14.2 C
New York
Sunday, September 8, 2024

The New Efficient Strategy to Stop Account Takeovers


Sep 04, 2024The Hacker InformationSaaS Safety / Browser Safety

The New Efficient Strategy to Stop Account Takeovers

Account takeover assaults have emerged as one of the persistent and damaging threats to cloud-based SaaS environments. But regardless of important investments in conventional safety measures, many organizations proceed to battle with stopping these assaults. A brand new report, “Why Account Takeover Assaults Nonetheless Succeed, and Why the Browser is Your Secret Weapon in Stopping Them” argues that the browser is the first battleground the place account takeover assaults unfold and, thus, the place they need to be neutralized. The report additionally offers efficient steering for mitigating the account takeover threat.

Under are among the key factors raised within the report:

The Function of the Browser in Account Takeovers

Based on the report, the SaaS kill chain takes benefit of the elemental elements which can be contained throughout the browser. For account takeover, these embody:

  • Executed Net Pages – Attackers can create phishing login pages or use MiTM over authentic internet pages to reap and entry credentials.
  • Browser Extensions – Malicious extensions can entry and exfiltrate delicate information.
  • Saved Credentials – Attackers goal to hijack the browser or exfiltrate its saved credentials to entry SaaS apps.

As soon as the consumer’s credentials are compromised, the attacker can login to the apps and function with impunity inside. It is a totally different and far shorter kill chain in comparison with the on-premises kill chain, which can also be why conventional safety measures fail to guard towards it.

Dissecting Account Takeover TTPs

The report then particulars the principle account takeover techniques, strategies and procedures (TTPs). It analyzes how they function, why conventional safety controls are ineffective in defending towards them, and the way a browser safety platform can mitigate the chance.

1. Phishing

The danger: Phishing assaults abuse the best way the browser executes the webpage. There are two predominant sorts of phishing assaults: a malicious login web page or intercepting a authentic one to seize session tokens.

The safety failure: SSE options and firewalls can not shield towards these assaults for the reason that malicious internet web page elements can’t be seen in community site visitors. In consequence, the phishing elements are capable of enter the perimeter and the consumer’s endpoint.

The answer: A browser safety platform offers visibility into the execution of internet pages and analyzes each executed part, detecting phishing actions like credential enter fields and MiTM redirection. Then, these elements are disabled throughout the web page.

2. Malicious Browser Extensions

The danger: Malicious extensions exploit the excessive privileges enabled by customers to regulate the browser’s exercise and information, taking on saved credentials.

The safety failure: EDRs and EPPs typically have implicit belief in browser processes, making extensions a safety blind spot.

The answer: A browser safety platform offers visibility and threat evaluation of all extensions and robotically disables malicious ones.

3. Authentication and Entry through a Login Web page

The danger: As soon as the attacker obtains credentials, they’ll entry the focused SaaS app.

The safety failure: IdPs battle to distinguish between malicious and bonafide customers and MFA options are sometimes not absolutely applied and adopted.

The answer: A browser safety platform displays all saved credentials within the browser, integrates with the IdP to behave as a further authentication issue, and enforces entry from the browser to forestall entry by compromised credentials.

What’s Subsequent for Safety Determination Makers

The browser has grow to be a vital assault floor for enterprises, and account takeover assaults exemplify its threat and the necessity to adapt the organizational safety method. LayerX has recognized {that a} browser safety answer is the important thing part in that shift, countering current assault strategies that can power attackers to reevaluate their steps. Learn the total report .

Discovered this text attention-grabbing? This text is a contributed piece from certainly one of our valued companions. Observe us on Twitter and LinkedIn to learn extra unique content material we publish.



Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles