Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

The new visa rule in the US requires from applicants to set privacy in social media for the public

June 24, 2025

Hackers focus on over 70 Microsoft Exchange servers to steal credentials via Keyloggers

June 24, 2025

Researchers find a way to close Cryptominer companies using bad stocks and Xmrogue

June 24, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » A powerful new way to prevent account hijacking
Global Security

A powerful new way to prevent account hijacking

AdminBy AdminSeptember 4, 2024No Comments4 Mins Read
Prevent Account Takeovers
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


September 4, 2024Hacker newsSaaS Security / Browser Security

Preventing account hijacking

Account hijacking attacks have become one of the most persistent and damaging threats to SaaS cloud environments. However, despite significant investment in traditional security measures, many organizations continue to struggle to prevent these attacks. A new report, “Why account hijacking attacks still succeed and why your browser is your secret weapon for stopping them” states that the browser is the primary battleground where account hijacking attacks are deployed and therefore where they must be neutralized. The report also provides effective recommendations to reduce the risk of account hijacking.

Below are some of the key points raised in the report:

The role of the browser in account hijacking

According to the report, the SaaS kill chain uses core components that reside in the browser. For account capture, these include:

  • Completed web pages – Attackers can create phishing login pages or use MiTM on legitimate web pages to obtain credentials and access them.
  • Browser extensions – Malicious extensions can access and retrieve sensitive data.
  • Credentials saved – Attackers seek to hijack the browser or steal its stored credentials to access SaaS applications.

Once a user’s credentials are compromised, an attacker can log into programs and run them with impunity. This is a different and much shorter elimination chain compared to the local elimination chain, so traditional security measures cannot protect against it.

Analysis of the TTP account takeover

The report then details the main account takeover tactics, techniques and procedures (TTP). It analyzes how they work, why traditional security controls are ineffective at protecting against them, and how a browser security platform can reduce the risk.

1. Phishing

Risk: Phishing attacks abuse the way a browser launches a web page. There are two main types of phishing attacks: a malicious login page or intercepting a legitimate session to capture session tokens.

Protection failure: SSE solutions and firewalls cannot protect against these attacks because the malicious web page components are not visible in network traffic. As a result, phishing components can penetrate the user’s perimeter and endpoint.

Solution: The browser security platform provides visibility into web page execution and analyzes each executed component, detecting phishing activities such as credential input fields and MiTM redirects. These components are then disabled on the page.

2. Malicious browser extensions

Risk: Malicious extensions use elevated privileges that allow users to control browser activity and data by impersonating saved credentials.

Protection failure: EDR and EPP are often implicitly trusted by browser processes, making extensions a security blind spot.

Solution: The browser security platform provides visibility and risk analysis of all extensions and automatically disables malicious ones.

3. Authentication and access through the login page

Risk: Once the attacker obtains the credentials, he can gain access to the target SaaS application.

Protection failure: IdPs struggle to distinguish between malicious and legitimate users, and MFA solutions are often not fully implemented and adopted.

Solution: The browser security platform monitors all stored credentials in the browser, integrates with the IdP to act as an additional factor of authentication, and provides access from the browser to prevent access through compromised credentials.

What awaits security decision makers

The browser has become the most important attack surface for businesses, and account hijacking attacks show its risk and the need to adapt an organization’s security approach. LayerX has identified a browser security solution as a key component in this change, countering existing attack methods that will force attackers to rethink their actions. Read the full report .

Did you find this article interesting? This article is from one of our respected partners. Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

The new visa rule in the US requires from applicants to set privacy in social media for the public

June 24, 2025

Hackers focus on over 70 Microsoft Exchange servers to steal credentials via Keyloggers

June 24, 2025

Researchers find a way to close Cryptominer companies using bad stocks and Xmrogue

June 24, 2025

APT28 uses signal chat to expand malicious Beardhell ​​and Testament software in Ukraine

June 24, 2025

Talk CTEM we all need

June 24, 2025

Hackers operate incorrectly configured API Docker to hand over cryptocurrency via Tor Network

June 24, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

The new visa rule in the US requires from applicants to set privacy in social media for the public

June 24, 2025

Hackers focus on over 70 Microsoft Exchange servers to steal credentials via Keyloggers

June 24, 2025

Researchers find a way to close Cryptominer companies using bad stocks and Xmrogue

June 24, 2025

APT28 uses signal chat to expand malicious Beardhell ​​and Testament software in Ukraine

June 24, 2025

Talk CTEM we all need

June 24, 2025

Hackers operate incorrectly configured API Docker to hand over cryptocurrency via Tor Network

June 24, 2025

US House forbids WhatsApp on official security and protection devices

June 24, 2025

Salt Typhoon associated with China

June 24, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

The new visa rule in the US requires from applicants to set privacy in social media for the public

June 24, 2025

Hackers focus on over 70 Microsoft Exchange servers to steal credentials via Keyloggers

June 24, 2025

Researchers find a way to close Cryptominer companies using bad stocks and Xmrogue

June 24, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.