Squarex reveals an unspecified Ransomber
Palo Alto, USA, March 28, 2025/Cybernewswire/-from Wannacry to MGM Resorts Hack, Ransomware remains one of the most harmful electronic threats for institutions.
A series is estimated that companies spend approximately one billion dollars on a ransom every year, but the largest cost often comes from reputable damage and operational disruption caused by the attack.
Ransomware attacks usually include deception of victims to download and install Ransomware, which copies, encrypts and/or delete important data on the device, to be restored only when paying the ransom.
Traditionally, the primary goal of Ransomware was the victim’s device. However, thanks to the spread of Cloud and Saas services, the device no longer carries the Kingdom’s keys.
Instead, the browser has become the primary way that employees do and interact with the Internet. In other words, the browser became the new end point.
Squarex founder,
Vivic Ramashandran Warnings, “With the last boom in the browser -based identity attacks like those we saw with the Chrome Store attack, we began to see evidence of the original” ransom components “of the browser that is used by opponents. “
Unlike traditional Ransomware, Ransomware does not require the browser-which downloads a file, which makes it not completely discovered by the security point safety solutions.
Instead, this attack targets the digital identity of the victim, while taking advantage of the widespread shift towards storing institutions -based institutions and the fact that the authentication based on the browser is the basic gateway to reach these resources.
In case studies
One of the possible scenario includes the user’s social engineering to grant a fake production tool to his e -mail, through which all the Saas applications that the victim are recorded can be identified. Then the password of these applications can be reset using artificial intelligence agents, registering users on their own and holding the institution’s data stored on these hostages.
Likewise, the attacker can also target file sharing services such as Google Drive, Dropbox and OneDrive, using the victim’s identity to copy and delete all files stored under her account. It is important, attackers can also reach all joint drives, including those shared by colleagues, clients and other third parties.
This greatly expands from the surface of the attack from the ransom of the browser-where the impact of most traditional ransom programs is limited to one device, all that requires it is the mistake of one of the employees of the attackers to fully reach resources at the level of the institution.
Due to download less and less than files, it is imperative for attackers to follow the place where valuable data is created and stored. Since browsers become the new end point, it is important for companies to reconsider their browser safety strategy-just as EDRS was necessary in defending files-based ransom materials, the original solution to the browser with a deep understanding of the application layer attacks by the customer, will become necessary in combating the next generation of Ransomwari attacks.
To learn more about this security research, users can visit
About Squarex
In addition to the browser ransom, Squarex also protects against various browser threats including identity attacks, malicious extensions, advanced spear, Genai DLP, and internal threats.
The browser Ransomwari detection is part of
To learn more about BDR Squarex, users can call
For press inquiries about this disclosure or the year of browser errors, users can email
communication
Head of public relations
Young Leo
Squarex
[email protected]This story was distributed as a version by CyberNewswire as part of the Hackernoon commercial blogging program. Learn more about the program