A new security threat sees attackers able to penetrate enterprise computer systems simply by exploiting the weakest link in the security chain. The “Man-in-the-Browser” (MitB) attack method has attackers tunnelling in via employees’ browsers. As reported on IDG, MitB enables attackers to silently steal anything from login credentials to account numbers or financial information as […]
A new security threat sees attackers able to penetrate enterprise computer systems simply by exploiting the weakest link in the security chain. The “Man-in-the-Browser” (MitB) attack method has attackers tunnelling in via employees’ browsers. As reported on IDG, MitB enables attackers to silently steal anything from login credentials to account numbers or financial information as browser sessions often containing the logon details for email systems, VPNs and cloud services.
“This modern malware is designed to slip under the radar of traditional antivirus solutions and bypass strong authentication technologies like tokens or network access control (NAC) systems. It then captures all data processed by that browser and transmits it back to the criminals. All this can be achieved without setting off alarms.
“We recently decrypted an attack on the popular Citrix Access Gateway by the Zeus Trojan that illustrates how criminals are trying to stay one step ahead of security controls.”
Enterprise Networking Planet aims to educate and assist IT administrators in building strong network infrastructures for their enterprise companies. Enterprise Networking Planet contributors write about relevant and useful topics on the cutting edge of enterprise networking based on years of personal experience in the field.
Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved
Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.