Man-in-the-Browser (MITB) and web injection attacks are the most devastating threat on the Internet today, resulting in infinite number of compromised accounts. These attacks infect a webpage by taking advantage of security vulnerabilities in browsers and common web plugins, modifying web pages and transactions as they are happening in real time. Cybercriminals launching an MITB attack can intercept and change the content on a website by injecting new HTML code and perform unauthorized transactions while a customer has an online banking session open, but the client will only see the transaction performed as they intended on their screen.
These attacks are an example of the evolution of fraud, because they were developed to circumvent specific kinds of common malware protection strategies. Successful MITB and web injection attacks have completely disabled two-factor authentication by either infecting the out-of-band mobile device used as a second factor, or simply not springing it into action until a customer has already successfully authenticated and entered their account. In response, anti-fraud vendors have developed endpoint malware detection applications, but these will only work if end users download and install them. Financial institutions often struggle to get 30% of their customers to adopt these solutions, leaving a lot of vulnerable end users without protection. Making use of these solutions mandatory can also backfire, as customers prefer the lowest amount of friction possible when interacting with their bank and will often take their business elsewhere if they perceive that the security procedures become an inconvenience.
The best way to detect the latest malware is transparently, without the customer even realizing it. Clientless solutions that protect the entire end-user population have become available in recent years, but they have offered frustratingly little in the way of analytics or evidence that they are actually finding all of the malware targeting banking customers. When an attack is happening, financial institutions need tangible proof that shows what kind of information has been targeted, so that they can quickly take the appropriate action to stop any sensitive data from being breached and money from being stolen.
With that in mind, Easy Solutions is proud to announce the release of Detect Safe Browsing Clientless, which gives businesses the lowest-friction path to complete advanced malware protection for your entire end user population. Detect Safe Browsing Clientless transparently integrates malware detection into your critical transactional portals, allowing you to leverage the analytics it collects to respond to malware in real time. The solution takes an instant Malware Snapshot of any malware-injected page to enhance attack detection accuracy and assist with forensic investigations, giving you concrete, actionable evidence that lets you see exactly what has been compromised.
In addition, the Detect Safe Browsing Clientless portal generates thorough forensic reports that compile a huge volume of data related to all malware affecting your site, including information about what kind of malware was used, the session ID, and the IP address and browser version that was used when the malware was deployed.
While Detect Safe Browsing Clientless can be used as a standalone transparent malware detection solution, it is even more valuable as a data feed into Easy Solutions’ Total Fraud Protection strategy, helping to take down attacks at their source. Detect Safe Browsing Clientless can be combined with our phishing & pharming detection, malicious site takedown and real-time malware detection on end-user devices to provide a holistic strategy for any kind of malware attack.
The following video outlines how Detect Safe Browsing Clientless’ innovative, patent-pending Malware Snapshot feature can enhance the accuracy of your attack detection, check out the video below:
To learn more about Detect Safe Browsing Clientless, be sure to download our white paper “Making Clientless Malware Detection More Valuable as Part of a Comprehensive Attack Takedown Strategy” or drop us a line at email@example.com.