world tour:
Join us for a live look at how Menlo’s Secure Enterprise Browser puts you ahead of attackers
Icon Rounded Closed - BRIX Templates

Two minutes on… HEAT attacks evading malicious link analysis

Marcos Colón
|
September 13, 2022
linkedin logotwitter/x logofacebook logoSocial share icon via eMail

Today’s workforce demands anywhere, anytime access…and we’re not talking about an office building with an open-space model. According to a report by Accenture, 63% of high-growth companies leverage a hybrid work model. Simply put, remote and hybrid work is here to stay and these same workforces are the reason behind the skyrocketing use of web browsers.

Naturally, cybercriminals have caught on. They’ve decided to turn web browsers into key threat vectors. Even worse – they’re easily bypassing current security stacks through Highly Evasive Adaptive Threats (HEAT).

HEAT attacks are actively being used by well-known threat groups like Nobelium, the Russian state-sanctioned outfit behind the infamous SolarWinds supply chain attack. The Menlo Labs research team has been closely monitoring these attacks.

Through HEAT attacks, threat actors have been able to sidestep malicious URL-link analysis engines, which are traditionally implemented within email to analyze links before the user even sees them.

In less than two minutes in the video below, Menlo Security’s Neko Papez breaks down how HEAT attack can evade malicious link analysis.