1. Help Center
  2. Trusteer Rapport

Which attacks does Rapport protect against?

Rapport guards your information against the following attacks: Phishing A phishing attacker builds a phishing website, a fake website that looks exactly like a site you know and trust (for example, hancockwhitney.com). The attacker then lures you to visit the phishing site, often by sending you a fraudulent e-mail. When you arrive at the phishing website, you may be convinced that it is authentic. When you use your login credentials to sign into the phishing website, the attacker steals your information and can use it to login to the real website, impersonate you and initiate fraudulent transactions. Pharming A pharming attack causes your computer to go to a fraudulent website when you type a real website's name in your Web browser's address bar. Once you arrive at the fraudulent website and try to sign in, the attacker steals your login credentials and can use them to login to the real website, impersonate you and initiate fraudulent transactions. Keyloggers A keylogger is malicious software that hides itself inside your computer. The keylogger records keystrokes (i.e., each time you type something on the keyboard) and then sends this information to the attacker. By grabbing your sign-in credentials and other sensitive information and sending them to an attacker, keyloggers enable an attacker to log in to your accounts, impersonate you and initiate fraudulent transactions. Man-in-the-Middle Man-in-the-middle is an advanced variation of phishing and pharming attacks. In this attack, when you sign into a website and start working, all the information exchanged between you and the website passes to the attacker, but it is unlikely that you will detect any of this malicious activity. The attacker can view any private information and can alter your transactions. For example, if you request to transfer a certain amount of money to a specific payee, the attacker can change the payee's identity and have the money transferred to a different account. Man-in-the-Browser Man-in-the-browser is malware that resides inside your browser in the form of an add-on (such as a toolbar or a browser plug-in). This malware controls everything that happens inside your browser. It is capable of reading sensitive information such as your sign-in credentials and passing them to the attacker. It can also generate transactions on your behalf, such as transferring money from your account to the attacker's account. Screen Capturing This type of malware takes pictures of your computer screen and sends them to the attacker. Screen shots can include your account details, balance and even credentials when the website uses keypads for login. Session Hijacking This malware (malicious software specifically designed to damage a computer) steals your session parameters with a specific website and sends this information to the attacker. These session parameters can then be used by the attacker to take over your session with the website and to bypass the authentication process that is required to log in to the website.