Skip to content

Top Stories

Top Stories

Primary Menu
  • Breaking News
  • UNIT CONVERTER
  • QR Code Generator
  • SEO META TAG GENERATOR
  • Background Remover Tool
  • Image Enhancer Tool
  • Image Converter Tool
  • Image Compressor Tool
  • Keyword Research Tool
  • Paint Tool
  • About Us
  • Contact Us
  • Privacy Policy
HOME PAGE
  • Home
  • Uncategorized
  • 4 evasive web browser attacks targeting federal agencies – Blog | – Blog
  • Uncategorized

4 evasive web browser attacks targeting federal agencies – Blog | – Blog

VedVision HeadLines July 5, 2025
4 evasive web browser attacks targeting federal agencies – Blog | – Blog


The way federal employees work has changed dramatically over the past three years. Digital transformation, cloud migration and hybrid work models have spread out infrastructure and endpoints away from the central data center out to the edge of the network. As a result, data and applications are now accessed via the browser more than ever before. Malicious actors are taking notice of these expanding threat surfaces and are taking advantage of vulnerabilities in the browser to target federal agencies.

Here are four ways adversaries are using vulnerabilities in the browser to attack federal agencies:

1. Gaps in URL filtering

Terrorists figured out long ago that the best way to smuggle explosives is to deconstruct bombs and ferry individual parts separately across the border before reconstructing the devices once they get past security. Cybercriminals have recently developed similar techniques to bypass traditional anti-virus and sandbox solutions that scan web content for known malware signatures and suspicious behavior. These include dynamic file downloads (a tactic known as HTML Smuggling), Javascript trickery, password-protected archive files and oversized files–using gaps in inspection policies to smuggle malicious content past the Secure Web Gateway (SWG) before reconstructing and activating them in the browser after the initial breach has been made.

2. Expanding threat vectors

While phishing has traditionally been delivered via email, enterprising threat actors are now using other channels that aren’t covered by email security tools to deliver malicious content. This includes browser-based content such as websites, Software as a Service (SaaS) platforms, social media and professional networks, collaboration tools and SMS. Threat surfaces will continue to expand as brands find new ways to interact with customers and partners, and traditional security solutions are not keeping up.

3. Static categorization engines

The fact that a website is categorized as safe one day doesn’t mean that it will be safe tomorrow. Termed Legacy URL Reputation Evasion (LURE), this tactic allows threat actors to compromise websites already-trusted by categorization engines and turn them into festering dens of malicious activity. This even includes websites owned or hosted by well-known brands and media outlets. Playing the long game, attackers have been known to create new sites and let them build up a good reputation across categorization engines before using them to deliver malicious content.

4. Vulnerabilities in JavaScript

The web continues to run on JavaScript, despite the language’s security vulnerabilities. Malicious content such as browser exploits and phishing kit code can be hidden or obfuscated to make the JavaScript unreadable, allowing the code to bypass detection by the SWG. The compromised JavaScript is then revealed in the browser at run time and is allowed to execute its active content on the endpoint. Attackers also use website manipulations to hide impersonation logos behind morphed images to avoid visual detection in inspection engines.

Understand the Threats You Face

Hybrid work is here to stay, making the browser the number one business tool in the federal government. IT teams need to rethink traditional security strategies in light of these changes–focusing on detecting and stopping browser-based attacks before they infiltrate the network. The first step is to understand if your agency is currently susceptible to these highly evasive threats, which the Menlo Labs research team have categorized as Highly Evasive Adaptive Threats.



Source link

Continue Reading

Previous: Bitcoin Sees Profit‑Taking As Lawmakers Gear Up For ‘Crypto Week’
Next: Women now lead 1 in 3 Gujarat dairy cooperatives as participation soars

Related News

Apple races to box office glory with Brad Pitt’s F1 blockbuster
  • Uncategorized

Apple races to box office glory with Brad Pitt’s F1 blockbuster

VedVision HeadLines July 5, 2025
How to Crash a Party in Style: The Gatsby Way, Then and Now
  • Uncategorized

How to Crash a Party in Style: The Gatsby Way, Then and Now

VedVision HeadLines July 5, 2025
Kyutai Releases 2B Parameter Streaming Text-to-Speech TTS with 220ms Latency and 2.5M Hours of Training
  • Uncategorized

Kyutai Releases 2B Parameter Streaming Text-to-Speech TTS with 220ms Latency and 2.5M Hours of Training

VedVision HeadLines July 5, 2025

Recent Posts

  • OKX CEO Apologizes for Account Freezes Caused by ‘False Positives’
  • Apple races to box office glory with Brad Pitt’s F1 blockbuster
  • How to Crash a Party in Style: The Gatsby Way, Then and Now
  • Kyutai Releases 2B Parameter Streaming Text-to-Speech TTS with 220ms Latency and 2.5M Hours of Training
  • Rajinikanth’s Coolie Sets Overseas Record Ahead of Release – News Today

Recent Comments

No comments to show.

Archives

  • July 2025
  • June 2025
  • May 2025
  • April 2025

Categories

  • Current Affairs
  • Shopping
  • Uncategorized

You may have missed

OKX CEO Apologizes for Account Freezes Caused by ‘False Positives’
  • Current Affairs

OKX CEO Apologizes for Account Freezes Caused by ‘False Positives’

VedVision HeadLines July 5, 2025
Apple races to box office glory with Brad Pitt’s F1 blockbuster
  • Uncategorized

Apple races to box office glory with Brad Pitt’s F1 blockbuster

VedVision HeadLines July 5, 2025
How to Crash a Party in Style: The Gatsby Way, Then and Now
  • Uncategorized

How to Crash a Party in Style: The Gatsby Way, Then and Now

VedVision HeadLines July 5, 2025
Kyutai Releases 2B Parameter Streaming Text-to-Speech TTS with 220ms Latency and 2.5M Hours of Training
  • Uncategorized

Kyutai Releases 2B Parameter Streaming Text-to-Speech TTS with 220ms Latency and 2.5M Hours of Training

VedVision HeadLines July 5, 2025
Copyright © All rights reserved. | MoreNews by AF themes.