The question is rhetorical, because we know you’re not prepared. But neither general cybersecurity solutions are ready to provide with real defence. And that’s already a problem. Find out why!
WHAT IS THE BLOG ABOUT?
- THE BROWSER-BASED THREAT
- THE PROBLEM IS THE SCALE OF GROWTH AND THE LACK OF PROTECTION
- A SIMPLE BUT EFFECTIVE SOLUTION: RAISING AWARENESS & PROTECTING USER
Browser-based hacking is a difficult topic, because in 2023, out of 500,000 such attacks, 11,000 were so powerful (i.e. zero-hour type) that SWGs (i.e. secure internet access gateways) and endpoints (devices connected to a protected network) did not detect the trick and were therefore unable to block it. Attacks doubled by 2024, but user protection in the corporate sphere has not improved nearly as much.
WHY IS THIS A HUGE PROBLEM AMONG DOMESTIC BUSINESSES?
Because the classic “firewall-VPN-antivirus” combos (the most common cybersecurity solutions among SMEs) are useless against it.
Companies with a more advanced approach use some level of email protection, which means they use form-based, content-based and origin-based filtering, and perhaps even supplement correspondence and collaboration activities with more serious anti-phishing protection. Here, quite specific rules and sample databases are available on how to detect an attempt and prevent the attack.
In contrast, a browser-based attack only requires a convincing website. Malicious websites created by professionals, because they appear completely legitimate, are much harder to detect than a phishing email. Menlo Security’s statistical analysis, which is the cornerstone of this blog, proves that evasive attacks used the LURE (Legacy URL Reputation Evasion) method the most in 2023. It’s a simple technique: they use old, ‘rested’ domains that have never been reported in cybersecurity databases for any illegitimate activity or code, meaning they have a clean record. They slip through checkpoints like a knife through butter. This means that you can’t “blacklist” that domain, and it’s not certain that we will be able to detect the phishing threat based on the content with a sandbox (pre-access security scan in a remote environment).
WHAT IS WEB BROWSER-BASED ATTACK?
A web browser-based attack targets vulnerabilities in web browsers to compromise user data or execute malicious code. These attacks also exploit weaknesses in web applications accessed through web browsers, compromising user data, stealing sensitive information, or disrupting services.
Attackers can exploit the functionality of a website to target end users. Take clickjacking and malicious pop-ups for example. Here, attackers inject malicious code into the website. End-user systems then pass sensitive data to the attackers.
WHY DO BROWSER-BASED ATTACKS OCCUR?
Browser-based attacks occur due to a combination of technical flaws, unsafe practices, and malicious actions. Here are some of the main reasons why these attacks occur:
- Technical vulnerabilities: Flaws in browsers, extensions, and web applications provide entry points for attackers.
- Insecure web practices: Poor coding, lax security measures, and inadequate validation create exploitable vulnerabilities.
- User ignorance: Lack of knowledge about threats and safe browsing practices leaves users vulnerable to manipulation.
- Software neglect: Failure to update browsers, extensions, and systems leaves known vulnerabilities unpatched and makes them easy targets for attackers.
- Third-party risks: Dependence on external scripts and services introduces additional attack vectors.
- Financial motivation: Attackers engage in activities such as data theft, fraud, and ransomware for financial gain.
SO WHAT CAN PROTECT BUSINESSES FROM THE THREAT?
First of all, you need to strengthen endpoint and user protection. These can come in many forms, but the key is to prioritize cloud-based technologies with immediate responses and machine learning. Without intelligent solutions that access the latest databases and use sandbox technology, it is difficult to fight invisible attackers in real time.
And after that, you need to protect your entire infrastructure, it’s not enough to just switch to a secure browser
This consists of several steps and you need to know what shortcomings your business is facing. If adequate IT security support is not available, it is better to seek expert help. Why? Because hackers mostly exploit system vulnerabilities and users’ good faith. A cyber security assessment that reveals the vulnerabilities of your own infrastructure is worth having done by external experts.
A VULNERABILITY ASSESSMENT HELPS YOU IDENTIFY WHAT HACKERS ARE MOST LIKELY TO ATTACK.
Risk detection is one of the key components of cyber security, employing a variety of tools and methodologies to uncover potential threats and vulnerabilities. In browser security this includes activities such as malware scanning, phishing detection, and suspicious activity detection.
But here the question of personnel arises again. Part of your system is the user who logs into your ERP system, who sends an email through your email system, or who creates confidential files as a member of a development team.
They can be living firewalls or they can be serious vulnerabilities. They also need to be assessed and continuously trained against potential threats.
HOW TO RAISE SECURITY AWARENESS OF YOUR USERS?
There are many options available for Hungarian businesses, but there is currently only one uncompromising e-learning solution that teaches entirely in Hungarian (or dozens of other languages) and introduces the latest phishing techniques. In addition to the training, the solution is characterized by optional services such as active, AI-based phishing protection with immediate security intervention in case of detection of incorrect activity.
If you are interested in what solutions can protect your users from browser-based hacker attack, do not hesitate and contact us as soon as possible!


