• WSD

HTML Smugglers ahoy!

Hackers are always looking for ways to trick us with spam messages, although we still see the occasional message promising us millions from a deceased African general!

The latest campaign detected by the Microsoft security team uses a technique that utilises HTML5 and Javascript to deliver malicious files to your device.

The so-called HTML smuggling attack uses a link to a file inside an email, the link if scanned does not look malicious so may bypass traditional filters. Filters will usually automatically block executable files such as EXE or MSI or do a deep inspection on DOC files for malicious macros etc. Instead, the technique uses "href" and "download" along with javascript to assemble the malicious file within the browser session!

The tweet from MS Security as per screenshot can be accessed here:

Running phishing simulation tests regularly will enable users to spot threats and not get caught out. But you also need antimalware software that is capable of deep inspection of threats whether file-based on in memory.

Our fully-managed EDR solution includes SentinelOne for threat detection backed up by our 24*7 SOC team. We have you covered whether your users are in the office or remote working.

7 views0 comments