US 12,309,199 B2
Phishing attempt search interface
Deepakeswaran Sundaragopal Kolingivadi, Dublin, CA (US); Amil Sharma, Cupertino, CA (US); Santosh Reddy Poreddy, Dublin, CA (US); and Sachin Shivarama Nayak, Santa Clara, CA (US)
Assigned to ServiceNow, Inc., Santa Clara, CA (US)
Filed by ServiceNow, Inc., Santa Clara, CA (US)
Filed on Jan. 9, 2023, as Appl. No. 18/151,941.
Application 18/151,941 is a continuation of application No. 17/444,706, filed on Aug. 9, 2021, granted, now 11,558,421.
Application 17/444,706 is a continuation of application No. 16/132,890, filed on Sep. 17, 2018, granted, now 11,089,053, issued on Aug. 10, 2021.
Prior Publication US 2023/0164181 A1, May 25, 2023
Int. Cl. H04L 9/40 (2022.01); H04L 41/22 (2022.01); H04L 51/212 (2022.01); H04L 51/42 (2022.01); H04L 67/50 (2022.01)
CPC H04L 63/1483 (2013.01) [H04L 41/22 (2013.01); H04L 51/212 (2022.05); H04L 51/42 (2022.05); H04L 63/0236 (2013.01); H04L 63/101 (2013.01); H04L 67/535 (2022.05)] 20 Claims
OG exemplary drawing
 
1. A system, comprising:
one or more processors executing on a cloud-based platform; and
memory configured to store instructions which, when executed by the one or more processors, cause the one or more processors to perform operations comprising:
identifying a plurality of targets of a phishing attempt based at least on a parameter associated with the phishing attempt, wherein the phishing attempt originates from outside of the cloud-based platform hosting the one or more processors;
identifying a subset of the plurality of targets of the phishing attempt by detecting that each target of the subset of the plurality of targets had an interaction with the phishing attempt;
identifying damage to the cloud-based platform caused by the interaction with the phishing attempt for each target of the subset of the plurality of targets;
determining one or more respective actions for each target of the subset of the plurality of targets, wherein at least one respective action of the one or more respective actions comprises restoring the damage caused by the interaction with the phishing attempt; and
initiating the one or more respective actions for each target of the subset of the plurality of targets to restore the damage.