Find the right approach to browser security
Traditional security approaches are flawed, costly, and overwhelming for security teams. Menlo Security is different. It’s the simplest, most definitive way to secure work—making online threats irrelevant to your users and your business.
Our platform invisibly protects users wherever they go online. So threats are history and the alert storm is over.
Traditional network security wasn’t built to address today’s complex enterprise environments. SASE fixes that problem.
Menlo Labs provides insights, expertise, context and tools to aid customers on their journey to connect, communicate and collaborate securely without compromise. The collective is made up of elite security researchers that put a spotlight on the threats you know and don’t know about.
Menlo Labs provides insights, expertise, context and tools to aid customers on their journey to connect, communicate and collaborate securely without compromise.
Menlo Security | Nov 19, 2020
Share this article
Imagine your life today without being able to freely browse the web. Browsers have put the entire world on our devices and in the palm of our hand—easily searchable in a powerful and seamless experience. This is where work happens, in browsers, email and shared files. Securing this this essential (yet vulnerable) entry point, ensures malicious actors wouldn’t be able to launch, much less carry out, an attack. Simply put, Chrome is critical to getting business done, as it is used by nearly two-thirds of devices worldwide.
Since the first browser debuted in the 1990s, they have been a tempting target for malicious actors. As browsers have evolved, so too have the ways hackers use to exploit their vulnerabilities. In the past, attackers could exploit a vulnerability in a minor feature and spread laterally throughout the software stack. Now, once hackers get in, they have to find ways to move—either by trying to access the core operating system (OS) of the device or by hijacking the browser process. This requires finding and taking advantage of bugs at different levels of the OS, the browser, and the browser functionality.
This expanding threat surface requires users to continually patch their browsers to prevent these vulnerabilities from being exploited. Given the fact that browsers are heavily targeted and include a lot of features, there are many patches that are regularly issued—in some cases creating patching fatigue. Over the past five weeks, Google has issued patches that CISA says are actively being exploited by zero-day attacks. Yet most organizations and users have not patched their browsers. More on this below.
The first three CVEs (in numbers 1 and 2 below) are targeted at impacting the rendering process of the browser and have been classified as zero days:
Check out what US-CERT has to say about these CVEs:
Menlo Labs discovered that there are 49 different versions of Chrome being used by our customers as of November 17. Nearly two-thirds (61 percent) are running the latest build (.86) while just over a quarter (28 percent) are running one version prior (.85). Out of the customers running .86, a staggering 83 percent are running versions of Chrome that are vulnerable (<Chrome/86.0.4240.198). If these customers were using legacy-based detection approaches, these active zero days would have been a risk for them.
The chart below shows the top five versions of Chrome 86 seen on the Menlo platform as of November 17. The data shows that even though a patched version of the browser may be available for more than six days, customers are still not running these versions.
Unfortunately, this is a continuous trend we have seen from the industry. We can scream “Patch regularly!” until we’re blue in the face, but in reality, people have other priorities and resources to consider (especially with the backdrop of COVID-19).
The Chrome team has made it easier for companies to eventually move to the latest and greatest build, but, as our Menlo Labs data shows, customers have various business reasons for not updating their browser instantly. I know from experience. I’ve been on many Zoom calls where someone has shared their screen, and you can see the “restart to update” orange/red icon. In fact, let’s just do a quick sanity check. Do you even remember the last time you shut down your browser and cleared cookies on all your devices?
Now scale that across all your devices, and it’s easy to see how difficult it can be for organizations to come up with ways to ensure that their users’ browsers are updated and patched to enterprise standards.
Yes, one of Menlo’s biggest values to our customers is to protect them from browser-based zero days. We do this simply, without trying to detect the website impact, looking at indicators of compromise (IOC), or adding more ML-based engines – approaches that legacy detect and response web gateways take. The Menlo Isolation-powered Cloud Security Platform moves the rendering process away from the endpoint, cutting off any access before the attacker even attempts to exploit the vulnerability.
I know it’s hard to believe, but Menlo’s browser isolation approach automatically protects the enterprise against these attacks—even when a browser is not updated or patched. And, because it is a cloud-delivered security service, Menlo protects all devices—including mobile—regardless of the underlying hardware, OS, browser, or network connection. Our customers may be running unpatched or outdated versions of Chrome, but they are protected, nevertheless, thanks to Internet isolation.
Reach out to us to learn more about the CVEs and how Menlo’s Isolation-powered Cloud Security Platform could be an approach that helps with your patching nightmare.
Special call-out to my Menlo colleagues Vinay (insightful Director of Security Research) and Lionel (Chief Security Architect) for their insight and data.
Posted by Menlo Security on Nov 19, 2020
Tagged with Vulnerabilities, Web Security
Threat Trends & Research
To talk to a Menlo Security expert, please complete the form.