Outside the IT perimeter
External domains, fake social profiles, app stores, deepfake video: none of them produce logs in the customer's systems. The SOC does not see them.
Domain spoofing, fake LinkedIn profiles of executives, phishing kits with customer logos, fake mobile apps, CEO/CFO deepfakes, brand mentions on criminal channels. These are threats that hit the brand before the systems · outside the SOC perimeter. Fortgale detects them and coordinates take-down with registrars, social platforms and mobile stores.
The SOC monitors endpoints, network, identity. But the brand is attacked outside that perimeter: on registrars, on social platforms, in app stores, on AI-generated channels. To the SOC they are invisible · to marketing and legal they are problems without tools.
External domains, fake social profiles, app stores, deepfake video: none of them produce logs in the customer's systems. The SOC does not see them.
Marketing and legal teams see the problems when customers complain. Without proactive monitoring they are reacting, not defending.
A phishing kit carrying the brand logo can live for days before take-down. Every hour adds victims and reputational damage.
Traditional brand protection is passive (search alerts, mention monitoring). Fortgale Brand Intelligence is operational: detection, validation, take-down.
Four documented phases · from the inventory of brand assets to the coordinated removal of the threat.
Mapping of brand assets: logo (every variant, colour/white/black, with and without wordmark), executive list (with official photos), brand vocabulary (taglines, slogans, products, certifications), canonical domains. The baseline against which every detection is compared.
Continuous monitoring of registrar feeds (newly registered domains), social platforms (LinkedIn, Telegram, X, Meta, TikTok), app stores (Google Play, Apple App Store), dark web channels, paste sites, AI-generated content sources.
Image similarity (logo matching via perceptual hash + AI), content analysis (brand vocabulary, context), intent inference (configured phishing kit, redirect chain, payload, MX configured, freshly issued certificate). AI for triage, analyst for the decision.
Structured workflow: notice to the registrar with evidence pack, escalation to CDN (Cloudflare abuse) and hoster, take-down on social platforms (Meta/LinkedIn/Telegram/X), mobile stores (Google Play / Apple App Review), ICANN URS for severe cases.
The five families of brand-related threats Fortgale monitors continuously · from traditional typosquatting to AI-generated deepfake.
Continuous monitoring of domains that can be used for brand phishing: typosquatting, IDN homograph (visually identical Cyrillic/Greek characters), different TLDs, prefix/suffix variation. Alerts on registration, MX configuration, certificate issuance.
Tracking of fake profiles impersonating customer executives for social engineering, BEC, fraud. Fake LinkedIn CFO/CEO sending connection requests, Telegram fake support, X fake brand accounts.
Modern phishing kits (Tycoon 2FA, EvilProxy, Mamba 2FA, W3LL) are configured with real logos and branding to maximise conversion rate. Detection of landing pages carrying the customer's logo.
Detection of mobile apps and e-commerce sites that mimic the customer's brand for phishing, malware, fraud. Coverage of official stores (Google Play, Apple App Store) and alternative stores (APK mirrors).
The fastest-growing vector across 2024-2026: deepfake video (CEO announcing a non-existent partnership), voice cloning (calls from a fake CFO to the treasurer for wire transfer), fake AI-generated identity for scams.
A selection of the most relevant brand threat patterns across 2024-2026 · from traditional typosquatting to fast-growing AI deepfake.
The most widespread phishing vector: domains varying by one letter, different TLDs, Unicode homographs. Real-time detection at registration · alert if MX is configured or a certificate is issued within 24h.
Fake LinkedIn profiles impersonating executives to stage BEC: connection requests, info gathering, DMs to the CFO from a fake 'CEO'. Tracking via image similarity across the customer's executive portfolio.
Telegram is the preferred channel for fraudulent customer service (crypto, fintech, retail). Channels using brand logo and name to divert real customers into scams.
WhatsApp Business spoofing is growing rapidly across 2024-2026. Detection of WA Business profiles with brand photo and name used for consumer fraud and BEC against suppliers.
Detection of fake apps that mimic the customer's official app: same name, similar logo, fake publisher. Often vehicles for banking trojans or credential theft.
Crypto tokens that use the customer's brand for pump-and-dump scams: non-existent partnership announcements, fake roadmaps. Detection on X, Telegram, crypto Discord.
The fastest-growing vector across 2024-2026. Detection of deepfake video (YouTube, TikTok, Telegram) and voice cloning (telephone BEC) that use the face and voice of executives for fraud.
Not every look-alike domain is the same. Priority comes from intent: domain with MX configured + certificate + landing page with logo = imminent. Parked domain = info.
Active phishing infrastructure: kit deployed, certificate issued, MX configured, landing page with customer logo. Immediate alert + take-down launched.
Confirmed intent (kit setup in progress, fake profile active, deepfake published) but not yet active phishing. Webhook alert within 15 min.
Look-alike without payload, fake profile not yet active, mention not operational. Included in weekly digest.
Informational mention, expired brand-protection registration, parked domain. Available on the dashboard, does not generate an alert.
Four channels for four audiences: marketing, legal, security, executive. Each one receives what is useful · no generic alerts.
Web console with a real-time view of every detected threat: look-alike domains, fake profiles, phishing kits, deepfakes. Filtering by category, severity, take-down status.
Immediate push for imminent threats (active phishing infrastructure) via webhook, email, SMS. 15-minute SLA.
Monthly report for legal and marketing: completed take-downs, average times, escalations, estimated avoided costs. Audit-committee ready.
Dedicated alert for fake profiles impersonating customer executives · direct escalation to the security team + HR for coaching of the executives involved.
If the brand is not visible online (B2B niche only, no e-commerce, no consumer-facing app), executives have no public profile, and the organisation is not in a counterfeit-target sector · brand monitoring produces little value.
Brand Intelligence is critical when: the brand is recognisable to consumers (finance, retail, luxury, private healthcare), e-commerce is live, executives have public profiles and media exposure, a mobile app is distributed, and the organisation sits in BEC or impersonation target sectors.
Not sure? Let's talk. If it is not for you, the team will say so.
Brand monitoring works in synergy with phishing protection, dark web monitoring and advisory · a defence extended to the brand, not just to IT.
When a phishing kit carrying the brand logo is detected, preventive blocking is triggered · before the email campaigns go out.
Discover phishing protection →Brand mentions on criminal channels (ransom announcements, fake support, crypto scam) are captured by dark web monitoring and correlated.
Discover Dark Web →Fake LinkedIn profiles requesting connections from executives = BEC pre-warning. The IR team is activated preventively.
Contact IR →Threat Actor Profiling · TI Feed · Advisory · Executive Briefing · Deep & Dark Web · ASM. Brand Intelligence is capability 07 of 7.
See all →The board discusses brand value in terms of reputation and P&L. Brand Intelligence produces data the CISO can take to the board in business language.
How many look-alike domains registered in the last 12 months · how many fake executive profiles · how many phishing kits found with the brand logo.
How many take-downs completed · average time (24-72h domain, 12-48h social) · estimated avoided cost per successful take-down.
Growth of deepfake/voice cloning · how many cases detected year over year · coaching recommendations for public-facing executives.
The "3 board slides" pack is included in Brand Intelligence reporting · available on request.
Monitoring of the non-IT attack surface: domain spoofing, executive impersonation on LinkedIn/Telegram, phishing kits with customer logos, fake mobile apps, CEO/CFO deepfakes, brand mentions on criminal channels. These are threats that hit the brand before the systems · the SOC often does not see them because they live outside the perimeter.
A structured workflow: 1) threat validation (configured phishing kit? customer logo? redirect pattern?), 2) notice to the registrar (GoDaddy, Namecheap, Namesilo, Reg.ru) with an evidence pack, 3) if no response, escalation to the CDN (Cloudflare abuse) and hoster, 4) in severe cases, ICANN URS (Uniform Rapid Suspension) for fast take-down. Typical time: 24-72 hours.
LinkedIn (executive impersonation, fake company pages), Telegram (fake support channels, fake brand channels, fake job offers), Meta (Facebook + Instagram fake pages and ads), X/Twitter (fake brand accounts), TikTok (deepfake video), YouTube (CEO deepfake video, phishing tutorials). Coverage also extends to WhatsApp Business spoofing and Threads.
Yes. Detection of deepfake video (CEO/CFO impersonation for BEC), audio (voice cloning for phone scams), image (fake identity for scam). Coverage of videos uploaded to YouTube/TikTok/Telegram and of audio on scam channels. Detection uses multimodal AI plus manual analyst review.
Look-alike domains via registrar: typically 24-72 hours. Social platforms (LinkedIn, Meta, X): 12-48 hours. Mobile app stores: 5-15 days. For emergencies (active phishing infrastructure already hitting customers), escalation to Cloudflare abuse for temporary blocking within 1-4 hours.
If the brand is not visible online (B2B niche, no e-commerce, no consumer-facing app), executives have no public profile, and the organisation is not in a counterfeit-target sector (luxury, retail, finance, private healthcare). In these cases brand monitoring produces little value. Where the brand is recognisable and the executives have public profiles, monitoring is one of the most effective defence levers against BEC and social engineering.
Request a free 30-day scan · 5 domains, 10 executives, brand keywords, app stores, deepfake sources. The team returns a report with real detected events · no commitment.
No nurturing sequences, no auto-replies. One of our analysts calls you back within one business day.
The full Report (executive summary · operational IoCs · technical runbook) is restricted. Share two details and one of our analysts contacts you with access and a short technical briefing.
Response in 30 minutes, containment in 1–4 hours. Even if you are not a Fortgale customer.