuclear energy systems, transportation systems
  • banking and clearing  
  • settlement systems

The CCSPA would also grant the Governor in Council (Federal Cabinet) with powers to add or remove entities in scope via regulation.

Scope of the CCSPA

The CCSPA introduces two key instruments:

First, it strengthens cyber threat information sharing between responsible ministers, sector regulators, and the Communications Security Establishment (through the Cyber Centre).

Second, it empowers the Governor in Council (GIC) to issue Cyber Security Directions (CSDs) - binding orders requiring a designated operator to implement specified measures to protect a critical cyber system within defined timeframes.

CSDs may be tailored to an individual operator or applied to a class of operators and can address technology, process, or supplier risks. To safeguard security and commercial confidentiality, the CCSPA restricts disclosure of the existence or content of a CSD except as necessary to carry it out.

Locating decision-making with the GIC ensures that CSDs are made with a cross-government view that weighs national security, economic priorities and international agreement.

New obligations for designated providers

The CCSPA would impose key cybersecurity compliance and obligations on designated providers. As it stands, this includes:

  1. Establishing and maintaining cybersecurity programs: these will need to be comprehensive, proportionate and developed proactively. Once implemented, they will need to be continuously reviewed
  2. Mitigating supply chain risks: Regulated Entities will be required to assess their third-party products and services by conducting a supply chain analysis, and take active steps to mitigate any identified risks
  3. Reporting incidents:  Regulated Entities will need to be more transparent with their reporting, by making the Communications Security Establishment (CSE) aware of any incident which has, or could potentially have, an impact on a critical system. The reports must be made within specific timelines, but in any event within no more than 72 hours;
  4. Compliance with cybersecurity directions:  the government will, under the CCSPA, have the authority to issue cybersecurity directives in an effort to remain responsive to emerging threats, which Regulated Entities will be required to follow once issued
  5. Record keeping: this shouldn’t be a surprise to many of those Regulated Entities which fall in scope, which are already likely to be subject to record keeping requirements. Regulated Entities should expect to be maintaining records and conducting audits of their systems and processes against the requirements of the CCSPA

It should be noted, however, that this may be subject to change, so Regulated Entities should keep an eye on the progress of the Bill as it makes its way through parliament.

Enforcement of the Act would be carried out by sector-specific regulators identified in the Act such as the Office of the Superintendent of Financial Institutions, Minister of Transport, Canada Energy Regulator, Canadian Nuclear Safety Commission and the Ministry of Industry.

What are the penalties for CCSPA non-compliance?

When assessing the penalties associated with non-compliance with the requirements of the CCSPA, it is clear that such non-compliance will be taken seriously, and the severity of the penalties follows the trend of those applied by the European Union to key pieces of EU legislation. The “administrative monetary penalties” (AMPs) set by regulation could see fines being applied of up to C$1 million for individuals and up to C$15 million for organizations.

Continue reading
About the author
The Darktrace Community
Your data. Our AI.
Elevate your network security with Darktrace AI