
Here’s the bad news first: The Browser Security Gap is real, it’s growing, and it’s dangerous. Despite defense-in-depth strategies, phishing and ransomware attacks continue to skyrocket. Post-breach detect and respond methods, by definition, fail in the face of zero-day phishing attacks. That’s a big problem, because 80% of all phishing attacks are now zero-day, and are signature-defeating.
These are known as HEAT attacks. HEAT stands for Highly Evasive, Adaptive Threats. Unfortunately, browsers and web traffic they handle lend themselves to both evasive and adaptive attacks.
Now the good news: Browser Security is not an unsolved problem.
This article is the first in a series, covering various considerations you and your stakeholders need to weigh and consider in the process of closing the browser security gap. We’ll be talking about:
In this first installment, we’ll tackle architecture. Let’s take a closer look at the battlefield first.
Highly evasive and adaptive threats (HEAT) are a type of cybersecurity threat that often exhibits sophisticated techniques like dynamic behavior, fileless attacks and delayed execution to avoid detection and evade traditional security measures. These threats are designed to fly under the radar and can be particularly challenging for security professionals to identify and mitigate.
Consider the HTML Smuggling HEAT attack, enabled by the very HTTP methods that optimize file transfer: chunked file transfer (streaming), range requests (partial content) and automatic downloads. Threat actors embed malware in these files. Then, active code like Javascript can detect the download and invoke the malware. HTML Smuggling defeats network-based detection because due to their architecture, they generally cannot see the entire content of files transferred via HTML. Endpoint detection is defeated also if the malicious Javascript can activate the malware before an AV scan can see it. Mitre has a great, more technical discussion of this here.
Now consider the AI-driven escalation in phishing attacks: It used to be easy to pick out a phishing email, based on typos, grammar mistakes or distrust of a sender that the recipient doesn’t know. Those days are gone, because attackers are taking full use of GenAI’s capabilities to smooth grammar and writing. Even a poorly written phishing campaign used to take time to execute; with GenAI, attackers can iterate on attacks in minutes.
Finally, one of the newer exploits (that unfortunately is very much in the news right now) is voice-phishing, or vishing. There are countless, endlessly mutating vishing flows that threat actors use.
Here’s one trivial, simple example:
This specific attack is painful for the consumer alone, but the same attack principles can be and are used for much higher stakes and grimmer consequences. Salesforce.com is currently wrestling with an extortion demand for the return of 1 billion records, belonging to dozens of customers, stolen through a vishing attack.
Now, let’s consider how the architecture of your browser security solution can help or hinder your ability to mitigate these kinds of threats.
Putting it in the simplest terms, Browser Security occurs in one of two places:
Don’t be drawn in by the potential simplicity of an enterprise browser. Architecturally, they leave your organization exposed in a number of ways, notably:
In contrast, the centralization of a cloud-based browser security architecture allows it to mitigate the kinds of zero-day threats that replacement browsers and browser plugins are blind to:
In the cloud, yes. AI can be properly leveraged to identify and neutralize zero-day threats, which is still a pipe dream for replacement browser solutions.
First, take a look at this report to learn how the bad guys are using AI for nefarious purposes, such as AI-customized phishing/spear phishing/whaling attacks.
Menlo developed a range of machine-learning-based algorithms to detect fraudulent sites, including:
Our partnership with Google continues to bear fruit in this area: Menlo Heat Shield AI now leverages Google Vertex platform with Gemini models to greatly strengthen detection of fraudulent phishing sites.
As we’ve discussed here, the fundamental architecture choice between cloud-based and endpoint-based browser security has a massive impact on the ability of your organization to defend itself from the exponential spread of HEAT attacks. But as we laid out at the beginning of this article, that’s not the only dimension of this question. In the next installments, we’ll address the importance of maintaining browser choice and what that means for your ability to deliver Gen-AI capabilities to your business and your users.
Menlo Security
