Menlo Security Cloud Security Platform is FedRAMP® Authorized
Traditional security approaches are flawed, costly, and overwhelming for security teams. Menlo Security is different. It’s the simplest, most definitive way to secure work—making online threats irrelevant to your users and your business.
Our platform invisibly protects users wherever they go online. So threats are history and the alert storm is over.
Traditional network security wasn’t built to address today’s complex enterprise environments. SASE fixes that problem.
Menlo Labs provides insights, expertise, context and tools to aid customers on their journey to connect, communicate and collaborate securely without compromise. The collective is made up of elite security researchers that put a spotlight on the threats you know and don’t know about.
Menlo Labs provides insights, expertise, context and tools to aid customers on their journey to connect, communicate and collaborate securely without compromise.
What is HTML smuggling?
HTML smuggling is a form of drive-by-download (the unintentional download of malicious code) in which an attacker “smuggles” encoded malicious scripts within specially crafted HTML attachments or webpages. These attackers take advantage of the versatility of HTML and combine it with social engineering to trick users into opening malicious payloads. Because these attacks impersonate trusted, well-known brands, including Dropbox, Adobe Acrobat, and Google Drive, users are less likely to question opening the HTML in their web browser.
This technique relies on the threat actor embedding file binaries in the HTML source of the webpage. As the page renders, the browser reconstructs the malicious file and transfers the newly assembled malware executable to the host OS and effectively bypasses network firewalls and security solutions, including sandboxes and anti-virus in legacy proxies. Moreover, file types assumed to be blocked by Secure Web Gateway policies can still make it to endpoints through HTML.
HTML smuggling can be stopped but to do so requires visibility and control inside the browser. Solutions like cloud-based Browser Security can help as they move the execution of these web requests away from the endpoint into a virtual container up in the cloud, effectively separating the end user from any malicious content. With no endpoint agent required and no discernable impact on user performance, isolation provides safe and secure browsing for the user, all while making experience friction free for the end user.
To talk to a Menlo Security expert, complete the form, or call us at (650) 695-0695.