[{"data":1,"prerenderedAt":5006},["ShallowReactive",2],{"application-flags":3,"navbar":7,"always-visible-banner":95,"navbar-about-highlight":155,"navbar-resource-highlight":211,"use-case-page":256,"blog/consentfix-debrief":1276},[4],{"name":5,"enabled":6},"maintenanceMode",false,[8,59,76],{"createdDate":9,"id":10,"name":11,"modelId":12,"published":13,"stageModifiedSincePublish":6,"query":14,"data":15,"variations":50,"lastUpdated":51,"firstPublished":52,"testRatio":33,"createdBy":53,"lastUpdatedBy":53,"folders":54,"meta":55,"rev":58},1742213002749,"efff2a27faf4408e9f908eba4b5542fe","inductive-automation","1c6207a5f24948ab82d4a0b17f251193","published",[],{"testimonial":16,"description":43,"type":19,"link":44,"title":47,"testimonialLink":48,"image":49},{"@type":17,"id":18,"model":19,"value":20},"@builder.io/core:Reference","f028f2b685bb47cd8bf9e82a26dd5a79","testimonial",{"query":21,"folders":22,"createdDate":23,"id":18,"name":24,"modelId":25,"published":13,"data":26,"variations":30,"lastUpdated":31,"firstPublished":32,"testRatio":33,"createdBy":34,"lastUpdatedBy":34,"meta":35,"rev":42},[],[],1735823466309,"We found Push to be more accurate when compared to competitors and the browser agent offered features that others couldn’t match.","42035571a56940ac98bff4544aa79aa5",{"author":27,"jobTitle":28,"quote":24,"image":29},"Jason Waits","\u003Cp>CISO at Inductive Automation\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Ff04c0c0689ce4a89ac0f0708d78c0a07",{},1735910703862,1735823501152,1,"ST0tXQM8slWpFrmioqKHmENB2qe2",{"kind":36,"lastPreviewUrl":37,"breakpoints":38,"hasAutosaves":41},"data","",{"small":39,"medium":40},640,768,true,"3v32gocrrqz","Join the industry's top security minds as they break down the browser attack landscape.",{"url":45,"text":46},"https://pushsecurity.com/webinar/state-of-browser-security","Save Your Spot","State of Browser Attacks Series","/customer-stories/inductive-automation","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fe94fca10aa7b46ac8052b7ea22de54cd",{},1776257019270,1742221533648,"CydmZnOWU1XuAaLhEDCoYNM4Z8W2",[],{"breakpoints":56,"kind":36,"lastPreviewUrl":37,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},320,"motto9r9yg",{"createdDate":60,"id":61,"name":62,"modelId":12,"published":13,"query":63,"data":64,"variations":69,"lastUpdated":70,"firstPublished":71,"testRatio":33,"createdBy":53,"lastUpdatedBy":72,"folders":73,"meta":74,"rev":58},1742208588866,"1c7a4e423bf54ac1a328bb4063459ef2","Banner",[],{"type":65,"url":66,"text":67,"link":68},"web-banner","https://pushsecurity.com/resources/browser-attacks-report","Get our latest report analyzing browser attack techniques in 2026",{},{},1774258294825,1742208637545,"jKjF9r5jcvXU8tzZEfFQm31Iyvr2",[],{"kind":36,"lastPreviewUrl":37,"breakpoints":75,"hasAutosaves":41},{"xsmall":57,"small":39,"medium":40},{"createdDate":77,"id":78,"name":79,"modelId":12,"published":13,"stageModifiedSincePublish":6,"query":80,"data":81,"variations":89,"lastUpdated":90,"firstPublished":91,"testRatio":33,"createdBy":53,"lastUpdatedBy":53,"folders":92,"meta":93,"rev":58},1742208469288,"6763051b201f44a0838c6400c580ca67","Resource highlight",[],{"image":82,"type":83,"description":84,"link":85,"title":88},"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F7b4a5ebf81d64e8c9d7fc35f6c96c4a9","resource","Learn about the latest techniques being used in the wild.",{"url":86,"text":87},"/resources/browser-attacks-report","Download now","Report: 2026 Browser Attack Techniques",{},1776255866789,1742208570400,[],{"kind":36,"lastPreviewUrl":37,"breakpoints":94,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},{"createdDate":96,"id":97,"name":98,"modelId":99,"published":13,"query":100,"data":101,"variations":145,"lastUpdated":146,"firstPublished":147,"testRatio":33,"createdBy":34,"lastUpdatedBy":148,"folders":149,"meta":150,"rev":154},1774965361051,"fd266d0172cc47429be7ad10f48c99ad","always visible banner","0678d178ec8b41efb8a23c09dba7874d",[],{"ctaText":102,"text":103,"url":37,"blocks":104,"state":141},"ewrererw","testrfesssssssssss",[105,129],{"@type":106,"@version":107,"id":108,"component":109,"responsiveStyles":119},"@builder.io/sdk:Element",2,"builder-ca12c06a52de41d7b8743da53118cd38",{"name":110,"tag":110,"options":111,"isRSC":118},"TopBannerContent",{"text":112,"ctaText":46,"url":45,"mainText":113,"cta":116},"New Webinar Series: Join John Hammond, Troy Hunt, and Matt Johansen for the State of Browser Attacks",{"content":114,"fontSize":115},"\u003Cp>New Webinar Series: Join John Hammond, Troy Hunt, and Matt Johansen for the State of Browser Attacks\u003C/p>","text-base",{"content":117,"fontSize":115,"url":45},"\u003Cp>\u003Cstrong style=\"font-weight:700;\">Save Your Spot\u003C/strong>\u003C/p>\n",null,{"large":120},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":126,"marginBottom":126,"fontSize":127,"fontWeight":128},"flex","column","relative","0","border-box",".56rem","1.125rem","700",{"id":130,"@type":106,"tagName":131,"properties":132,"responsiveStyles":136},"builder-pixel-08zrjigffq5t","img",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},"https://cdn.builder.io/api/v1/pixel?apiKey=f3a1111ff5be48cdbb123cd9f5795a05","true","presentation",{"large":137},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},"block","hidden","none",{"deviceSize":142,"location":143},"large",{"path":37,"query":144},{},{},1775137295127,1774968080803,"ax7YYfD0OCeqT1Vxxv1G4FUbqVr1",[],{"breakpoints":151,"hasLinks":6,"kind":152,"lastPreviewUrl":153,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},"component","https://pushsecurity.com/?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CeditProjects%2CmodifyMcpServers%2CmodifyWorkflowIntegrations%2CmodifyProjectSettings%2CconnectCodeRepository%2CcreateProjects%2CindexDesignSystems%2CsendPullRequests%2CmergePullRequests&builder.user.role.name=Developer&builder.user.role.id=developer&builder.cachebust=true&builder.preview=always-visible-banner&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.always-visible-banner=fd266d0172cc47429be7ad10f48c99ad&builder.overrides.fd266d0172cc47429be7ad10f48c99ad=fd266d0172cc47429be7ad10f48c99ad&builder.options.locale=Default","2lvuonnywj",[156,180],{"createdDate":157,"id":158,"name":159,"modelId":160,"published":13,"stageModifiedSincePublish":6,"query":161,"data":162,"variations":173,"lastUpdated":174,"firstPublished":175,"testRatio":33,"createdBy":53,"lastUpdatedBy":53,"folders":176,"meta":177,"rev":179},1776247359804,"9136a8f18b3b4a6ba29b8653a99372b1","testimonial-inductive-automation","20d9eaa352304613b3d1a794b400703d",[],{"link":163,"type":19,"testimonialLink":48,"testimonial":164},{},{"@type":17,"id":18,"model":19,"value":165},{"query":166,"folders":167,"createdDate":23,"id":18,"name":24,"modelId":25,"published":13,"data":168,"variations":169,"lastUpdated":31,"firstPublished":32,"testRatio":33,"createdBy":34,"lastUpdatedBy":34,"meta":170,"rev":172},[],[],{"author":27,"jobTitle":28,"quote":24,"image":29},{},{"kind":36,"lastPreviewUrl":37,"breakpoints":171,"hasAutosaves":41},{"small":39,"medium":40},"7t755zfvte3",{},1776247404986,1776247404973,[],{"breakpoints":178,"kind":36,"lastPreviewUrl":37,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},"4moh0qpywtr",{"createdDate":181,"id":182,"name":88,"modelId":160,"published":13,"meta":183,"stageModifiedSincePublish":6,"query":185,"data":186,"variations":207,"lastUpdated":208,"firstPublished":209,"testRatio":33,"createdBy":53,"lastUpdatedBy":53,"folders":210,"rev":179},1776255761419,"05a9322735fc427db12e2740e4302300",{"breakpoints":184,"kind":36,"lastPreviewUrl":37,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},[],{"testimonial":187,"link":206,"type":83,"title":88,"description":84,"image":82},{"@type":17,"id":188,"model":19,"value":189},"192acbb1f9ca4cac918c0ec435a8bae3",{"query":190,"folders":191,"createdDate":192,"id":188,"name":193,"modelId":25,"published":13,"data":194,"variations":200,"lastUpdated":201,"firstPublished":202,"testRatio":33,"createdBy":34,"lastUpdatedBy":53,"meta":203,"rev":205},[],[],1728981467463,"Push does for identity what CrowdStrike did for the endpoint",{"video":195,"jobTitle":196,"author":197,"qoute":37,"quote":198,"image":199},"https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F8b30e8ca50064058bbaef0f3c6164575%2Fcompressed?apiKey=f3a1111ff5be48cdbb123cd9f5795a05&token=8b30e8ca50064058bbaef0f3c6164575&alt=media&optimized=true","\u003Cp>Deputy CISO at Microsoft\u003C/p>\u003Cp>Former LinkedIn, Slack, Palantir\u003C/p>","Geoff Belknap","Push does for identity what CrowdStrike did for the endpoint.","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F748f0ad0a5064a00a13f4721fcc8dea1",{},1742902158597,1728981782923,{"kind":36,"lastPreviewUrl":37,"breakpoints":204,"hasAutosaves":41},{"small":39,"medium":40},"6s8ic0w0ao6",{"text":87,"url":86},{},1776255810913,1776255810900,[],[212,235],{"createdDate":213,"id":214,"name":88,"modelId":215,"published":13,"meta":216,"stageModifiedSincePublish":6,"query":218,"data":219,"variations":230,"lastUpdated":231,"firstPublished":232,"testRatio":33,"createdBy":53,"lastUpdatedBy":53,"folders":233,"rev":234},1776256900280,"1f429607996e4e5fae8fe3f9b9610e55","4829faa81e7c4ee8bd2d000e160e8d3c",{"breakpoints":217,"kind":36,"lastPreviewUrl":37,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},[],{"testimonial":220,"link":229,"type":83,"title":88,"description":84,"image":82},{"@type":17,"id":188,"model":19,"value":221},{"query":222,"folders":223,"createdDate":192,"id":188,"name":193,"modelId":25,"published":13,"data":224,"variations":225,"lastUpdated":201,"firstPublished":202,"testRatio":33,"createdBy":34,"lastUpdatedBy":53,"meta":226,"rev":228},[],[],{"video":195,"jobTitle":196,"author":197,"qoute":37,"quote":198,"image":199},{},{"kind":36,"lastPreviewUrl":37,"breakpoints":227,"hasAutosaves":41},{"small":39,"medium":40},"r77qqueuo3j",{"text":87,"url":86},{},1776256937553,1776256937540,[],"q0jkez80wkg",{"createdDate":236,"id":237,"name":11,"modelId":215,"published":13,"stageModifiedSincePublish":6,"query":238,"data":239,"variations":250,"lastUpdated":251,"firstPublished":252,"testRatio":33,"createdBy":53,"lastUpdatedBy":53,"folders":253,"meta":254,"rev":234},1776256949234,"ce043785b71b4ece98eac811ecf4ba10",[],{"link":240,"type":19,"testimonial":241,"testimonialLink":48},{},{"@type":17,"id":18,"model":19,"value":242},{"query":243,"folders":244,"createdDate":23,"id":18,"name":24,"modelId":25,"published":13,"data":245,"variations":246,"lastUpdated":31,"firstPublished":32,"testRatio":33,"createdBy":34,"lastUpdatedBy":34,"meta":247,"rev":249},[],[],{"author":27,"jobTitle":28,"quote":24,"image":29},{},{"kind":36,"lastPreviewUrl":37,"breakpoints":248,"hasAutosaves":41},{"small":39,"medium":40},"mnaneamy308",{},1776256974140,1776256974130,[],{"breakpoints":255,"kind":36,"lastPreviewUrl":37,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},[257,441,560,679,797,917,1037,1157],{"createdDate":258,"id":259,"name":260,"modelId":261,"published":13,"stageModifiedSincePublish":6,"query":262,"data":268,"variations":429,"lastUpdated":430,"firstPublished":431,"testRatio":33,"screenshot":432,"createdBy":34,"lastUpdatedBy":433,"folders":434,"meta":435,"rev":440},1744829487099,"387451215c314dd5bd654668cdc1a197","Zero-day phishing","cca4143377554c5a9163cc203a8ed2ba",[263],{"@type":264,"property":265,"operator":266,"value":267},"@builder.io/core:Query","urlPath","is","/uc/zero-day-phishing-protection",{"inputs":269,"customFonts":270,"seoTitle":318,"title":318,"tsCode":37,"seoDescription":319,"fontAwesomeIcon":320,"jsCode":37,"blocks":321,"url":267,"state":426},[],[271],{"family":272,"kind":273,"version":274,"lastModified":275,"files":276,"category":295,"menu":296,"subsets":297,"variants":300},"DM Sans","webfonts#webfont","v14","2023-07-13",{"100":277,"200":278,"300":279,"500":280,"600":281,"700":282,"800":283,"900":284,"800italic":285,"900italic":286,"700italic":287,"100italic":288,"italic":289,"regular":290,"200italic":291,"500italic":292,"300italic":293,"600italic":294},"https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAop1hTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAIpxhTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwA_JxhTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAkJxhTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAfJthTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwARZthTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAIpthTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAC5thTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat8JCm3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat8gCm3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat9uCm3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat-JDG3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat-JDW3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAopxhTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat8JDW3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat-7DW3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat_XDW3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat9XCm3zRmYJpso5.ttf","sans-serif","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAopxRT23z.ttf",[298,299],"latin","latin-ext",[301,302,303,304,305,306,128,307,308,309,310,311,312,313,314,315,316,317],"100","200","300","regular","500","600","800","900","100italic","200italic","300italic","italic","500italic","600italic","700italic","800italic","900italic","Zero-day phishing protection","Detect phishing TTPs directly in the browser and stop credential theft.","faFishingRod",[322,421],{"@type":106,"@version":107,"tagName":323,"id":324,"children":325},"div","builder-76c6b8d1499346c7bc1fd56ae4e93638",[326,343,351,358,370,385,396,407,413],{"@type":106,"@version":107,"layerName":327,"id":328,"component":329,"responsiveStyles":340},"UseCaseHero","builder-5228fe062bef4a40a91e43f1112832fa",{"name":327,"options":330,"isRSC":118},{"title":318,"description":331,"points":332,"video":339},"\u003Cp>Push detects phishing as it happens. Autonomous agents hunt for new phishing techniques, identify kit signatures, and deploy detections within minutes of a new attack being analyzed. From cloned login pages to AiTM credential harvesting, Push sees what traditional filters miss and stops threats before they escalate.\u003C/p>",[333,335,337],{"item":334},"Detect phishing that bypasses traditional filters, including AiTM, SSO password theft, and fake login pages",{"item":336},"Stop never-before-seen attacks with AI-native behavioral and on-page analysis inside the browser",{"item":338},"Investigate faster with unified browser, user, and page context","https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F40433ceeb4f94b43a82e039a0f4fd411%2Fcompressed?apiKey=f3a1111ff5be48cdbb123cd9f5795a05&token=40433ceeb4f94b43a82e039a0f4fd411&alt=media&optimized=true",{"large":341},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":342},"transparent",{"@type":106,"@version":107,"id":344,"component":345,"responsiveStyles":348},"builder-96634044407e491299e291ed64669e39",{"name":346,"options":347,"isRSC":118},"TrustedBy",{"AllPartners":41,"backgroundTransparent":6},{"large":349},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":350},"#000",{"@type":106,"@version":107,"id":352,"component":353,"responsiveStyles":356},"builder-2c3768f930534557bb8978e32b6a6a0f",{"name":354,"options":355,"isRSC":118},"Diagonal",{"darkMode":41},{"large":357},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"layerName":359,"id":360,"component":361,"responsiveStyles":368},"TextImageBlockVertical","builder-7c3c1c2840424db2ad2ccbfaf382dd64",{"name":359,"tag":359,"options":362,"isRSC":118},{"darkMode":6,"maxWidth":363,"maxTextWidth":364,"title":365,"description":366,"animatedTitle":37,"image":367,"reverse":6,"descriptionPaddingHorizontal":118},1200,800,"\u003Ch2>Why stop at the inbox?\u003C/h2>","\u003Cp>Phishing attacks have evolved. Whether attackers lure users with QR codes, instant messages, or OAuth consent screens, the outcome is the same: it plays out in the browser. Push gives you real-time detection for in-browser threats, stopping phishing and consent-based attacks before they lead to compromise\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F7fdcac241f0e4a049166d7076858adeb",{"large":369},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":371,"component":372,"responsiveStyles":380},"builder-41c978b3669749cf947e622b4e79e4d7",{"name":373,"options":374,"isRSC":118},"TextImageBlockHorizontal",{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":376,"title":377,"description":378,"reverse":41,"image":379},600,100,"\u003Cp>Detect phishing at the edge\u003C/p>","\u003Cp>Push uses industry-first telemetry to detect phishing based on behavior, not static indicators. Autonomous agents analyze how phishing pages behave and how users interact with them, uncovering fake logins, credential theft, and phishing kits the moment they load in the browser.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F9df3d180c97b4e61af142af2ccd68721",{"large":381},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"fontFamily":382,"paddingTop":383,"marginTop":384},"DM Sans, sans-serif","20px","0px",{"@type":106,"@version":107,"id":386,"component":387,"responsiveStyles":393},"builder-d2a7bc941feb43cdb898bc116b203cf9",{"name":373,"options":388,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":389,"title":390,"description":391,"reverse":6,"image":392},120,"\u003Ch2>Go beyond blocklists and IOCs\u003C/h2>","\u003Cp>Push goes beyond URLs and easy-to-change indicators. It reads the full phishing playbook like script behavior, session hijacks, DOM changes, user inputs, then connects the dots in real time. This gives your team a complete picture of how the phishing attempt worked, not just an alert.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fabfd58db169b433e96d3f1261797156e",{"large":394},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":395},"36px",{"@type":106,"@version":107,"layerName":373,"id":397,"component":398,"responsiveStyles":404},"builder-42c32198083f4880acb37c5cb76934da",{"name":373,"options":399,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":400,"title":401,"description":402,"reverse":41,"image":403},140,"\u003Ch2>Enhance your phishing response\u003C/h2>","\u003Cp>When phishing enters your environment, speed matters. Push gives you instant access to the telemetry that counts like session data, user behavior, and page activity, so you can investigate fast, trigger in-browser prompts, or forward alerts to your SIEM or SOAR for response. All in real time, right from the browser.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fbb195aec46904056b85e8688629e558e",{"large":405},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":406},"47px",{"@type":106,"@version":107,"id":408,"component":409,"responsiveStyles":411},"builder-9a95b9cbc4854421a92ef7b90f6c7adb",{"name":354,"options":410,"isRSC":118},{"darkMode":6},{"large":412},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":414,"component":415,"responsiveStyles":419},"builder-0afa17a9f25c4661a90f314d5578aa18",{"name":416,"tag":416,"options":417,"isRSC":118},"LatestResources",{"sectionHeading":37,"customClass":418},"bg-black",{"large":420},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":422,"@type":106,"tagName":131,"properties":423,"responsiveStyles":424},"builder-pixel-21yj6h3p4wh",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":425},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":427},{"path":37,"query":428},{},{},1776275046831,1745499158657,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fff60c30a8442489c8ed7e0af9599d14f","kYgMv6WsbvfmlOUYqR2SFwGzw6e2",[],{"lastPreviewUrl":436,"winningTest":118,"breakpoints":437,"kind":438,"hasLinks":6,"originalContentId":439,"hasAutosaves":6},"https://pushsecurity.com/uc/zero-day-phishing-protection?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CcreateProjects%2CsendPullRequests&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=387451215c314dd5bd654668cdc1a197&builder.overrides.387451215c314dd5bd654668cdc1a197=387451215c314dd5bd654668cdc1a197&builder.overrides.use-case-page:/uc/zero-day-phishing-protection=387451215c314dd5bd654668cdc1a197&builder.options.locale=Default",{"xsmall":57,"small":39,"medium":40},"page","2daa5670b8504fc7ba4700633e8bd921","atvz4dp24b7",{"createdDate":442,"id":443,"name":444,"modelId":261,"published":13,"stageModifiedSincePublish":6,"query":445,"data":448,"variations":552,"lastUpdated":553,"firstPublished":554,"testRatio":33,"screenshot":555,"createdBy":34,"lastUpdatedBy":433,"folders":556,"meta":557,"rev":440},1756833377777,"54f8256648f54d439303734b1e69221b","Browser extension security",[446],{"@type":264,"property":265,"operator":266,"value":447},"/uc/browser-extension-security",{"seoDescription":449,"jsCode":37,"fontAwesomeIcon":450,"tsCode":37,"title":444,"seoTitle":444,"customFonts":451,"inputs":456,"blocks":457,"url":447,"state":549},"Shine a light on risky browser extensions.","faPuzzlePiece",[452],{"kind":273,"family":272,"version":274,"files":453,"category":295,"lastModified":275,"subsets":454,"variants":455,"menu":296},{"100":277,"200":278,"300":279,"500":280,"600":281,"700":282,"800":283,"900":284,"100italic":288,"italic":289,"regular":290,"900italic":286,"800italic":285,"700italic":287,"200italic":291,"300italic":293,"500italic":292,"600italic":294},[298,299],[301,302,303,304,305,306,128,307,308,309,310,311,312,313,314,315,316,317],[],[458,544],{"@type":106,"@version":107,"tagName":323,"id":459,"meta":460,"children":461},"builder-71d0648c1d2f4ede8d0d0b5b28b7b94c",{"previousId":324},[462,478,485,492,501,511,521,531,538],{"@type":106,"@version":107,"id":463,"meta":464,"component":465,"responsiveStyles":476},"builder-ff325b4b8fad4edea53f38865947e854",{"previousId":328},{"name":327,"options":466,"isRSC":118},{"title":444,"description":467,"points":468,"video":475},"\u003Cp>Browser extensions introduce new code, new permissions, and new potential for risk. Many include AI features, and most go completely unnoticed. Push gives you full visibility into every extension used across your workforce, across major browsers, so you can uncover shadow IT, assess risky permissions, and block unsafe tools before they lead to compromise.\u003C/p>",[469,471,473],{"item":470},"Discover every browser extension in use",{"item":472},"Spot risky or unsanctioned behavior",{"item":474},"Make informed decisions on extension policy","https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fc538aad95d7f403aa3c3551af72f67c0?alt=media&token=1411fa6d-2eac-4e6c-94bf-ea117da12d67&apiKey=f3a1111ff5be48cdbb123cd9f5795a05",{"large":477},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":342},{"@type":106,"@version":107,"id":479,"meta":480,"component":481,"responsiveStyles":483},"builder-fb89d128c64e47cf9cbb11d90fc24523",{"previousId":344},{"name":346,"options":482,"isRSC":118},{"AllPartners":41,"backgroundTransparent":6},{"large":484},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":350},{"@type":106,"@version":107,"id":486,"meta":487,"component":488,"responsiveStyles":490},"builder-54388d35126c4d0096eeebaf8c4448cd",{"previousId":352},{"name":354,"options":489,"isRSC":118},{"darkMode":41},{"large":491},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"layerName":359,"id":493,"component":494,"responsiveStyles":499},"builder-3c8fa6785dd6466abf52a2470d66d85a",{"name":359,"tag":359,"options":495,"isRSC":118},{"darkMode":6,"maxWidth":363,"maxTextWidth":364,"title":496,"description":497,"image":498,"reverse":6},"\u003Ch2>Take control of browser extensions\u003C/h2>","\u003Cp>Attackers are increasingly using malicious browser extensions to gain access to data processed and stored in the browser. And the problem is, most security teams have no visibility into what extensions are being used. Push changes that. With browser-native telemetry, the Push extension continuously inventories browser extensions across your environment, flags the risky ones, and gives you intelligence to act.&nbsp;\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F0a004f16a6874f4c8fdf14344acc9fec",{"large":500},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":502,"meta":503,"component":504,"responsiveStyles":509},"builder-93738f98109a4009affb349afd7bb182",{"previousId":371},{"name":373,"options":505,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":376,"title":506,"description":507,"reverse":41,"image":508},"\u003Ch2>Discover every extension in use\u003C/h2>","\u003Cp>Push gives you structured, searchable data about every extension in your environment, so you’re not just seeing what’s there, but also understanding how it got there, what it can do, and who it affects. It’s the kind of granular insight that’s nearly impossible to get from traditional tools, and it lays the groundwork for better policy decisions and faster investigations.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F0e5727ca99474f14b1b7916bf6bbb782",{"large":510},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"fontFamily":382,"paddingTop":383,"marginTop":384},{"@type":106,"@version":107,"id":512,"meta":513,"component":514,"responsiveStyles":519},"builder-83393acb12ee4fdd840839185b51edb4",{"previousId":386},{"name":373,"options":515,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":389,"title":516,"description":517,"reverse":6,"image":518},"\u003Ch2>Spot risky or malicious extensions\u003C/h2>","\u003Cp>Push highlights extensions with dangerous permissions, broad access, or poor reputations. This includes AI extensions that request access far beyond what their stated purpose requires. You can quickly detect sideloaded, manually installed, or development-mode extensions that bypass normal controls. And because Push shows you who’s using them and where, you can respond precisely and effectively.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fa104d58c8da34fbb8901f738fb21453b",{"large":520},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":395},{"@type":106,"@version":107,"layerName":373,"id":522,"meta":523,"component":524,"responsiveStyles":529},"builder-da98e3de949646d89c53a0d1c2784664",{"previousId":397},{"name":373,"options":525,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":400,"title":526,"description":527,"reverse":41,"image":528},"\u003Ch2>Accelerate security reviews\u003C/h2>","\u003Cp>Most teams have extension policies, they just don’t have the data to enforce them. Push reveals how each extension entered your environment, whether it was installed manually, sideloaded, or deployed in dev mode. You’ll see which users are running what, and where, so you can surface violations, investigate quickly, and respond with confidence.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F229f355be6f243b180f410d237a75bb3",{"large":530},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":406},{"@type":106,"@version":107,"id":532,"meta":533,"component":534,"responsiveStyles":536},"builder-1a689287d1a1418997d57db578a71105",{"previousId":408},{"name":354,"options":535,"isRSC":118},{"darkMode":6},{"large":537},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":539,"component":540,"responsiveStyles":542},"builder-feb4e75029f84c10b6498ef1f8f79128",{"name":416,"tag":416,"options":541,"isRSC":118},{"sectionHeading":37,"customClass":418},{"large":543},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":545,"@type":106,"tagName":131,"properties":546,"responsiveStyles":547},"builder-pixel-0edn39avfcei",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":548},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":550},{"path":37,"query":551},{},{},1776275365038,1757000441666,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F8d496cf111644ee5afcc046b72d1ca5a",[],{"kind":438,"winningTest":118,"breakpoints":558,"lastPreviewUrl":559,"hasLinks":6,"originalContentId":259,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},"https://pushsecurity.com/uc/browser-extension-security?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CcreateProjects%2CsendPullRequests&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=54f8256648f54d439303734b1e69221b&builder.overrides.54f8256648f54d439303734b1e69221b=54f8256648f54d439303734b1e69221b&builder.overrides.use-case-page:/uc/browser-extension-security=54f8256648f54d439303734b1e69221b&builder.options.locale=Default",{"createdDate":561,"id":562,"name":563,"modelId":261,"published":13,"query":564,"data":567,"variations":670,"lastUpdated":671,"firstPublished":672,"testRatio":33,"screenshot":673,"createdBy":34,"lastUpdatedBy":674,"folders":675,"meta":676,"rev":440},1744923509705,"94bebb7bb99d48629ad157e80cf4d81d","Account takeover detection",[565],{"@type":264,"property":265,"operator":266,"value":566},"/uc/account-takeover-detection",{"title":563,"customFonts":568,"jsCode":37,"seoTitle":563,"seoDescription":573,"fontAwesomeIcon":574,"tsCode":37,"blocks":575,"url":566,"state":667},[569],{"kind":273,"category":295,"variants":570,"menu":296,"files":571,"family":272,"subsets":572,"version":274,"lastModified":275},[301,302,303,304,305,306,128,307,308,309,310,311,312,313,314,315,316,317],{"100":277,"200":278,"300":279,"500":280,"600":281,"700":282,"800":283,"900":284,"300italic":293,"500italic":292,"800italic":285,"700italic":287,"italic":289,"900italic":286,"600italic":294,"200italic":291,"regular":290,"100italic":288},[298,299],"Stop ATO with stolen credential and compromised token detection.","faUserSecret",[576,662],{"@type":106,"@version":107,"tagName":323,"id":577,"meta":578,"children":579},"builder-e7913a774cae44c5a23d6081c5c30a52",{"previousId":324},[580,596,603,610,619,629,639,649,656],{"@type":106,"@version":107,"id":581,"meta":582,"component":583,"responsiveStyles":594},"builder-f1f1ab1601bc4c0f8c2a8aafd173675d",{"previousId":328},{"name":327,"options":584,"isRSC":118},{"title":563,"description":585,"points":586,"video":593},"\u003Cp>Attackers don’t need to phish, they just need a password that works. Push monitors for signs of credential-based attacks in real time, directly in the browser, catching account takeover attempts before the damage spreads. From ghost logins to credential stuffing, Push cuts off the paths attackers use to quietly slip in the back door.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>",[587,589,591],{"item":588},"Identify credential-based ATO as it unfolds",{"item":590},"Surface hijacked sessions and token misuse",{"item":592},"Strengthen authentication where your IdP can’t","https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fb4dd9db24bc9495b8a686b1b4d492016%2Fcompressed?apiKey=f3a1111ff5be48cdbb123cd9f5795a05&token=b4dd9db24bc9495b8a686b1b4d492016&alt=media&optimized=true",{"large":595},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":342},{"@type":106,"@version":107,"id":597,"meta":598,"component":599,"responsiveStyles":601},"builder-0bc0d1c78ece4994993c3a6427a4d533",{"previousId":344},{"name":346,"options":600,"isRSC":118},{"AllPartners":41,"backgroundTransparent":6},{"large":602},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":350},{"@type":106,"@version":107,"id":604,"meta":605,"component":606,"responsiveStyles":608},"builder-e45de8f3768c4f16938dbf78e4e87524",{"previousId":352},{"name":354,"options":607,"isRSC":118},{"darkMode":41},{"large":609},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":611,"component":612,"responsiveStyles":617},"builder-c98e8bfd341146c1b67c02d5698ff093",{"name":359,"tag":359,"options":613,"isRSC":118},{"darkMode":6,"maxWidth":363,"maxTextWidth":364,"title":614,"description":615,"image":616,"reverse":6},"\u003Ch2>Assume less. See more.\u003C/h2>","\u003Cp>Most account takeovers don’t start with a breach, they start with a login. Whether it’s a reused password, a local account, or an outdated login flow, Push shows you how accounts are actually accessed day to day, not just how policies say they should be. That means no more blind spots around ghost logins, bypassed SSO, or stale access paths that quietly persist.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F18630ad2746d4eb7b7fcc0428b11a8f0",{"large":618},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":620,"meta":621,"component":622,"responsiveStyles":627},"builder-55c1fc38ddc04fd1a0d6a8e2fb819e00",{"previousId":371},{"name":373,"options":623,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":376,"title":624,"description":625,"reverse":41,"image":626},"\u003Ch2>Catch stolen credential use in real time\u003C/h2>","\u003Cp>Push monitors login activity directly in the browser to detect signs of credential-based attacks like leaked password use or suspicious login flows. By analyzing attacker TTPs instead of relying on known indicators, Push spots credential stuffing and account takeover attempts the moment they begin, not after they’ve succeeded.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F52b0123cac2c4dfdb1dc0af6adf9d603",{"large":628},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"fontFamily":382,"paddingTop":384,"marginTop":384},{"@type":106,"@version":107,"id":630,"meta":631,"component":632,"responsiveStyles":637},"builder-dfb31737b30948c6b95323655d571a50",{"previousId":386},{"name":373,"options":633,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":389,"title":634,"description":635,"reverse":6,"image":636},"\u003Ch2>Detect session hijacks and stealth access\u003C/h2>","\u003Cp>Attackers don’t always need a login screen, they often sidestep it entirely using stolen session tokens. Push detects when valid sessions are reused in unexpected ways, identifying hijacked sessions and stealth access attempts that traditional tools miss. Because we monitor directly in the browser, you see what’s happening inside active sessions in real time.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F94a6859a99e04d309ffe5841f3dbdf5c",{"large":638},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":395},{"@type":106,"@version":107,"layerName":373,"id":640,"meta":641,"component":642,"responsiveStyles":647},"builder-f7585b90eb974d03a7dc7eae5b58d227",{"previousId":397},{"name":373,"options":643,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":400,"title":644,"description":645,"reverse":41,"image":646},"\u003Ch2>Harden accounts before they’re compromised\u003C/h2>","\u003Cp>Push goes beyond alerts. It identifies apps that still allow local logins, even when SSO is configured, so you can remove weak access paths. Push also flags users without MFA, reused work credentials, or weak passwords, and prompts users in-browser to fix risky behaviors before they’re exploited.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F01c1b638f1b6497093a4f2b8ceddb5bb",{"large":648},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":406},{"@type":106,"@version":107,"id":650,"meta":651,"component":652,"responsiveStyles":654},"builder-ad81d1e3afec49a791214194eae09bdc",{"previousId":408},{"name":354,"options":653,"isRSC":118},{"darkMode":6},{"large":655},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":657,"component":658,"responsiveStyles":660},"builder-8dac1aa4b9d148628d92252bd8eff822",{"name":416,"tag":416,"options":659,"isRSC":118},{"sectionHeading":37,"customClass":418},{"large":661},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":663,"@type":106,"tagName":131,"properties":664,"responsiveStyles":665},"builder-pixel-s5u3wmvz7jq",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":666},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":668},{"path":37,"query":669},{},{},1770892814499,1745499162732,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F58b660fa94aa4b30b0faeb9b663ae41a","SfUPqW5tkibIPby49keNFMdHFTr1",[],{"lastPreviewUrl":677,"hasLinks":6,"originalContentId":259,"breakpoints":678,"winningTest":118,"kind":438,"hasAutosaves":41},"https://pushsecurity.com/uc/account-takeover-detection?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CeditProjects%2CmodifyMcpServers%2CmodifyWorkflowIntegrations%2CmodifyProjectSettings%2CconnectCodeRepository%2CcreateProjects%2CindexDesignSystems%2CsendPullRequests&builder.user.role.name=Developer&builder.user.role.id=developer&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=94bebb7bb99d48629ad157e80cf4d81d&builder.overrides.94bebb7bb99d48629ad157e80cf4d81d=94bebb7bb99d48629ad157e80cf4d81d&builder.overrides.use-case-page:/uc/account-takeover-detection=94bebb7bb99d48629ad157e80cf4d81d&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"xsmall":57,"small":39,"medium":40},{"createdDate":680,"id":681,"name":682,"modelId":261,"published":13,"query":683,"data":686,"variations":789,"lastUpdated":790,"firstPublished":791,"testRatio":33,"screenshot":792,"createdBy":34,"lastUpdatedBy":674,"folders":793,"meta":794,"rev":440},1745009370904,"23eb48fb56d3451cab77cb6ed140ee6d","Attack path hardening",[684],{"@type":264,"property":265,"operator":266,"value":685},"/uc/attack-path-hardening",{"tsCode":37,"seoDescription":687,"jsCode":37,"customFonts":688,"fontAwesomeIcon":693,"seoTitle":682,"title":682,"blocks":694,"url":685,"state":786},"Harden access paths with visibility,  detection, and guardrails.",[689],{"kind":273,"files":690,"version":274,"lastModified":275,"subsets":691,"menu":296,"category":295,"variants":692,"family":272},{"100":277,"200":278,"300":279,"500":280,"600":281,"700":282,"800":283,"900":284,"regular":290,"italic":289,"800italic":285,"500italic":292,"600italic":294,"200italic":291,"900italic":286,"700italic":287,"100italic":288,"300italic":293},[298,299],[301,302,303,304,305,306,128,307,308,309,310,311,312,313,314,315,316,317],"faRadar",[695,781],{"@type":106,"@version":107,"tagName":323,"id":696,"meta":697,"children":698},"builder-1d8553eddcaa44d7bba9e2f4ca13af2a",{"previousId":577},[699,715,722,729,738,748,758,768,775],{"@type":106,"@version":107,"id":700,"meta":701,"component":702,"responsiveStyles":713},"builder-84fe3d7c85a743cf8cef649aa974f1ef",{"previousId":581},{"name":327,"options":703,"isRSC":118},{"title":682,"description":704,"points":705,"video":712},"\u003Cp>Push continuously monitors your environment for exposed login paths, weak credentials, and missing protections like MFA. It detects the gaps attackers exploit and helps you close them before they’re used.\u003C/p>",[706,708,710],{"item":707},"Find weak spots like reused passwords, local logins, and missing MFA",{"item":709},"Monitor how users actually log in across apps, flows, and tools",{"item":711},"Enforce secure access with in-browser guardrails","https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fdbdcf52892034f1bbddded77f753a343%2Fcompressed?apiKey=f3a1111ff5be48cdbb123cd9f5795a05&token=dbdcf52892034f1bbddded77f753a343&alt=media&optimized=true",{"large":714},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":342},{"@type":106,"@version":107,"id":716,"meta":717,"component":718,"responsiveStyles":720},"builder-b3f66f5b08054cc78a06fecfc3ae2337",{"previousId":597},{"name":346,"options":719,"isRSC":118},{"AllPartners":41,"backgroundTransparent":6},{"large":721},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":350},{"@type":106,"@version":107,"id":723,"meta":724,"component":725,"responsiveStyles":727},"builder-4c73418b84be49ed85e6e13d2625c5a0",{"previousId":604},{"name":354,"options":726,"isRSC":118},{"darkMode":41},{"large":728},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":730,"component":731,"responsiveStyles":736},"builder-dec0246085e1485c803f7152b1922a81",{"name":359,"tag":359,"options":732,"isRSC":118},{"darkMode":6,"maxWidth":363,"maxTextWidth":364,"title":733,"description":734,"image":735,"reverse":6},"\u003Ch2>Find the gaps that lead to compromise\u003C/h2>","\u003Cp>Misconfigurations don’t show up in your config files, they show up in how users actually access apps. Push monitors real login behavior in the browser, surfacing risky patterns like local login access, duplicate accounts, or missing protections that leave doors wide open.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F309a59bba8d247a19476bb369397460e",{"large":737},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":739,"meta":740,"component":741,"responsiveStyles":746},"builder-ebf049a645604a249550996a88f8f3b6",{"previousId":620},{"name":373,"options":742,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":376,"title":743,"description":744,"reverse":41,"image":745},"\u003Ch2>See real login behavior\u003C/h2>","\u003Cp>Push watches authentication flows as they happen, giving you a live view of how users log in, which methods they choose, and where protections like MFA are missing. Plus, uncover every app and account in use, even shadow IT you didn’t know existed, without relying on stale config files or IdP assumptions. \u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fb51f6b0357cc451b87a7a5016d984e5e",{"large":747},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"fontFamily":382,"paddingTop":383,"marginTop":384},{"@type":106,"@version":107,"id":749,"meta":750,"component":751,"responsiveStyles":756},"builder-431d175c59004669b0b2776b07d71737",{"previousId":630},{"name":373,"options":752,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":389,"title":753,"description":754,"reverse":6,"image":755},"\u003Ch2>Find and fix posture drift\u003C/h2>","\u003Cp>Security posture isn’t static. Push continuously monitors for issues like missing MFA or legacy login methods. When something falls out of policy, you know immediately with custom notifications so you can act before it turns into risk.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F324e39127dfc41e592b1183dfb39892d",{"large":757},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":395},{"@type":106,"@version":107,"layerName":373,"id":759,"meta":760,"component":761,"responsiveStyles":766},"builder-3dffdcbe0a484e2ca4c03f019b6d40ee",{"previousId":640},{"name":373,"options":762,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":400,"title":763,"description":764,"reverse":41,"image":765},"\u003Ch2>Guide users with in-browser guardrails\u003C/h2>","\u003Cp>Push doesn’t just surface problems, it helps you fix them. When users sign in without MFA, reuse a password, or use insecure credentials, Push prompts them directly in the browser to secure their access. It’s faster, more effective, and actually gets results.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fee8b75d13e45488aba55434a8b49ebb0",{"large":767},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":406},{"@type":106,"@version":107,"id":769,"meta":770,"component":771,"responsiveStyles":773},"builder-976bc222cd7647ff905f1e01cfedc453",{"previousId":650},{"name":354,"options":772,"isRSC":118},{"darkMode":6},{"large":774},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":776,"component":777,"responsiveStyles":779},"builder-8c47ec2fd0f74382bb3e6c870555632c",{"name":416,"tag":416,"options":778,"isRSC":118},{"sectionHeading":37,"customClass":418},{"large":780},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":782,"@type":106,"tagName":131,"properties":783,"responsiveStyles":784},"builder-pixel-7akm7dayau8",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":785},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":787},{"path":37,"query":788},{},{},1770892844854,1745499166112,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F6ca12bf728a045f1a31d40c0beb3bfe5",[],{"kind":438,"lastPreviewUrl":795,"breakpoints":796,"hasLinks":6,"originalContentId":562,"winningTest":118,"hasAutosaves":6},"https://pushsecurity.com/uc/attack-path-hardening?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CeditProjects%2CmodifyMcpServers%2CmodifyWorkflowIntegrations%2CmodifyProjectSettings%2CconnectCodeRepository%2CcreateProjects%2CindexDesignSystems%2CsendPullRequests&builder.user.role.name=Developer&builder.user.role.id=developer&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=23eb48fb56d3451cab77cb6ed140ee6d&builder.overrides.23eb48fb56d3451cab77cb6ed140ee6d=23eb48fb56d3451cab77cb6ed140ee6d&builder.overrides.use-case-page:/uc/attack-path-hardening=23eb48fb56d3451cab77cb6ed140ee6d&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"xsmall":57,"small":39,"medium":40},{"createdDate":798,"id":799,"name":800,"modelId":261,"published":13,"query":801,"data":804,"variations":909,"lastUpdated":910,"firstPublished":911,"testRatio":33,"screenshot":912,"createdBy":34,"lastUpdatedBy":674,"folders":913,"meta":914,"rev":440},1761675020232,"ea4f309d2ffe46c5aa97ebf0fda4e2e3","ClickFix Protection",[802],{"@type":264,"property":265,"operator":266,"value":803},"/uc/clickfix-protection",{"seoDescription":805,"fontAwesomeIcon":806,"customFonts":807,"seoTitle":812,"jsCode":37,"tsCode":37,"title":812,"blocks":813,"url":803,"state":906},"Block attacks that trick users into running malicious code.","faLaptopCode",[808],{"files":809,"subsets":810,"menu":296,"version":274,"kind":273,"family":272,"lastModified":275,"variants":811,"category":295},{"100":277,"200":278,"300":279,"500":280,"600":281,"700":282,"800":283,"900":284,"200italic":291,"800italic":285,"700italic":287,"600italic":294,"100italic":288,"italic":289,"regular":290,"300italic":293,"500italic":292,"900italic":286},[298,299],[301,302,303,304,305,306,128,307,308,309,310,311,312,313,314,315,316,317],"ClickFix protection",[814,901],{"@type":106,"@version":107,"tagName":323,"id":815,"meta":816,"children":817},"builder-d7eefdde0f2a4b2b9de3dcb2978fd6cb",{"previousId":696},[818,834,841,848,858,868,878,888,895],{"@type":106,"@version":107,"id":819,"meta":820,"component":821,"responsiveStyles":832},"builder-56e2c54bcce040a4af8b92ae03706c12",{"previousId":700},{"name":327,"options":822,"isRSC":118},{"title":812,"description":823,"points":824,"image":831},"\u003Cp>ClickFix attacks are one of the fastest-growing threats, tricking users into copying malicious code from a webpage and running it locally. This technique bypasses traditional EDR, email gateways, and network filters, leading directly to ransomware and data theft. Push stops this attack at the source, in the browser, by detecting and blocking the malicious behavior before the user can ever paste the code.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>",[825,827,829],{"item":826},"Detect ClickFix, FileFix, and fake CAPTCHA in the browser",{"item":828},"Block malicious copy-and-paste actions before code is executed",{"item":830},"See full telemetry into which users were targeted and what they saw","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F7b74af62889847ebb3927364485b0546",{"large":833},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":342},{"@type":106,"@version":107,"id":835,"meta":836,"component":837,"responsiveStyles":839},"builder-05f9614d4e3e4dc88b3ee8658f54e10e",{"previousId":716},{"name":346,"options":838,"isRSC":118},{"AllPartners":41,"backgroundTransparent":6},{"large":840},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":350},{"@type":106,"@version":107,"id":842,"meta":843,"component":844,"responsiveStyles":846},"builder-c4fb5179366243c1b6c32d368675cf47",{"previousId":723},{"name":354,"options":845,"isRSC":118},{"darkMode":41},{"large":847},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":849,"meta":850,"component":851,"responsiveStyles":856},"builder-261af50705fd445d8cca4a6ba20d5391",{"previousId":730},{"name":359,"tag":359,"options":852,"isRSC":118},{"darkMode":6,"maxWidth":363,"maxTextWidth":364,"title":853,"description":854,"reverse":6,"image":855},"\u003Ch2>Stop ClickFix-style attacks before they become a breach\u003C/h2>","\u003Cp>Traditional security tools are blind to malicious copy and paste attacks because the attack exploits a gap between the browser and the endpoint. EDR only sees the payload after it runs, and network tools see only part of the picture.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F98b2f7e08dec4eafaf8e24937605b8cf",{"large":857},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":859,"meta":860,"component":861,"responsiveStyles":866},"builder-7d21b8aab8064c40b1e5dd23c4749309",{"previousId":739},{"name":373,"options":862,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":376,"title":863,"description":864,"reverse":41,"image":865},"\u003Ch2>Discover lures at the source\u003C/h2>","\u003Cp>Push inspects page behavior to identify ClickFix attacks as they happen. By inspecting the page, its structure, and how the user interacts with it, Push can detect and block these in-browser threats in real time. This deep, TTP-based inspection spots the trap even on novel pages that are built to bypass traditional web filters and blocklists.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F665bf47e01544c75bf9ddafd3917927b",{"large":867},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"fontFamily":382,"paddingTop":383,"marginTop":384},{"@type":106,"@version":107,"id":869,"meta":870,"component":871,"responsiveStyles":876},"builder-fb91943adf6149259ed9e1e6566c9afe",{"previousId":749},{"name":373,"options":872,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":389,"title":873,"description":874,"reverse":6,"image":875},"\u003Ch2>Block the malicious action\u003C/h2>","\u003Cp>When Push detects a malicious script, it intercepts the user's action and blocks the code from being copied to the clipboard. The user is protected, the attack is stopped, and no malicious code ever reaches the endpoint. Unlike broad DLP tools, this action is surgical, targeting only malicious behavior without disrupting normal work.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F5ee68f81f1ac416685cbfe91298cf827",{"large":877},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":395},{"@type":106,"@version":107,"layerName":373,"id":879,"meta":880,"component":881,"responsiveStyles":886},"builder-bfac95fada864e5a8259b955b5b5f98b",{"previousId":759},{"name":373,"options":882,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":400,"title":883,"description":884,"reverse":41,"image":885},"\u003Ch2>Accelerate ClickFix investigations\u003C/h2>","\u003Cp>When an attack happens, knowing what the user saw or did is critical. Push provides rich browser session data for rapid investigation and containment. Security teams get detailed telemetry on which users were targeted, what lure they were served, and when the block occurred. This enables defenders to reconstruct what happened and respond quickly, even when other tools miss the activity entirely.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F6cdf2a8aeddc4e9a9023cbf974e40239",{"large":887},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":406},{"@type":106,"@version":107,"id":889,"meta":890,"component":891,"responsiveStyles":893},"builder-136892e831684a6987f87d3be67c33d1",{"previousId":769},{"name":354,"options":892,"isRSC":118},{"darkMode":6},{"large":894},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":896,"component":897,"responsiveStyles":899},"builder-dec26b739f2f42beb5a73cfc6c675b60",{"name":416,"tag":416,"options":898,"isRSC":118},{"sectionHeading":37,"customClass":418},{"large":900},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":902,"@type":106,"tagName":131,"properties":903,"responsiveStyles":904},"builder-pixel-zzjpxxgrc2l",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":905},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":907},{"path":37,"query":908},{},{},1770892881888,1761847585203,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F375467b8bef34ed1a8a1cc5b8b67d75f",[],{"lastPreviewUrl":915,"originalContentId":681,"winningTest":118,"hasLinks":6,"kind":438,"breakpoints":916,"hasAutosaves":6},"https://pushsecurity.com/uc/clickfix-protection?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CeditProjects%2CmodifyMcpServers%2CmodifyWorkflowIntegrations%2CmodifyProjectSettings%2CconnectCodeRepository%2CcreateProjects%2CindexDesignSystems%2CsendPullRequests&builder.user.role.name=Developer&builder.user.role.id=developer&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=ea4f309d2ffe46c5aa97ebf0fda4e2e3&builder.overrides.ea4f309d2ffe46c5aa97ebf0fda4e2e3=ea4f309d2ffe46c5aa97ebf0fda4e2e3&builder.overrides.use-case-page:/uc/clickfix-protection=ea4f309d2ffe46c5aa97ebf0fda4e2e3&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"xsmall":57,"small":39,"medium":40},{"createdDate":918,"id":919,"name":920,"modelId":261,"published":13,"query":921,"data":924,"variations":1029,"lastUpdated":1030,"firstPublished":1031,"testRatio":33,"screenshot":1032,"createdBy":34,"lastUpdatedBy":674,"folders":1033,"meta":1034,"rev":440},1745009743870,"a9d5556e77f84a37b5bd52310a7110c1","Incident response",[922],{"@type":264,"property":265,"operator":266,"value":923},"/uc/incident-response",{"seoDescription":925,"customFonts":926,"title":920,"jsCode":37,"fontAwesomeIcon":931,"seoTitle":932,"tsCode":37,"blocks":933,"url":923,"state":1026},"Investigate and respond faster with unique browser telemetry.",[927],{"kind":273,"subsets":928,"menu":296,"variants":929,"category":295,"family":272,"version":274,"lastModified":275,"files":930},[298,299],[301,302,303,304,305,306,128,307,308,309,310,311,312,313,314,315,316,317],{"100":277,"200":278,"300":279,"500":280,"600":281,"700":282,"800":283,"900":284,"900italic":286,"600italic":294,"200italic":291,"300italic":293,"100italic":288,"700italic":287,"800italic":285,"regular":290,"italic":289,"500italic":292},"faSatelliteDish","Browser based incident response",[934,1021],{"@type":106,"@version":107,"tagName":323,"id":935,"meta":936,"children":937},"builder-653c4aed737b4def88dc4cd2d695660a",{"previousId":696},[938,955,962,969,978,988,998,1008,1015],{"@type":106,"@version":107,"id":939,"meta":940,"component":941,"responsiveStyles":953},"builder-18190bd36518467d9154d27d7e945b9b",{"previousId":700},{"name":327,"options":942,"isRSC":118},{"title":943,"description":944,"points":945,"video":952},"Browser-based incident response","\u003Cp>Push gives you real-time visibility into what actually happened during a breach, right in the browser where the attack played out. From credential theft to session hijacking, Push captures high-fidelity telemetry so you can investigate quickly, contain confidently, and shut it down before it spreads.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>",[946,948,950],{"item":947},"Reconstruct what happened with real browser session context",{"item":949},"Investigate faster with real-world session context",{"item":951},"Trigger response actions automatically through your SIEM or SOAR","https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fd00e39d3b6e346c296261d875cf55652%2Fcompressed?apiKey=f3a1111ff5be48cdbb123cd9f5795a05&token=d00e39d3b6e346c296261d875cf55652&alt=media&optimized=true",{"large":954},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":342},{"@type":106,"@version":107,"id":956,"meta":957,"component":958,"responsiveStyles":960},"builder-8a0a8ea63f5d48dd8a6726f2d49cf0ca",{"previousId":716},{"name":346,"options":959,"isRSC":118},{"AllPartners":41,"backgroundTransparent":6},{"large":961},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":350},{"@type":106,"@version":107,"id":963,"meta":964,"component":965,"responsiveStyles":967},"builder-2df65c3f54334df2b26e7cb744886cdc",{"previousId":723},{"name":354,"options":966,"isRSC":118},{"darkMode":41},{"large":968},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":970,"component":971,"responsiveStyles":976},"builder-2c32c869efc2423ab69ef06b150e9f97",{"name":359,"tag":359,"options":972,"isRSC":118},{"darkMode":6,"maxWidth":363,"maxTextWidth":364,"title":973,"description":974,"image":975,"reverse":6},"\u003Ch2>See attacks unfold, not just their aftermath\u003C/h2>","\u003Cp>Attacks happen in the browser, not in logs. Push captures what traditional tools miss: what users clicked, what loaded, what was entered, and how attackers moved. That gives you real-world evidence, not just assumptions, when every second matters.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F36fc719bd1de4a38b916f4d25c81a26d",{"large":977},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":979,"meta":980,"component":981,"responsiveStyles":986},"builder-370e53c6016e432db01e9193a2ce90f6",{"previousId":739},{"name":373,"options":982,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":376,"title":983,"description":984,"reverse":41,"image":985},"\u003Ch2>Investigate faster with high-fidelity data\u003C/h2>","\u003Cp>Reconstructing an incident shouldn’t feel like guesswork. Push records detailed telemetry from inside the browser: page loads, credential inputs, DOM changes, session activity, user behavior. It’s structured, exportable, and ready to plug into your investigation workflows, so you can move fast without digging through proxy logs or relying on user reports.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fa6adda040e684e67a8d68a55c5ce5f6d",{"large":987},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"fontFamily":382,"paddingTop":384,"marginTop":384},{"@type":106,"@version":107,"id":989,"meta":990,"component":991,"responsiveStyles":996},"builder-a7f3767a8d184bd08fb24520bf210e95",{"previousId":749},{"name":373,"options":992,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":389,"title":993,"description":994,"reverse":6,"image":995},"\u003Ch2>Contain and respond in real time\u003C/h2>","\u003Cp>When something looks off, Push doesn’t just alert you, it gives you options. Guide users with in-browser prompts. Terminate sessions. Trigger SOAR workflows. Enrich SIEM alerts. Push gives you the context and control to stop spread before it starts.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fb3dedeed5aba4847a2c2d22e10d0ec12",{"large":997},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":395},{"@type":106,"@version":107,"layerName":373,"id":999,"meta":1000,"component":1001,"responsiveStyles":1006},"builder-b92036ee0ece4b32acdbdcc7c377366b",{"previousId":759},{"name":373,"options":1002,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":400,"title":1003,"description":1004,"reverse":41,"image":1005},"\u003Ch2>Prevent the next one\u003C/h2>","\u003Cp>Push helps you respond fast, but it also helps you fix what went wrong. It surfaces misconfigurations and risky behaviors that made the attack possible in the first place, then guides users in-browser to remediate. One tool. Full loop. No loose ends.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fc1ecc2d5d3814b62b072fac01827ff96",{"large":1007},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":406},{"@type":106,"@version":107,"id":1009,"meta":1010,"component":1011,"responsiveStyles":1013},"builder-5e8ae39655274de89da32ab573a2525a",{"previousId":769},{"name":354,"options":1012,"isRSC":118},{"darkMode":6},{"large":1014},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":1016,"component":1017,"responsiveStyles":1019},"builder-dfd6850cfb4741d2b8a0c16c2780f00a",{"name":416,"tag":416,"options":1018,"isRSC":118},{"sectionHeading":37,"customClass":418},{"large":1020},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":1022,"@type":106,"tagName":131,"properties":1023,"responsiveStyles":1024},"builder-pixel-z197gdgcmu",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":1025},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":1027},{"path":37,"query":1028},{},{},1770892908052,1745427419274,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fb07017bfd318431690a5bb35bda35b99",[],{"kind":438,"breakpoints":1035,"originalContentId":681,"winningTest":118,"lastPreviewUrl":1036,"hasLinks":6,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},"https://pushsecurity.com/uc/incident-response?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CeditProjects%2CmodifyMcpServers%2CmodifyWorkflowIntegrations%2CmodifyProjectSettings%2CconnectCodeRepository%2CcreateProjects%2CindexDesignSystems%2CsendPullRequests&builder.user.role.name=Developer&builder.user.role.id=developer&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=a9d5556e77f84a37b5bd52310a7110c1&builder.overrides.a9d5556e77f84a37b5bd52310a7110c1=a9d5556e77f84a37b5bd52310a7110c1&builder.overrides.use-case-page:/uc/incident-response=a9d5556e77f84a37b5bd52310a7110c1&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"createdDate":1038,"id":1039,"name":1040,"modelId":261,"published":13,"query":1041,"data":1044,"variations":1149,"lastUpdated":1150,"firstPublished":1151,"testRatio":33,"screenshot":1152,"createdBy":34,"lastUpdatedBy":674,"folders":1153,"meta":1154,"rev":440},1746122471259,"5f118e24433d46ceb79f5099987156d7","Shadow SaaS",[1042],{"@type":264,"property":265,"operator":266,"value":1043},"/uc/shadow-saas",{"seoTitle":1045,"seoDescription":1046,"customFonts":1047,"fontAwesomeIcon":1052,"title":1053,"jsCode":37,"tsCode":37,"blocks":1054,"url":1043,"state":1146},"Find and secure shadow SaaS","See and control shadow SaaS in the browser.",[1048],{"kind":273,"variants":1049,"files":1050,"family":272,"version":274,"subsets":1051,"lastModified":275,"category":295,"menu":296},[301,302,303,304,305,306,128,307,308,309,310,311,312,313,314,315,316,317],{"100":277,"200":278,"300":279,"500":280,"600":281,"700":282,"800":283,"900":284,"300italic":293,"500italic":292,"regular":290,"900italic":286,"italic":289,"100italic":288,"200italic":291,"600italic":294,"700italic":287,"800italic":285},[298,299],"faShieldCheck","Secure shadow SaaS",[1055,1141],{"@type":106,"@version":107,"tagName":323,"id":1056,"meta":1057,"children":1058},"builder-04da805c4cd34652a2db452fcda52e1d",{"previousId":935},[1059,1075,1082,1089,1098,1108,1118,1128,1135],{"@type":106,"@version":107,"id":1060,"meta":1061,"component":1062,"responsiveStyles":1073},"builder-830d414faeaf41439142f9157e8288c8",{"previousId":939},{"name":327,"options":1063,"isRSC":118},{"title":1045,"description":1064,"points":1065,"video":1072},"\u003Cp>SaaS sprawl is one of today’s fastest-growing security blind spots because most tools monitor around the edges. Push sees it at the source, in the browser, revealing every app users access, flagging risky tools, and helping you shut down exposure before it leads to a breach. No guesswork. No nasty surprises. Just real-time visibility and control.\u003C/p>",[1066,1068,1070],{"item":1067},"Discover every SaaS app users access, managed or not",{"item":1069},"Spot accounts with weak security postures like missing MFA, unmanaged access, and no SSO",{"item":1071},"Control usage with in-browser prompts, blocks, and security guardrails","https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F3e4eece318d04d6586e691d59d0741cf%2Fcompressed?apiKey=f3a1111ff5be48cdbb123cd9f5795a05&token=3e4eece318d04d6586e691d59d0741cf&alt=media&optimized=true",{"large":1074},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":342},{"@type":106,"@version":107,"id":1076,"meta":1077,"component":1078,"responsiveStyles":1080},"builder-cd7833f966cb4c7e8adf0d6c979414a6",{"previousId":956},{"name":346,"options":1079,"isRSC":118},{"AllPartners":41,"backgroundTransparent":6},{"large":1081},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":350},{"@type":106,"@version":107,"id":1083,"meta":1084,"component":1085,"responsiveStyles":1087},"builder-49d720b45430454e8b08c526f267c19f",{"previousId":963},{"name":354,"options":1086,"isRSC":118},{"darkMode":41},{"large":1088},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":1090,"component":1091,"responsiveStyles":1096},"builder-3dde0bf6c8544e5e9ab41b18a9d68034",{"name":359,"tag":359,"options":1092,"isRSC":118},{"darkMode":6,"maxWidth":363,"maxTextWidth":364,"title":1093,"description":1094,"image":1095,"reverse":6},"\u003Ch2>Use your browser to curb Saas Sprawl\u003C/h2>","\u003Cp>Shadow SaaS isn’t hiding in your network, it’s in your browser. From AI tools to unsanctioned file-sharing sites, security risks live in the apps your users sign into every day. Push maps your organization's true SaaS footprint in real time, exposing apps and accounts with unmanaged access, poor authentication, or no security oversight.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fb6811a214c7949b6bbe0b9a3bca62efd",{"large":1097},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":1099,"meta":1100,"component":1101,"responsiveStyles":1106},"builder-e2420451ccdc4f088d0a4904cff45935",{"previousId":979},{"name":373,"options":1102,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":376,"title":1103,"description":1104,"reverse":41,"image":1105},"\u003Ch2>Discover hidden SaaS usage\u003C/h2>","\u003Cp>Push captures live browser telemetry across every tab and session. Whether a user signs into a sanctioned app with a personal account or tries a new AI plugin, you’ll see it in real time, with no integrations or manual tagging.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fe16e301f9af94665b95d98232a863d8a",{"large":1107},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"fontFamily":382,"paddingTop":384,"marginTop":384},{"@type":106,"@version":107,"id":1109,"meta":1110,"component":1111,"responsiveStyles":1116},"builder-b36de7fce7994beea9e58d94662e7166",{"previousId":989},{"name":373,"options":1112,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":389,"title":1113,"description":1114,"reverse":6,"image":1115},"\u003Ch2>Spot risky access and unsafe usage\u003C/h2>","\u003Cp>Discovery is just the beginning. Push flags apps with risky traits, no MFA, no SSO, known vulnerabilities, or broad access scopes. You’ll know which tools introduce real risk, and which users are exposed so you can act with precision.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F6585f3c242da4d70ae3cb7d02f481bef",{"large":1117},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":395},{"@type":106,"@version":107,"layerName":373,"id":1119,"meta":1120,"component":1121,"responsiveStyles":1126},"builder-dc366b5134684fe7a508edf8913103ea",{"previousId":999},{"name":373,"options":1122,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":400,"title":1123,"description":1124,"reverse":41,"image":1125},"\u003Ch2>Close gaps before they grow\u003C/h2>","\u003Cp>Push turns insight into action. When risky SaaS use is detected, guide users to enable MFA, block high-risk apps, or apply in-browser guardrails automatically. All without deploying new infrastructure or managing dozens of integrations.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fe6d60b6d91414819bc6258a318f00557",{"large":1127},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":406},{"@type":106,"@version":107,"id":1129,"meta":1130,"component":1131,"responsiveStyles":1133},"builder-8708f6f0d8da4b3f9e17bf16cda70219",{"previousId":1009},{"name":354,"options":1132,"isRSC":118},{"darkMode":6},{"large":1134},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":1136,"component":1137,"responsiveStyles":1139},"builder-8ff4b38d60534cf28cb523ab0f754875",{"name":416,"tag":416,"options":1138,"isRSC":118},{"sectionHeading":37,"customClass":418},{"large":1140},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":1142,"@type":106,"tagName":131,"properties":1143,"responsiveStyles":1144},"builder-pixel-d1ul2kmxbed",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":1145},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":1147},{"path":37,"query":1148},{},{},1770892936802,1746714967208,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F01bfb2304521412fbd2e1a1180904d40",[],{"originalContentId":919,"winningTest":118,"lastPreviewUrl":1155,"breakpoints":1156,"kind":438,"hasLinks":6,"hasAutosaves":6},"https://pushsecurity.com/uc/shadow-saas?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CeditProjects%2CmodifyMcpServers%2CmodifyWorkflowIntegrations%2CmodifyProjectSettings%2CconnectCodeRepository%2CcreateProjects%2CindexDesignSystems%2CsendPullRequests&builder.user.role.name=Developer&builder.user.role.id=developer&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=5f118e24433d46ceb79f5099987156d7&builder.overrides.5f118e24433d46ceb79f5099987156d7=5f118e24433d46ceb79f5099987156d7&builder.overrides.use-case-page:/uc/shadow-saas=5f118e24433d46ceb79f5099987156d7&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"xsmall":57,"small":39,"medium":40},{"createdDate":1158,"id":1159,"name":1160,"modelId":261,"published":13,"query":1161,"data":1164,"variations":1268,"lastUpdated":1269,"firstPublished":1270,"testRatio":33,"screenshot":1271,"createdBy":34,"lastUpdatedBy":674,"folders":1272,"meta":1273,"rev":440},1764707470172,"b62629ce2f3741158d961cd10fe74b31","Shadow AI",[1162],{"@type":264,"property":265,"operator":266,"value":1163},"/uc/shadow-ai",{"fontAwesomeIcon":1165,"seoTitle":1166,"jsCode":37,"customFonts":1167,"title":1172,"tsCode":37,"seoDescription":1173,"blocks":1174,"url":1163,"state":1265},"faBrainCircuit","Secure AI native and AI enhanced apps. ",[1168],{"variants":1169,"category":295,"files":1170,"subsets":1171,"family":272,"kind":273,"menu":296,"lastModified":275,"version":274},[301,302,303,304,305,306,128,307,308,309,310,311,312,313,314,315,316,317],{"100":277,"200":278,"300":279,"500":280,"600":281,"700":282,"800":283,"900":284,"800italic":285,"regular":290,"700italic":287,"200italic":291,"italic":289,"500italic":292,"600italic":294,"300italic":293,"100italic":288,"900italic":286},[298,299],"Secure shadow AI","See and control shadow AI apps in the browser.",[1175,1260],{"@type":106,"@version":107,"tagName":323,"id":1176,"meta":1177,"children":1178},"builder-a6e5717a2c914d5695058e4ee201a05d",{"previousId":1056},[1179,1195,1202,1209,1219,1228,1237,1247,1254],{"@type":106,"@version":107,"id":1180,"meta":1181,"component":1182,"responsiveStyles":1193},"builder-3e0ed678683f4a0eb7aa00253cf263b2",{"previousId":1060},{"name":327,"options":1183,"isRSC":118},{"title":1172,"description":1184,"points":1185,"image":1192},"\u003Cp>Your employees are adopting AI faster than you can track it. From native features in corporate apps to unapproved shadow tools, it’s all happening in the browser. Push detects every AI interaction in real time, letting you categorize apps and enforce acceptable use policies in the browser.\u003C/p>",[1186,1188,1190],{"item":1187},"Map every AI tool used across your workforce",{"item":1189},"Review and classify apps by sensitivity, purpose, and policy status",{"item":1191},"Enforce AI usage rules directly in the browser","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F33cf153d920f4e389f3650253577cff7",{"large":1194},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":342},{"@type":106,"@version":107,"id":1196,"meta":1197,"component":1198,"responsiveStyles":1200},"builder-76968f8471d14893b8189d75b08fb426",{"previousId":1076},{"name":346,"options":1199,"isRSC":118},{"AllPartners":41,"backgroundTransparent":6},{"large":1201},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":350},{"@type":106,"@version":107,"id":1203,"meta":1204,"component":1205,"responsiveStyles":1207},"builder-b55b9d4bc5a649d8839ce7f6c2043d95",{"previousId":1083},{"name":354,"options":1206,"isRSC":118},{"darkMode":41},{"large":1208},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":1210,"meta":1211,"component":1212,"responsiveStyles":1217},"builder-c3f38ef4d75d4989a29b5903175ed8a1",{"previousId":1090},{"name":359,"tag":359,"options":1213,"isRSC":118},{"darkMode":6,"maxWidth":363,"maxTextWidth":364,"title":1214,"description":1215,"image":1216,"reverse":6},"\u003Ch2>Use your browser to govern AI \u003C/h2>","\u003Cp>The AI footprint inside your company is bigger than you think. From text generators to meeting assistants and design copilots, employees test, adopt, and connect new tools constantly. Push shows you those tools and which users are accessing them, without relying on network scans or API integrations.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F30b43bda6f1644c19478fb1efa20050c",{"large":1218},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":1220,"meta":1221,"component":1222,"responsiveStyles":1226},"builder-90ee9cb9afc44e7f885523715bf51a53",{"previousId":1099},{"name":373,"options":1223,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":376,"title":1224,"description":1225,"reverse":41,"image":1115},"\u003Ch2>Discover every AI tool users touch\u003C/h2>","\u003Cp>Push captures live telemetry from the browser, identifying every AI-native and AI-enhanced application users access. You’ll know which corporate identities are connected, how data flows, and what new AI apps appear across your environment. \u003C/p>",{"large":1227},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"fontFamily":382,"paddingTop":384,"marginTop":384},{"@type":106,"@version":107,"id":1229,"meta":1230,"component":1231,"responsiveStyles":1235},"builder-9e44539fa53c4d8e87406036c921fc46",{"previousId":1109},{"name":373,"options":1232,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":389,"title":1233,"description":1234,"reverse":6,"image":1125},"\u003Ch2>Classify and manage AI risk\u003C/h2>","\u003Cp>For apps you choose to allow, Push lets you apply custom in-browser banners. You can bulk-select categories of AI tools and require users to read and acknowledge your acceptable use policy before they proceed. This creates an auditable trail and moves policy from an easy to forget document to an active, in-workflow control.\u003C/p>",{"large":1236},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":395},{"@type":106,"@version":107,"layerName":373,"id":1238,"meta":1239,"component":1240,"responsiveStyles":1245},"builder-44c1a891926f4bdeaaa37e90721fe6ac",{"previousId":1119},{"name":373,"options":1241,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":400,"title":1242,"description":1243,"reverse":41,"image":1244},"\u003Ch2>Enforce your AI policy in the browser\u003C/h2>","\u003Cp>When an AI tool is deemed non-compliant or too risky, Push blocks it at the source. The block happens directly in the browser, preventing the user from accessing the site or submitting data. This gives you an immediate, powerful lever to stop data exfiltration and enforce a hard line on unacceptable risk.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fa359ac1805af4e15a8a7f84632b9bb55",{"large":1246},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":406},{"@type":106,"@version":107,"id":1248,"meta":1249,"component":1250,"responsiveStyles":1252},"builder-dcc906f9cbe54dc68b3c672668e7a38f",{"previousId":1129},{"name":354,"options":1251,"isRSC":118},{"darkMode":6},{"large":1253},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":1255,"component":1256,"responsiveStyles":1258},"builder-d2d64780c31b4349bc75805b23a07e38",{"name":416,"tag":416,"options":1257,"isRSC":118},{"sectionHeading":37,"customClass":418},{"large":1259},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":1261,"@type":106,"tagName":131,"properties":1262,"responsiveStyles":1263},"builder-pixel-wxx9tk70r9p",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":1264},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":1266},{"path":37,"query":1267},{},{},1770892957225,1764950077593,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fe558b8b069884037a8e6904f7ecc029c",[],{"winningTest":118,"breakpoints":1274,"originalContentId":1039,"kind":438,"lastPreviewUrl":1275,"hasLinks":6,"hasAutosaves":41},{"xsmall":57,"small":39,"medium":40},"https://pushsecurity.com/uc/shadow-ai?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CeditProjects%2CmodifyMcpServers%2CmodifyWorkflowIntegrations%2CmodifyProjectSettings%2CconnectCodeRepository%2CcreateProjects%2CindexDesignSystems%2CsendPullRequests&builder.user.role.name=Developer&builder.user.role.id=developer&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=b62629ce2f3741158d961cd10fe74b31&builder.overrides.b62629ce2f3741158d961cd10fe74b31=b62629ce2f3741158d961cd10fe74b31&builder.overrides.use-case-page:/uc/shadow-ai=b62629ce2f3741158d961cd10fe74b31&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"_path":1277,"_dir":1278,"_draft":6,"_partial":6,"_locale":37,"sys":1279,"ogImage":118,"summary":1282,"title":1296,"subtitle":118,"metaTitle":1297,"synopsis":1298,"hashTags":118,"publishedDate":1299,"slug":1300,"tagsCollection":1301,"relatedBlogPostsCollection":1311,"authorsCollection":4158,"content":4162,"_id":5001,"_type":5002,"_source":5003,"_file":5004,"_stem":5005,"_extension":5002},"/blog/consentfix-debrief","blog",{"id":1280,"publishedAt":1281},"4jcVFrvGBtVXpKU3gDMaa2","2026-01-14T09:27:38.375Z",{"json":1283},{"data":1284,"content":1285,"nodeType":1295},{},[1286],{"data":1287,"content":1288,"nodeType":1294},{},[1289],{"data":1290,"marks":1291,"value":1292,"nodeType":1293},{},[],"In December, the Push Security research team discovered and blocked a brand new attack technique that we coined ConsentFix. We’re sharing some new insights on the campaign and pulling together some of the top recommendations and resources from across the community.","text","paragraph","document","ConsentFix debrief: latest community insights, recommendations, and predictions","ConsentFix debrief: insights, recommendations & predictions","New insights on the ConsentFix campaign stopped by Push.","2026-01-14T00:00:00.000Z","consentfix-debrief",{"items":1302},[1303,1307],{"sys":1304,"name":1306},{"id":1305},"4ksQNCFeBf8H4QIORqpRLw","Detection & response",{"sys":1308,"name":1310},{"id":1309},"6A5RXS31ZQx3PwryGb1IMy","Browser-based attacks",{"items":1312},[1313,2206,2830],{"__typename":1314,"sys":1315,"content":1317,"title":2188,"synopsis":2189,"hashTags":118,"publishedDate":2190,"slug":2191,"tagsCollection":2192,"authorsCollection":2198},"BlogPosts",{"id":1316},"71EaaK7lfl6bQBbkAU0qjv",{"json":1318},{"nodeType":1295,"data":1319,"content":1320},{},[1321,1331,1338,1345,1352,1364,1371,1380,1386,1390,1398,1405,1412,1418,1440,1447,1453,1460,1466,1473,1518,1524,1530,1537,1544,1547,1555,1575,1582,1588,1608,1614,1634,1641,1644,1652,1659,1705,1717,1720,1728,1747,1754,1770,1777,1784,1790,1797,1800,1808,1815,1868,1875,1878,1886,1892,1899,1906,1912,1919,1952,1959,1966,1972,1979,1985,1994,2014,2021,2054,2061,2094,2097,2105,2112,2118,2137,2144,2176,2182],{"nodeType":1322,"data":1323,"content":1324},"heading-1",{},[1325],{"nodeType":1293,"value":1326,"marks":1327,"data":1330},"Introducing “ConsentFix” — a new kind of phishing attack",[1328],{"type":1329},"bold",{},{"nodeType":1294,"data":1332,"content":1333},{},[1334],{"nodeType":1293,"value":1335,"marks":1336,"data":1337},"The Push browser agent recently detected and blocked a new attack technique seen targeting several Push customers. ",[],{},{"nodeType":1294,"data":1339,"content":1340},{},[1341],{"nodeType":1293,"value":1342,"marks":1343,"data":1344},"This is a new kind of browser-based attack technique that takes over user accounts with a simple copy and paste. If you’re already logged into the app in your browser, you don’t even need to supply creds, or pass an MFA check — meaning it effectively circumvents phishing-resistant auth like passkeys too.",[],{},{"nodeType":1294,"data":1346,"content":1347},{},[1348],{"nodeType":1293,"value":1349,"marks":1350,"data":1351},"This is so different from the AiTM phish kits we usually come up against that we felt it deserved a new name. ",[],{},{"nodeType":1294,"data":1353,"content":1354},{},[1355,1360],{"nodeType":1293,"value":1356,"marks":1357,"data":1359},"Enter: ConsentFix. ",[1358],{"type":1329},{},{"nodeType":1293,"value":1361,"marks":1362,"data":1363},"This attack shares a lot of similarities with ClickFix/FileFix, AiTM phishing, and OAuth Consent Phishing. You can think of this as a browser-native ClickFix attack that phishes an OAuth token on a target app by getting the victim to copy and paste a URL containing OAuth key material into a phishing page. ",[],{},{"nodeType":1294,"data":1365,"content":1366},{},[1367],{"nodeType":1293,"value":1368,"marks":1369,"data":1370},"The campaign we detected looks to be specifically targeting Microsoft accounts by abusing the Azure CLI OAuth app. Essentially, the attacker tricks the victim into logging into Azure CLI, by generating an OAuth authorization code — visible in a localhost URL — and then pasting that URL (including the code) into an attacker-controlled page. This then creates an OAuth connection between the victim’s Microsoft account and the attacker’s Azure CLI instance. ",[],{},{"nodeType":1372,"data":1373,"content":1379},"embedded-entry-block",{"target":1374},{"sys":1375},{"id":1376,"type":1377,"linkType":1378},"5GTnqWIbmraz8HZeHMybrP","Link","Entry",[],{"nodeType":1372,"data":1381,"content":1385},{"target":1382},{"sys":1383},{"id":1384,"type":1377,"linkType":1378},"1lcjX5q3b1bsuhyOXKvJpW",[],{"nodeType":1387,"data":1388,"content":1389},"hr",{},[],{"nodeType":1322,"data":1391,"content":1392},{},[1393],{"nodeType":1293,"value":1394,"marks":1395,"data":1397},"How ConsentFix works",[1396],{"type":1329},{},{"nodeType":1294,"data":1399,"content":1400},{},[1401],{"nodeType":1293,"value":1402,"marks":1403,"data":1404},"In all of the examples we saw, the victim accessed a malicious or compromised webpage via Google Search. The vast majority of the sites we’ve seen associated with the campaign are legitimate, compromised websites with high domain reputation that are easily findable via search engines.",[],{},{"nodeType":1294,"data":1406,"content":1407},{},[1408],{"nodeType":1293,"value":1409,"marks":1410,"data":1411},"The attacker had injected a fake Cloudflare Turnstile into the compromised websites, requiring an email address to be supplied in order to proceed. ",[],{},{"nodeType":1372,"data":1413,"content":1417},{"target":1414},{"sys":1415},{"id":1416,"type":1377,"linkType":1378},"39jEjeLqOYIkGc4o9w3MuX",[],{"nodeType":1294,"data":1419,"content":1420},{},[1421,1425,1436],{"nodeType":1293,"value":1422,"marks":1423,"data":1424},"This acted as a form of ",[],{},{"nodeType":1426,"data":1427,"content":1429},"hyperlink",{"uri":1428},"https://phishing-techniques.pushsecurity.com/techniques/conditional-loading/",[1430],{"nodeType":1293,"value":1431,"marks":1432,"data":1435},"conditional loading",[1433],{"type":1434},"underline",{},{"nodeType":1293,"value":1437,"marks":1438,"data":1439}," that would only continue if a valid email address and domain was supplied, designed to prevent the page from being analysed by security bots, analysts, and low-value accounts that run the risk of exposing the campaign before the intended recipient(s) can be phished. ",[],{},{"nodeType":1294,"data":1441,"content":1442},{},[1443],{"nodeType":1293,"value":1444,"marks":1445,"data":1446},"If a domain not on the target list was provided, the victim was passed back to the original website and the attack did not progress to the next stage. Further, once the check has concluded per IP, the phishing page will no longer activate, even a different email is provided.  ",[],{},{"nodeType":1372,"data":1448,"content":1452},{"target":1449},{"sys":1450},{"id":1451,"type":1377,"linkType":1378},"7ttmGnTzi9j87tBXfyFcOA",[],{"nodeType":1294,"data":1454,"content":1455},{},[1456],{"nodeType":1293,"value":1457,"marks":1458,"data":1459},"After entering an approved email address, the next stage was loaded, prompting the victim to complete a set of instructions on the page to continue.",[],{},{"nodeType":1372,"data":1461,"content":1465},{"target":1462},{"sys":1463},{"id":1464,"type":1377,"linkType":1378},"2oHYNoMgAz6MdgLlcWjbaB",[],{"nodeType":1294,"data":1467,"content":1468},{},[1469],{"nodeType":1293,"value":1470,"marks":1471,"data":1472},"To complete the attack, the victim must:",[],{},{"nodeType":1474,"data":1475,"content":1476},"unordered-list",{},[1477,1488,1498,1508],{"nodeType":1478,"data":1479,"content":1480},"list-item",{},[1481],{"nodeType":1294,"data":1482,"content":1483},{},[1484],{"nodeType":1293,"value":1485,"marks":1486,"data":1487},"Click the “Sign In” button. This opens a new tab that loads a legitimate Microsoft URL associated with the user account/email used to access the page.",[],{},{"nodeType":1478,"data":1489,"content":1490},{},[1491],{"nodeType":1294,"data":1492,"content":1493},{},[1494],{"nodeType":1293,"value":1495,"marks":1496,"data":1497},"If the user is already logged into Microsoft in their browser, they simply need to select their MS account from the dropdown. Otherwise, they will be required to login via the legitimate Microsoft login URL (no phishing takes place at this stage). ",[],{},{"nodeType":1478,"data":1499,"content":1500},{},[1501],{"nodeType":1294,"data":1502,"content":1503},{},[1504],{"nodeType":1293,"value":1505,"marks":1506,"data":1507},"Once logged into legit Microsoft or the account is selected from the dropdown, the user is redirected to localhost, which generates a URL containing a code associated with the user’s Microsoft account. ",[],{},{"nodeType":1478,"data":1509,"content":1510},{},[1511],{"nodeType":1294,"data":1512,"content":1513},{},[1514],{"nodeType":1293,"value":1515,"marks":1516,"data":1517},"To complete the phish, the victim copies the URL and pastes it onto the original page. ",[],{},{"nodeType":1372,"data":1519,"content":1523},{"target":1520},{"sys":1521},{"id":1522,"type":1377,"linkType":1378},"7zendMbmCViGwtEpUQvq6y",[],{"nodeType":1372,"data":1525,"content":1529},{"target":1526},{"sys":1527},{"id":1528,"type":1377,"linkType":1378},"1eZOs7hXi9FzCE92QEP6xh",[],{"nodeType":1294,"data":1531,"content":1532},{},[1533],{"nodeType":1293,"value":1534,"marks":1535,"data":1536},"Once the steps are completed, the victim has granted the attacker access to their Microsoft account via Azure CLI. ",[],{},{"nodeType":1294,"data":1538,"content":1539},{},[1540],{"nodeType":1293,"value":1541,"marks":1542,"data":1543},"At this point, the attacker has effective control of the victim’s Microsoft account, but without ever needing to phish a password, or pass an MFA check. In fact, if the user was already logged in to their Microsoft account (i.e. they had an active session) no login is required at all. ",[],{},{"nodeType":1387,"data":1545,"content":1546},{},[],{"nodeType":1322,"data":1548,"content":1549},{},[1550],{"nodeType":1293,"value":1551,"marks":1552,"data":1554},"The next evolution of ClickFix?",[1553],{"type":1329},{},{"nodeType":1294,"data":1556,"content":1557},{},[1558,1562,1571],{"nodeType":1293,"value":1559,"marks":1560,"data":1561},"When we presented ",[],{},{"nodeType":1426,"data":1563,"content":1565},{"uri":1564},"https://pushsecurity.com/webinar/clickfix",[1566],{"nodeType":1293,"value":1567,"marks":1568,"data":1570},"our last webinar on ClickFix",[1569],{"type":1434},{},{"nodeType":1293,"value":1572,"marks":1573,"data":1574},", we predicted that the next evolution of the attack would happen entirely within the browser context. This is because any attack that touches the endpoint (a traditionally much better protected surface) is way more likely to be detected. And with many ClickFix attacks being used to deliver infostealer malware, these attacks are really trying to get back into the browser anyway — to steal credentials and sessions stored there. ",[],{},{"nodeType":1294,"data":1576,"content":1577},{},[1578],{"nodeType":1293,"value":1579,"marks":1580,"data":1581},"Let’s take a closer look at the page — if you follow Push research, you might be getting déjà vu. ",[],{},{"nodeType":1372,"data":1583,"content":1587},{"target":1584},{"sys":1585},{"id":1586,"type":1377,"linkType":1378},"1vMZCJ92IxFdR1EzzCOOvb",[],{"nodeType":1294,"data":1589,"content":1590},{},[1591,1595,1604],{"nodeType":1293,"value":1592,"marks":1593,"data":1594},"We’ve seen this kind of embedded video player before (albeit a slicker looking one) that we blogged about as ",[],{},{"nodeType":1426,"data":1596,"content":1598},{"uri":1597},"https://pushsecurity.com/blog/the-most-advanced-clickfix-yet/",[1599],{"nodeType":1293,"value":1600,"marks":1601,"data":1603},"the most advanced ClickFix we’d seen",[1602],{"type":1434},{},{"nodeType":1293,"value":1605,"marks":1606,"data":1607},".",[],{},{"nodeType":1372,"data":1609,"content":1613},{"target":1610},{"sys":1611},{"id":1612,"type":1377,"linkType":1378},"ID7VKJNOZk729P5zBOBjZ",[],{"nodeType":1294,"data":1615,"content":1616},{},[1617,1621,1630],{"nodeType":1293,"value":1618,"marks":1619,"data":1620},"Another similarity with ClickFix campaigns we’ve investigated is the use of Google Search as a delivery vector. 4 in 5 ClickFix attacks intercepted by Push came via Google Search, with attackers using ",[],{},{"nodeType":1426,"data":1622,"content":1624},{"uri":1623},"https://phishing-techniques.pushsecurity.com/techniques/malvertising/",[1625],{"nodeType":1293,"value":1626,"marks":1627,"data":1629},"malvertising",[1628],{"type":1434},{},{"nodeType":1293,"value":1631,"marks":1632,"data":1633}," and either compromised or custom vibe-coded websites to intercept users as they browse the internet. ",[],{},{"nodeType":1294,"data":1635,"content":1636},{},[1637],{"nodeType":1293,"value":1638,"marks":1639,"data":1640},"So it seems highly likely that this is a kind of browser-native evolution of ClickFix that shares many elements with typical ClickFix attacks, and is probably used by the same groups of attackers.",[],{},{"nodeType":1387,"data":1642,"content":1643},{},[],{"nodeType":1322,"data":1645,"content":1646},{},[1647],{"nodeType":1293,"value":1648,"marks":1649,"data":1651},"OAuth shenanigans via Azure CLI",[1650],{"type":1329},{},{"nodeType":1294,"data":1653,"content":1654},{},[1655],{"nodeType":1293,"value":1656,"marks":1657,"data":1658},"The clever use of Azure CLI and OAuth consent abuse is another clever iteration on previous techniques. ",[],{},{"nodeType":1294,"data":1660,"content":1661},{},[1662,1666,1675,1679,1688,1692,1701],{"nodeType":1293,"value":1663,"marks":1664,"data":1665},"We’ve previously seen ",[],{},{"nodeType":1426,"data":1667,"content":1669},{"uri":1668},"https://phishing-techniques.pushsecurity.com/techniques/consent-phishing/",[1670],{"nodeType":1293,"value":1671,"marks":1672,"data":1674},"consent phishing",[1673],{"type":1434},{},{"nodeType":1293,"value":1676,"marks":1677,"data":1678}," and ",[],{},{"nodeType":1426,"data":1680,"content":1682},{"uri":1681},"https://phishing-techniques.pushsecurity.com/techniques/device-code-phishing/",[1683],{"nodeType":1293,"value":1684,"marks":1685,"data":1687},"device code phishing",[1686],{"type":1434},{},{"nodeType":1293,"value":1689,"marks":1690,"data":1691}," attacks where attackers have tricked victims into connecting malicious external apps into their tenant via OAuth, but this is becoming increasingly difficult in core enterprise cloud environments like Azure due to ",[],{},{"nodeType":1426,"data":1693,"content":1695},{"uri":1694},"https://learn.microsoft.com/en-us/microsoft-365/admin/misc/user-consent?view=o365-worldwide",[1696],{"nodeType":1293,"value":1697,"marks":1698,"data":1700},"stricter default configs",[1699],{"type":1434},{},{"nodeType":1293,"value":1702,"marks":1703,"data":1704},". However, since Azure CLI is a first-party Microsoft app, it is implicitly trusted in Entra ID, and is excluded from these restrictions. ",[],{},{"nodeType":1294,"data":1706,"content":1707},{},[1708,1712],{"nodeType":1293,"value":1709,"marks":1710,"data":1711},"First-party apps like Azure CLI are trusted by default in all tenants, allowed to request permissions without admin approval, and cannot be deleted or blocked. They can also be granted special permissions, such as tenant-wide service permissions (without needing admin approval), use of legacy or undocumented graph scopes, internal scopes for Microsoft client operations, and permissions for Office/Entra admin functions. ",[],{},{"nodeType":1293,"value":1713,"marks":1714,"data":1716},"This makes Azure CLI a prime target for attackers, and significantly more exploitable than when connecting a third-party app. ",[1715],{"type":1329},{},{"nodeType":1387,"data":1718,"content":1719},{},[],{"nodeType":1322,"data":1721,"content":1722},{},[1723],{"nodeType":1293,"value":1724,"marks":1725,"data":1727},"Advanced detection evasion techniques",[1726],{"type":1329},{},{"nodeType":1294,"data":1729,"content":1730},{},[1731,1735,1743],{"nodeType":1293,"value":1732,"marks":1733,"data":1734},"This campaign features some of the most advanced ",[],{},{"nodeType":1426,"data":1736,"content":1738},{"uri":1737},"https://phishing-techniques.pushsecurity.com/",[1739],{"nodeType":1293,"value":1740,"marks":1741,"data":1742},"detection evasion techniques",[],{},{"nodeType":1293,"value":1744,"marks":1745,"data":1746}," we've seen in the wild. ",[],{},{"nodeType":1294,"data":1748,"content":1749},{},[1750],{"nodeType":1293,"value":1751,"marks":1752,"data":1753},"As well as the use of Google Search to deliver the lure, and bot protection to prevent security tools from analysing the page, there were multiple layers of anti-analysis techniques to navigate.",[],{},{"nodeType":1294,"data":1755,"content":1756},{},[1757,1761,1766],{"nodeType":1293,"value":1758,"marks":1759,"data":1760},"We already mentioned the use of selective targeting based on email addresses and domain names. But all sites involved in the campaign also have synchronized IP blocking — meaning if you visit one site and are served one of the associated phishing pages, the phish will never be served again, ",[],{},{"nodeType":1293,"value":1762,"marks":1763,"data":1765},"across any of the sites linked to the campaign",[1764],{"type":1329},{},{"nodeType":1293,"value":1767,"marks":1768,"data":1769},". When you visit any of the sites again, the phish won't trigger, and it can be browsed as normal. ",[],{},{"nodeType":1294,"data":1771,"content":1772},{},[1773],{"nodeType":1293,"value":1774,"marks":1775,"data":1776},"On the backend, there are multiple checks based on your IP and identifiers unique to your session. Unless all of the conditions are met, certain JavaScript packages won't be served — preventing full inspection of the page to detect malicious elements. ",[],{},{"nodeType":1294,"data":1778,"content":1779},{},[1780],{"nodeType":1293,"value":1781,"marks":1782,"data":1783},"If the conditions aren't met, the page may not load the Cloudflare Turnstile check at all, or will redirect you back to the site to continue browsing as normal.",[],{},{"nodeType":1372,"data":1785,"content":1789},{"target":1786},{"sys":1787},{"id":1788,"type":1377,"linkType":1378},"5v0zDoscA6pYLBfkXrNtIH",[],{"nodeType":1294,"data":1791,"content":1792},{},[1793],{"nodeType":1293,"value":1794,"marks":1795,"data":1796},"All of these make it incredibly hard to detect and block these attacks ahead of time when relying on URL-based checks and traffic analysis.",[],{},{"nodeType":1387,"data":1798,"content":1799},{},[],{"nodeType":1322,"data":1801,"content":1802},{},[1803],{"nodeType":1293,"value":1804,"marks":1805,"data":1807},"Key takeaways",[1806],{"type":1329},{},{"nodeType":1294,"data":1809,"content":1810},{},[1811],{"nodeType":1293,"value":1812,"marks":1813,"data":1814},"ConsentFix is a dangerous evolution of ClickFix and consent phishing that is incredibly hard for traditional security tools to detect and block, as:",[],{},{"nodeType":1474,"data":1816,"content":1817},{},[1818,1828,1838,1848,1858],{"nodeType":1478,"data":1819,"content":1820},{},[1821],{"nodeType":1294,"data":1822,"content":1823},{},[1824],{"nodeType":1293,"value":1825,"marks":1826,"data":1827},"The attack happens entirely inside the browser context, removing one of the key detection opportunities for ClickFix (because it doesn’t touch the endpoint).",[],{},{"nodeType":1478,"data":1829,"content":1830},{},[1831],{"nodeType":1294,"data":1832,"content":1833},{},[1834],{"nodeType":1293,"value":1835,"marks":1836,"data":1837},"Delivering the lure via a Google Search watering hole attack completely circumvents email-based anti-phishing controls.",[],{},{"nodeType":1478,"data":1839,"content":1840},{},[1841],{"nodeType":1294,"data":1842,"content":1843},{},[1844],{"nodeType":1293,"value":1845,"marks":1846,"data":1847},"Targeting a first-party app like Azure CLI means that many of the mitigating controls available for third-party app integrations do not apply — making this attack way harder to prevent.",[],{},{"nodeType":1478,"data":1849,"content":1850},{},[1851],{"nodeType":1294,"data":1852,"content":1853},{},[1854],{"nodeType":1293,"value":1855,"marks":1856,"data":1857},"Because there’s no login required, phishing-resistant authentication controls like passkeys have no impact on this attack. ",[],{},{"nodeType":1478,"data":1859,"content":1860},{},[1861],{"nodeType":1294,"data":1862,"content":1863},{},[1864],{"nodeType":1293,"value":1865,"marks":1866,"data":1867},"The use of advanced detection evasion techniques makes this attack difficult to investigate, meaning these attacks are going undetected. ",[],{},{"nodeType":1294,"data":1869,"content":1870},{},[1871],{"nodeType":1293,"value":1872,"marks":1873,"data":1874},"We’re sure to see more examples of ConsentFix in future. We’ll be monitoring to see how attackers adapt in terms of integrating these capabilities with common as-a-Service offerings to make them more widespread, and whether the scope extends further beyond Microsoft / Azure CLI targets in the future to target other enterprise cloud ecosystems. ",[],{},{"nodeType":1387,"data":1876,"content":1877},{},[],{"nodeType":1322,"data":1879,"content":1880},{},[1881],{"nodeType":1293,"value":1882,"marks":1883,"data":1885},"Recommendations",[1884],{"type":1329},{},{"nodeType":1372,"data":1887,"content":1891},{"target":1888},{"sys":1889},{"id":1890,"type":1377,"linkType":1378},"3aBCwdB2aNnLRxRN5RrshC",[],{"nodeType":1294,"data":1893,"content":1894},{},[1895],{"nodeType":1293,"value":1896,"marks":1897,"data":1898},"On the backend, exploitation of this attack will lead to login events being observed to the Microsoft Azure CLI app. It’s likely that any legitimate use of this will most likely be limited to system administrators and possibly developers. Therefore, logins outside of these groups will be inherently more suspicious.",[],{},{"nodeType":1294,"data":1900,"content":1901},{},[1902],{"nodeType":1293,"value":1903,"marks":1904,"data":1905},"Additionally, it’s possible that aspects of the logins themselves will be different between legitimate Azure CLI use and exploitation of this attack. For example, see the following logs from a lab environment. The login events with an application of  “Microsoft Azure CLI” and a resource of “Azure Resource Manager” was legitimate use of the Azure CLI using the powershell CLI framework. Conversely, the login event with the Resource of “Windows Azure Active Directory” was produced by logging in using the method used by the phishing kit.",[],{},{"nodeType":1372,"data":1907,"content":1911},{"target":1908},{"sys":1909},{"id":1910,"type":1377,"linkType":1378},"6ie0nkk6XbgwidfwmiGwL4",[],{"nodeType":1294,"data":1913,"content":1914},{},[1915],{"nodeType":1293,"value":1916,"marks":1917,"data":1918},"There is no guarantee this can be used to differentiate between legitimate and malicious examples, but it’s another data point to consider. If searching logs you may wish to use the respective GUIDs for these:",[],{},{"nodeType":1474,"data":1920,"content":1921},{},[1922,1937],{"nodeType":1478,"data":1923,"content":1924},{},[1925],{"nodeType":1294,"data":1926,"content":1927},{},[1928,1933],{"nodeType":1293,"value":1929,"marks":1930,"data":1932},"Application ID",[1931],{"type":1329},{},{"nodeType":1293,"value":1934,"marks":1935,"data":1936}," = 04b07795-8ddb-461a-bbee-02f9e1bf7b46",[],{},{"nodeType":1478,"data":1938,"content":1939},{},[1940],{"nodeType":1294,"data":1941,"content":1942},{},[1943,1948],{"nodeType":1293,"value":1944,"marks":1945,"data":1947},"Resource ID",[1946],{"type":1329},{},{"nodeType":1293,"value":1949,"marks":1950,"data":1951}," = 00000002-0000-0000-c000-000000000000",[],{},{"nodeType":1294,"data":1953,"content":1954},{},[1955],{"nodeType":1293,"value":1956,"marks":1957,"data":1958},"For interactive logins, like above, you cannot rely on looking for logins from suspicious IP addresses or locations. The login itself occurs from the victims browser directly to Microsoft, and so the IP addresses associated with these events will be the legitimate IP used by the target user, not by the threat actor. ",[],{},{"nodeType":1294,"data":1960,"content":1961},{},[1962],{"nodeType":1293,"value":1963,"marks":1964,"data":1965},"However, for non-interactive logins and other audit logs for actions taken, you may be able to uncover unusual IP addresses that differ from the original interactive login. For example, here are some non-interactive logins that were observed immediately after compromise that came from different IP addresses in both the US and Indonesia.",[],{},{"nodeType":1372,"data":1967,"content":1971},{"target":1968},{"sys":1969},{"id":1970,"type":1377,"linkType":1378},"TD3YeWqgGIWIWM8FRHU4o",[],{"nodeType":1294,"data":1973,"content":1974},{},[1975],{"nodeType":1293,"value":1976,"marks":1977,"data":1978},"Interestingly, they differ in which resources they accessed, with one accessing the Windows Azure Active Directory resource ID like the interactive login, but two others accessing the Microsoft Intune Checkin resource ID. ",[],{},{"nodeType":1372,"data":1980,"content":1984},{"target":1981},{"sys":1982},{"id":1983,"type":1377,"linkType":1378},"57PqDQiAiwzqkspVpROQXb",[],{"nodeType":1986,"data":1987,"content":1988},"heading-2",{},[1989],{"nodeType":1293,"value":1990,"marks":1991,"data":1993},"IoCs",[1992],{"type":1329},{},{"nodeType":1294,"data":1995,"content":1996},{},[1997,2001,2010],{"nodeType":1293,"value":1998,"marks":1999,"data":2000},"Short-lived IoCs are of limited value when tackling modern phishing attacks due to the rate at which attackers are able to ",[],{},{"nodeType":1426,"data":2002,"content":2004},{"uri":2003},"https://phishing-techniques.pushsecurity.com/techniques/domain-rotation-redirection/",[2005],{"nodeType":1293,"value":2006,"marks":2007,"data":2009},"quickly spin up and rotate the sites used",[2008],{"type":1434},{},{"nodeType":1293,"value":2011,"marks":2012,"data":2013}," in the attack chain, often dynamically serving different URLs to site visitors. ",[],{},{"nodeType":1294,"data":2015,"content":2016},{},[2017],{"nodeType":1293,"value":2018,"marks":2019,"data":2020},"That said, the domains used to deliver the final phishing payload were:",[],{},{"nodeType":1474,"data":2022,"content":2023},{},[2024,2034,2044],{"nodeType":1478,"data":2025,"content":2026},{},[2027],{"nodeType":1294,"data":2028,"content":2029},{},[2030],{"nodeType":1293,"value":2031,"marks":2032,"data":2033},"hxxps://trustpointassurance.com/",[],{},{"nodeType":1478,"data":2035,"content":2036},{},[2037],{"nodeType":1294,"data":2038,"content":2039},{},[2040],{"nodeType":1293,"value":2041,"marks":2042,"data":2043},"hxxps://fastwaycheck.com/",[],{},{"nodeType":1478,"data":2045,"content":2046},{},[2047],{"nodeType":1294,"data":2048,"content":2049},{},[2050],{"nodeType":1293,"value":2051,"marks":2052,"data":2053},"hxxps://previewcentral.com",[],{},{"nodeType":1294,"data":2055,"content":2056},{},[2057],{"nodeType":1293,"value":2058,"marks":2059,"data":2060},"In addition, we recommend hunting for connections from the following IPs in Azure logs:",[],{},{"nodeType":1474,"data":2062,"content":2063},{},[2064,2074,2084],{"nodeType":1478,"data":2065,"content":2066},{},[2067],{"nodeType":1294,"data":2068,"content":2069},{},[2070],{"nodeType":1293,"value":2071,"marks":2072,"data":2073},"12.75.216.90",[],{},{"nodeType":1478,"data":2075,"content":2076},{},[2077],{"nodeType":1294,"data":2078,"content":2079},{},[2080],{"nodeType":1293,"value":2081,"marks":2082,"data":2083},"182.3.36.223",[],{},{"nodeType":1478,"data":2085,"content":2086},{},[2087],{"nodeType":1294,"data":2088,"content":2089},{},[2090],{"nodeType":1293,"value":2091,"marks":2092,"data":2093},"12.75.116.137",[],{},{"nodeType":1387,"data":2095,"content":2096},{},[],{"nodeType":1322,"data":2098,"content":2099},{},[2100],{"nodeType":1293,"value":2101,"marks":2102,"data":2104},"How Push stopped the attack",[2103],{"type":1329},{},{"nodeType":1294,"data":2106,"content":2107},{},[2108],{"nodeType":1293,"value":2109,"marks":2110,"data":2111},"Even though this was a brand new technique, Push intercepted this attack and shut it down before customers could interact with it. ",[],{},{"nodeType":1372,"data":2113,"content":2117},{"target":2114},{"sys":2115},{"id":2116,"type":1377,"linkType":1378},"5YzpiQH974EYA5iPPZMXkV",[],{"nodeType":1294,"data":2119,"content":2120},{},[2121,2125,2133],{"nodeType":1293,"value":2122,"marks":2123,"data":2124},"Push doesn’t detect the redirect tricks or rely on outdated domain TI feeds. The reason we detect these attacks (which make it through all the other layers of phishing protection) is that Push sees what your users see. It doesn’t matter what ",[],{},{"nodeType":1426,"data":2126,"content":2127},{"uri":1737},[2128],{"nodeType":1293,"value":2129,"marks":2130,"data":2132},"delivery channel or camouflage methods are used",[2131],{"type":1434},{},{"nodeType":1293,"value":2134,"marks":2135,"data":2136},", Push shuts the attack down in real time, as the user loads the malicious page in their web browser.",[],{},{"nodeType":1294,"data":2138,"content":2139},{},[2140],{"nodeType":1293,"value":2141,"marks":2142,"data":2143},"This isn’t all we do: Push’s browser-based security platform provides comprehensive detection and response capabilities against the leading cause of breaches. Push blocks browser-based attacks like AiTM phishing, credential stuffing, malicious browser extensions, ClickFix, and session hijacking. You don’t need to wait until it all goes wrong — you can also use Push to proactively find and fix vulnerabilities across the apps that your employees use, like ghost logins, SSO coverage gaps, MFA gaps, vulnerable passwords, and more to harden your identity attack surface.",[],{},{"nodeType":1294,"data":2145,"content":2146},{},[2147,2151,2160,2164,2173],{"nodeType":1293,"value":2148,"marks":2149,"data":2150},"To learn more about Push, ",[],{},{"nodeType":1426,"data":2152,"content":2154},{"uri":2153},"https://pushsecurity.com/resources/product-brochure",[2155],{"nodeType":1293,"value":2156,"marks":2157,"data":2159},"check out our latest product overview",[2158],{"type":1434},{},{"nodeType":1293,"value":2161,"marks":2162,"data":2163}," or ",[],{},{"nodeType":1426,"data":2165,"content":2167},{"uri":2166},"https://pushsecurity.com/demo",[2168],{"nodeType":1293,"value":2169,"marks":2170,"data":2172},"book some time with one of our team for a live demo",[2171],{"type":1434},{},{"nodeType":1293,"value":1605,"marks":2174,"data":2175},[],{},{"nodeType":1372,"data":2177,"content":2181},{"target":2178},{"sys":2179},{"id":2180,"type":1377,"linkType":1378},"6QzB0BlVC5mstXwXHvy2c3",[],{"nodeType":1294,"data":2183,"content":2184},{},[2185],{"nodeType":1293,"value":37,"marks":2186,"data":2187},[],{},"ConsentFix: Analysing a browser-native ClickFix-style attack that hijacks OAuth consent grants","Analysing \"ConsentFix\", a new browser-native attack technique we've detected in the wild, combining OAuth consent phishing with a ClickFix-style user prompt. ","2025-12-11T00:00:00.000Z","consentfix",{"items":2193},[2194,2196],{"sys":2195,"name":1310},{"id":1309},{"sys":2197,"name":1306},{"id":1305},{"items":2199},[2200],{"fullName":2201,"firstName":2202,"jobTitle":2203,"profilePicture":2204},"Luke Jennings","Luke","Vice President, R&D",{"url":2205},"https://images.ctfassets.net/y1cdw1ablpvd/4Hosb4zKi1dA0PUyDLMe1h/27e09d894861f2196ba794037986fb08/T016S22KZ96-U02NVQM7ZD4-57761d542d83-512.jpeg",{"__typename":1314,"sys":2207,"content":2209,"title":2812,"synopsis":2813,"hashTags":118,"publishedDate":2814,"slug":2815,"tagsCollection":2816,"authorsCollection":2822},{"id":2208},"2YmiesBvJHGw4wiKEKzLUq",{"json":2210},{"nodeType":1295,"data":2211,"content":2212},{},[2213,2220,2227,2276,2282,2289,2296,2302,2308,2314,2317,2325,2332,2338,2345,2351,2357,2364,2370,2388,2391,2399,2406,2413,2420,2427,2433,2451,2454,2462,2469,2527,2534,2541,2544,2551,2558,2565,2572,2598,2601,2608,2624,2631,2674,2681,2724,2731,2804],{"nodeType":1294,"data":2214,"content":2215},{},[2216],{"nodeType":1293,"value":2217,"marks":2218,"data":2219},"In recent months, we’ve seen a significant increase in the number of attacks targeting ad manager accounts. These attacks ultimately serve up an Attacker-in-the-Middle (AITM) phishing page designed to steal the victim’s Google account. ",[],{},{"nodeType":1294,"data":2221,"content":2222},{},[2223],{"nodeType":1293,"value":2224,"marks":2225,"data":2226},"Most recently, we reported on:",[],{},{"nodeType":1474,"data":2228,"content":2229},{},[2230,2253],{"nodeType":1478,"data":2231,"content":2232},{},[2233],{"nodeType":1294,"data":2234,"content":2235},{},[2236,2240,2249],{"nodeType":1293,"value":2237,"marks":2238,"data":2239},"A campaign running ",[],{},{"nodeType":1426,"data":2241,"content":2243},{"uri":2242},"https://pushsecurity.com/blog/analysing-a-malvertising-attack-targeting-business-google-accounts/",[2244],{"nodeType":1293,"value":2245,"marks":2246,"data":2248},"fake malvertising ads for “Google Ads”",[2247],{"type":1434},{},{"nodeType":1293,"value":2250,"marks":2251,"data":2252}," in Google Search. ",[],{},{"nodeType":1478,"data":2254,"content":2255},{},[2256],{"nodeType":1294,"data":2257,"content":2258},{},[2259,2263,2272],{"nodeType":1293,"value":2260,"marks":2261,"data":2262},"A campaign using sophisticated ",[],{},{"nodeType":1426,"data":2264,"content":2266},{"uri":2265},"https://pushsecurity.com/blog/uncovering-a-calendly-themed-phishing-campaign/",[2267],{"nodeType":1293,"value":2268,"marks":2269,"data":2271},"Calendly-themed phishing lures",[2270],{"type":1434},{},{"nodeType":1293,"value":2273,"marks":2274,"data":2275}," targeting marketing professionals.",[],{},{"nodeType":1372,"data":2277,"content":2281},{"target":2278},{"sys":2279},{"id":2280,"type":1377,"linkType":1378},"1ThnhFZQIhzV179qclvzFH",[],{"nodeType":1294,"data":2283,"content":2284},{},[2285],{"nodeType":1293,"value":2286,"marks":2287,"data":2288},"Now, we’ve seen the Google Ads malvertising campaign expand to run additional ads impersonating Ahrefs, an AI marketing platform. Crucially, employees with access to Ahrefs are highly likely to also have access to Google Ads, meaning that attackers can reliably target Google accounts via Ahrefs. ",[],{},{"nodeType":1294,"data":2290,"content":2291},{},[2292],{"nodeType":1293,"value":2293,"marks":2294,"data":2295},"You can see a demo of the phishing chain below. ",[],{},{"nodeType":1372,"data":2297,"content":2301},{"target":2298},{"sys":2299},{"id":2300,"type":1377,"linkType":1378},"2XjyySGldgl9uPA7CZRms8",[],{"nodeType":1372,"data":2303,"content":2307},{"target":2304},{"sys":2305},{"id":2306,"type":1377,"linkType":1378},"yB12nGF91iq15GoHWItaX",[],{"nodeType":1372,"data":2309,"content":2313},{"target":2310},{"sys":2311},{"id":2312,"type":1377,"linkType":1378},"2NK29DaTd93kOctyWxV0RT",[],{"nodeType":1387,"data":2315,"content":2316},{},[],{"nodeType":1322,"data":2318,"content":2319},{},[2320],{"nodeType":1293,"value":2321,"marks":2322,"data":2324},"Attack breakdown",[2323],{"type":1329},{},{"nodeType":1294,"data":2326,"content":2327},{},[2328],{"nodeType":1293,"value":2329,"marks":2330,"data":2331},"Users searching for “ahrefs” on Google Search were served with a fake ad impersonating Ahrefs, hosted on Squarespace, a legitimate website building and hosting platform. Previously, we’d seen this campaign use hosting sites Odoo and Kartra to similar effect. ",[],{},{"nodeType":1372,"data":2333,"content":2337},{"target":2334},{"sys":2335},{"id":2336,"type":1377,"linkType":1378},"59dhFey5rahm5sA20NudTl",[],{"nodeType":1294,"data":2339,"content":2340},{},[2341],{"nodeType":1293,"value":2342,"marks":2343,"data":2344},"Upon clicking the link, the victim was taken to a clone of the real Ahrefs site. Crucially, you can see that the domain is not the official Ahrefs domain. ",[],{},{"nodeType":1372,"data":2346,"content":2350},{"target":2347},{"sys":2348},{"id":2349,"type":1377,"linkType":1378},"48fQUiJXC1qACKUUPDliS5",[],{"nodeType":1372,"data":2352,"content":2356},{"target":2353},{"sys":2354},{"id":2355,"type":1377,"linkType":1378},"77iqOW1jDVt5Oxw8qTwnKG",[],{"nodeType":1294,"data":2358,"content":2359},{},[2360],{"nodeType":1293,"value":2361,"marks":2362,"data":2363},"However, the site is not fully interactable beyond the front page. Clicking on any link takes the user to a Google sign-in page. ",[],{},{"nodeType":1372,"data":2365,"content":2369},{"target":2366},{"sys":2367},{"id":2368,"type":1377,"linkType":1378},"7t9BoUyIFN8dlBDksjsYlD",[],{"nodeType":1294,"data":2371,"content":2372},{},[2373,2377,2384],{"nodeType":1293,"value":2374,"marks":2375,"data":2376},"This is in fact an AITM phishing page that is designed to hijack the victim’s Google account. Entering credentials and completing the MFA check will result in the attacker stealing the app session and effectively taking over the account. The phishing kit used matches ",[],{},{"nodeType":1426,"data":2378,"content":2379},{"uri":2242},[2380],{"nodeType":1293,"value":2381,"marks":2382,"data":2383},"the previous malvertising detected impersonating Google Ads",[],{},{"nodeType":1293,"value":2385,"marks":2386,"data":2387},". ",[],{},{"nodeType":1387,"data":2389,"content":2390},{},[],{"nodeType":1322,"data":2392,"content":2393},{},[2394],{"nodeType":1293,"value":2395,"marks":2396,"data":2398},"Why are attackers targeting ad manager accounts?",[2397],{"type":1329},{},{"nodeType":1294,"data":2400,"content":2401},{},[2402],{"nodeType":1293,"value":2403,"marks":2404,"data":2405},"Ad Manager accounts on platforms like Google, Facebook, and LinkedIn have become lucrative targets for cybercriminals. By compromising these accounts, attackers can exploit the digital advertising ecosystem in various ways for financial gain. ",[],{},{"nodeType":1294,"data":2407,"content":2408},{},[2409],{"nodeType":1293,"value":2410,"marks":2411,"data":2412},"The ad industry’s scale makes it attractive to fraud. Estimates suggest digital ad fraud cost advertisers tens of billions, potentially nearing $100 billion or more, with projections reaching $172 billion by 2028.",[],{},{"nodeType":1294,"data":2414,"content":2415},{},[2416],{"nodeType":1293,"value":2417,"marks":2418,"data":2419},"A hijacked Google Ad Manager account gives attackers access to significant ad spend and account data which can be monetized illicitly. The tactics range from stealthy ad fraud to overt abuse like malicious ads or extortion schemes.",[],{},{"nodeType":1294,"data":2421,"content":2422},{},[2423],{"nodeType":1293,"value":2424,"marks":2425,"data":2426},"Pretty much every enterprise today advertises their services via Google ads — this makes attacks on these accounts pretty much a unanimous problem. Agencies managing numerous client accounts are put further at risk. For example, if an attacker can compromise an MCC account (used to manage several ad accounts) they get full access to the customer portfolio. ",[],{},{"nodeType":1372,"data":2428,"content":2432},{"target":2429},{"sys":2430},{"id":2431,"type":1377,"linkType":1378},"1WPbstxHtdjnAKpF1rhCpW",[],{"nodeType":1294,"data":2434,"content":2435},{},[2436,2440,2448],{"nodeType":1293,"value":2437,"marks":2438,"data":2439},"Learn more about why attackers are targeting ad manager accounts ",[],{},{"nodeType":1426,"data":2441,"content":2443},{"uri":2442},"https://pushsecurity.com/blog/cyber-criminal-ecosystem-analysis",[2444],{"nodeType":1293,"value":2445,"marks":2446,"data":2447},"in our blog post",[],{},{"nodeType":1293,"value":2385,"marks":2449,"data":2450},[],{},{"nodeType":1387,"data":2452,"content":2453},{},[],{"nodeType":1322,"data":2455,"content":2456},{},[2457],{"nodeType":1293,"value":2458,"marks":2459,"data":2461},"Why malvertising? ",[2460],{"type":1329},{},{"nodeType":1294,"data":2463,"content":2464},{},[2465],{"nodeType":1293,"value":2466,"marks":2467,"data":2468},"Malvertising scams happen across lots of different sites, but the most common platform we see targeted is Google Search. This takes advantage of users browsing to find a website and clicking the first link that appears — in this case a fake sponsored link taking you to the attacker’s page. ",[],{},{"nodeType":1294,"data":2470,"content":2471},{},[2472,2476,2484,2488,2497,2501,2510,2514,2523],{"nodeType":1293,"value":2473,"marks":2474,"data":2475},"Malvertising attacks delivered over channels like Google Search are a great way to catch victims unawares while also evading typically email-based anti-phishing controls. Malvertising is an increasingly popular attack vector for the delivery of AITM phishing, malware downloads, and ",[],{},{"nodeType":1426,"data":2477,"content":2478},{"uri":1597},[2479],{"nodeType":1293,"value":2480,"marks":2481,"data":2483},"ClickFix",[2482],{"type":1434},{},{"nodeType":1293,"value":2485,"marks":2486,"data":2487}," (4 in 5 ClickFix attacks intercepted by Push were delivered via Google Search). This isn’t just targeting ad manager accounts — last year, we reported on campaigns impersonating ",[],{},{"nodeType":1426,"data":2489,"content":2491},{"uri":2490},"https://pushsecurity.com/blog/analysing-a-sophisticated-google-malvertising-attack/",[2492],{"nodeType":1293,"value":2493,"marks":2494,"data":2496},"TradingView",[2495],{"type":1434},{},{"nodeType":1293,"value":2498,"marks":2499,"data":2500},", ",[],{},{"nodeType":1426,"data":2502,"content":2504},{"uri":2503},"https://pushsecurity.com/blog/phishing-with-active-directory-federation-services/",[2505],{"nodeType":1293,"value":2506,"marks":2507,"data":2509},"Microsoft Office 365",[2508],{"type":1434},{},{"nodeType":1293,"value":2511,"marks":2512,"data":2513},", and ",[],{},{"nodeType":1426,"data":2515,"content":2517},{"uri":2516},"https://pushsecurity.com/blog/investigating-a-recent-malvertising-campaign-targeting-onfido-customers/",[2518],{"nodeType":1293,"value":2519,"marks":2520,"data":2522},"Onfido",[2521],{"type":1434},{},{"nodeType":1293,"value":2524,"marks":2525,"data":2526},", to name a few. ",[],{},{"nodeType":1294,"data":2528,"content":2529},{},[2530],{"nodeType":1293,"value":2531,"marks":2532,"data":2533},"There’s a tendency to see malvertising as a more random attack, but Google Ads can be tuned to searches coming from specific geographic locations, tailored to specific email domain matches, or specific device types (e.g. desktop, mobile, etc.). If you know where your target organization is located, you can tailor the ad to that location. Even more precise ad targeting can be achieved on social media platforms. ",[],{},{"nodeType":1294,"data":2535,"content":2536},{},[2537],{"nodeType":1293,"value":2538,"marks":2539,"data":2540},"Because these attacks completely circumvent the traditional phishing detection surface (email) and often happen entirely over the internet (meaning no endpoint security controls can come into play) the only way to reliably detect and stop these attacks is to intercept them where they happen — in the user’s web browser. ",[],{},{"nodeType":1387,"data":2542,"content":2543},{},[],{"nodeType":1322,"data":2545,"content":2546},{},[2547],{"nodeType":1293,"value":2101,"marks":2548,"data":2550},[2549],{"type":1329},{},{"nodeType":1294,"data":2552,"content":2553},{},[2554],{"nodeType":1293,"value":2555,"marks":2556,"data":2557},"Regardless of the delivery channel, all roads lead to a web page accessed in the victim’s browser, where Push is waiting to detect and block the attack. Even if the page has never been previously flagged as suspicious or malicious, Push analyses the page in real time and blocks it — protecting against the latest zero-day threats.  ",[],{},{"nodeType":1294,"data":2559,"content":2560},{},[2561],{"nodeType":1293,"value":2562,"marks":2563,"data":2564},"By seeing what your users see, and getting an unfiltered, real-time view of the page as it loads, Push is able to pinpoint malicious content, code, and behaviors and shut the attack down before it happens. Whether it's entering credentials onto a phishing page, approving a malicious OAuth grant, installing a risky browser extension, or insecurely accessing an app with a weak password and no MFA, Push detects the action and shuts it down.",[],{},{"nodeType":1294,"data":2566,"content":2567},{},[2568],{"nodeType":1293,"value":2569,"marks":2570,"data":2571},"Push blocks browser-based attacks like AiTM phishing, credential stuffing, malicious browser extensions, malicious OAuth grants, ClickFix, and session hijacking. You don’t need to wait until it all goes wrong either — you can use Push to proactively find and fix vulnerabilities across the apps that your employees use, like ghost logins, SSO coverage gaps, MFA gaps, vulnerable passwords, and more to harden your identity attack surface.",[],{},{"nodeType":1294,"data":2573,"content":2574},{},[2575,2578,2585,2588,2595],{"nodeType":1293,"value":2148,"marks":2576,"data":2577},[],{},{"nodeType":1426,"data":2579,"content":2580},{"uri":2153},[2581],{"nodeType":1293,"value":2156,"marks":2582,"data":2584},[2583],{"type":1434},{},{"nodeType":1293,"value":2161,"marks":2586,"data":2587},[],{},{"nodeType":1426,"data":2589,"content":2590},{"uri":2166},[2591],{"nodeType":1293,"value":2169,"marks":2592,"data":2594},[2593],{"type":1434},{},{"nodeType":1293,"value":1605,"marks":2596,"data":2597},[],{},{"nodeType":1387,"data":2599,"content":2600},{},[],{"nodeType":1322,"data":2602,"content":2603},{},[2604],{"nodeType":1293,"value":1990,"marks":2605,"data":2607},[2606],{"type":1329},{},{"nodeType":1294,"data":2609,"content":2610},{},[2611,2614,2621],{"nodeType":1293,"value":1998,"marks":2612,"data":2613},[],{},{"nodeType":1426,"data":2615,"content":2616},{"uri":2003},[2617],{"nodeType":1293,"value":2006,"marks":2618,"data":2620},[2619],{"type":1434},{},{"nodeType":1293,"value":2011,"marks":2622,"data":2623},[],{},{"nodeType":1294,"data":2625,"content":2626},{},[2627],{"nodeType":1293,"value":2628,"marks":2629,"data":2630},"That said, the domains observed in this chain were:",[],{},{"nodeType":1474,"data":2632,"content":2633},{},[2634,2644,2654,2664],{"nodeType":1478,"data":2635,"content":2636},{},[2637],{"nodeType":1294,"data":2638,"content":2639},{},[2640],{"nodeType":1293,"value":2641,"marks":2642,"data":2643},"comandd-ok[.]com",[],{},{"nodeType":1478,"data":2645,"content":2646},{},[2647],{"nodeType":1294,"data":2648,"content":2649},{},[2650],{"nodeType":1293,"value":2651,"marks":2652,"data":2653},"ahrefs-ac.squarespace[.]com",[],{},{"nodeType":1478,"data":2655,"content":2656},{},[2657],{"nodeType":1294,"data":2658,"content":2659},{},[2660],{"nodeType":1293,"value":2661,"marks":2662,"data":2663},"ahrefs-seo-app.squarespace[.]com",[],{},{"nodeType":1478,"data":2665,"content":2666},{},[2667],{"nodeType":1294,"data":2668,"content":2669},{},[2670],{"nodeType":1293,"value":2671,"marks":2672,"data":2673},"slgn-ahrefs-app-com.squarespace[.]com",[],{},{"nodeType":1294,"data":2675,"content":2676},{},[2677],{"nodeType":1293,"value":2678,"marks":2679,"data":2680},"[Update 24th February] We also observed the following new domains:",[],{},{"nodeType":1474,"data":2682,"content":2683},{},[2684,2694,2704,2714],{"nodeType":1478,"data":2685,"content":2686},{},[2687],{"nodeType":1294,"data":2688,"content":2689},{},[2690],{"nodeType":1293,"value":2691,"marks":2692,"data":2693},"www-ahrefs-seo-ads[.]surge.sh",[],{},{"nodeType":1478,"data":2695,"content":2696},{},[2697],{"nodeType":1294,"data":2698,"content":2699},{},[2700],{"nodeType":1293,"value":2701,"marks":2702,"data":2703},"web-semrush-seo-wold[.]surge[.]sh",[],{},{"nodeType":1478,"data":2705,"content":2706},{},[2707],{"nodeType":1294,"data":2708,"content":2709},{},[2710],{"nodeType":1293,"value":2711,"marks":2712,"data":2713},"contabelforeehc[.]com",[],{},{"nodeType":1478,"data":2715,"content":2716},{},[2717],{"nodeType":1294,"data":2718,"content":2719},{},[2720],{"nodeType":1293,"value":2721,"marks":2722,"data":2723},"contabelfore[.]com",[],{},{"nodeType":1294,"data":2725,"content":2726},{},[2727],{"nodeType":1293,"value":2728,"marks":2729,"data":2730},"In addition, the following domains were previously associated with the attacks we detected in December:",[],{},{"nodeType":1474,"data":2732,"content":2733},{},[2734,2744,2754,2764,2774,2784,2794],{"nodeType":1478,"data":2735,"content":2736},{},[2737],{"nodeType":1294,"data":2738,"content":2739},{},[2740],{"nodeType":1293,"value":2741,"marks":2742,"data":2743},"ads-adsword1.odoo[.]com",[],{},{"nodeType":1478,"data":2745,"content":2746},{},[2747],{"nodeType":1294,"data":2748,"content":2749},{},[2750],{"nodeType":1293,"value":2751,"marks":2752,"data":2753},"sing-operador2[.]click/accounts/v3/login",[],{},{"nodeType":1478,"data":2755,"content":2756},{},[2757],{"nodeType":1294,"data":2758,"content":2759},{},[2760],{"nodeType":1293,"value":2761,"marks":2762,"data":2763},"adsgooglie.odoo[.]com/",[],{},{"nodeType":1478,"data":2765,"content":2766},{},[2767],{"nodeType":1294,"data":2768,"content":2769},{},[2770],{"nodeType":1293,"value":2771,"marks":2772,"data":2773},"word4only[.]online/",[],{},{"nodeType":1478,"data":2775,"content":2776},{},[2777],{"nodeType":1294,"data":2778,"content":2779},{},[2780],{"nodeType":1293,"value":2781,"marks":2782,"data":2783},"adsloginacess.kartra[.]com/page/oeN7",[],{},{"nodeType":1478,"data":2785,"content":2786},{},[2787],{"nodeType":1294,"data":2788,"content":2789},{},[2790],{"nodeType":1293,"value":2791,"marks":2792,"data":2793},"ads-o.odoo[.]com",[],{},{"nodeType":1478,"data":2795,"content":2796},{},[2797],{"nodeType":1294,"data":2798,"content":2799},{},[2800],{"nodeType":1293,"value":2801,"marks":2802,"data":2803},"operador8-ads[.]lat/accounts/v3/login/",[],{},{"nodeType":1294,"data":2805,"content":2806},{},[2807],{"nodeType":1293,"value":2808,"marks":2809,"data":2811},"Push customers do not need to take any further action.",[2810],{"type":1329},{},"Google Search malvertising campaign continues, now impersonating Ahrefs","New samples linked to a Push-tracked malvertising campaign detected, targeting Google accounts via an Ahrefs lure. ","2026-01-12T00:00:00.000Z","google-search-malvertising-campaign-continues-now-impersonating-ahrefs",{"items":2817},[2818,2820],{"sys":2819,"name":1306},{"id":1305},{"sys":2821,"name":1310},{"id":1309},{"items":2823},[2824],{"fullName":2825,"firstName":2826,"jobTitle":2827,"profilePicture":2828},"Dan Green","Dan","Threat Research",{"url":2829},"https://images.ctfassets.net/y1cdw1ablpvd/7jik1VhFgA3kgzXBXTm2Vw/fcd8c171da644903d0827eafcfbcaad0/Dan_Headshot_2025.png",{"__typename":1314,"sys":2831,"content":2833,"title":4140,"synopsis":4141,"hashTags":118,"publishedDate":4142,"slug":4143,"tagsCollection":4144,"authorsCollection":4150},{"id":2832},"37KWV8V5L3aNZBSx6JMd0Z",{"json":2834},{"data":2835,"content":2836,"nodeType":1295},{},[2837,2844,2851,2916,2923,2992,2998,3005,3012,3015,3022,3029,3036,3140,3159,3166,3208,3215,3222,3229,3262,3268,3300,3306,3313,3320,3353,3373,3376,3383,3389,3420,3427,3434,3441,3447,3454,3460,3475,3518,3524,3544,3547,3554,3560,3580,3587,3620,3641,3647,3668,3675,3682,3742,3749,3755,3770,3785,3806,3812,3833,3840,3843,3850,3856,3863,3870,3891,3897,3918,3924,3931,3964,3982,3985,3992,3998,4005,4026,4032,4047,4053,4060,4067,4086,4089,4096,4103,4110],{"data":2838,"content":2839,"nodeType":1294},{},[2840],{"data":2841,"marks":2842,"value":2843,"nodeType":1293},{},[],"Looking back over the year’s headlines and trending TTPs, it’s clear that 2025 was the year that browser-based account takeover techniques made the leap into the mainstream.",{"data":2845,"content":2846,"nodeType":1294},{},[2847],{"data":2848,"marks":2849,"value":2850,"nodeType":1293},{},[],"A few stats tell the story …",{"data":2852,"content":2853,"nodeType":1474},{},[2854,2876,2895],{"data":2855,"content":2856,"nodeType":1478},{},[2857],{"data":2858,"content":2859,"nodeType":1294},{},[2860,2864,2872],{"data":2861,"marks":2862,"value":2863,"nodeType":1293},{},[],"Identity-based attacks surged by 32% over the last year, and 97% of identity attacks were password-based, driven by a combination of credential leaks and infostealer malware. (",{"data":2865,"content":2867,"nodeType":1426},{"uri":2866},"https://cdn-dynmedia-1.microsoft.com/is/content/microsoftcorp/microsoft/msc/documents/presentations/CSR/Microsoft-Digital-Defense-Report-2025.pdf#page=1",[2868],{"data":2869,"marks":2870,"value":2871,"nodeType":1293},{},[],"Microsoft",{"data":2873,"marks":2874,"value":2875,"nodeType":1293},{},[],")",{"data":2877,"content":2878,"nodeType":1478},{},[2879],{"data":2880,"content":2881,"nodeType":1294},{},[2882,2886,2892],{"data":2883,"marks":2884,"value":2885,"nodeType":1293},{},[],"ClickFix was the most common initial point of access for adversaries in the past year, accounting for a whopping 47% of observed attacks. (",{"data":2887,"content":2888,"nodeType":1426},{"uri":2866},[2889],{"data":2890,"marks":2891,"value":2871,"nodeType":1293},{},[],{"data":2893,"marks":2894,"value":2875,"nodeType":1293},{},[],{"data":2896,"content":2897,"nodeType":1478},{},[2898],{"data":2899,"content":2900,"nodeType":1294},{},[2901,2905,2913],{"data":2902,"marks":2903,"value":2904,"nodeType":1293},{},[],"Pure malware-based attacks declined, as adversaries continued to shift from targeting endpoints to corporate identities. In the last year-plus, 79% of detections were malware-free, up from 40% in 2019. And abuse of valid accounts was responsible for more than one-third of all cloud-related incidents. (",{"data":2906,"content":2908,"nodeType":1426},{"uri":2907},"https://www.crowdstrike.com/en-gb/global-threat-report/",[2909],{"data":2910,"marks":2911,"value":2912,"nodeType":1293},{},[],"Crowdstrike",{"data":2914,"marks":2915,"value":2875,"nodeType":1293},{},[],{"data":2917,"content":2918,"nodeType":1294},{},[2919],{"data":2920,"marks":2921,"value":2922,"nodeType":1293},{},[],"… and so do the headlines from 2025:",{"data":2924,"content":2925,"nodeType":1474},{},[2926,2945,2973],{"data":2927,"content":2928,"nodeType":1478},{},[2929],{"data":2930,"content":2931,"nodeType":1294},{},[2932,2936,2941],{"data":2933,"marks":2934,"value":2935,"nodeType":1293},{},[],"Attackers stole over ",{"data":2937,"marks":2938,"value":2940,"nodeType":1293},{},[2939],{"type":1329},"1.5 billion records",{"data":2942,"marks":2943,"value":2944,"nodeType":1293},{},[]," from an estimated 1,000+ Salesforce tenants by exploiting integrations (Salesloft, Gainsight), phishing credentials, and by tricking users into installing a malicious OAuth app.",{"data":2946,"content":2947,"nodeType":1478},{},[2948],{"data":2949,"content":2950,"nodeType":1294},{},[2951,2955,2960,2964,2969],{"data":2952,"marks":2953,"value":2954,"nodeType":1293},{},[],"Marks & Spencer was hit with a help desk scam that led to a compromised Microsoft Entra account, followed by a ransomware deployment resulting in months of disruption, ",{"data":2956,"marks":2957,"value":2959,"nodeType":1293},{},[2958],{"type":1329},"$400M",{"data":2961,"marks":2962,"value":2963,"nodeType":1293},{},[]," in lost profits, and around ",{"data":2965,"marks":2966,"value":2968,"nodeType":1293},{},[2967],{"type":1329},"$1.3B",{"data":2970,"marks":2971,"value":2972,"nodeType":1293},{},[]," wiped off their stock market valuation at one stage.",{"data":2974,"content":2975,"nodeType":1478},{},[2976],{"data":2977,"content":2978,"nodeType":1294},{},[2979,2983,2988],{"data":2980,"marks":2981,"value":2982,"nodeType":1293},{},[],"Jaguar Land Rover was compromised via highly privileged admin accounts — another help desk scam targeting workforce credentials for initial access — resulting in months of disruption that led the UK government to underwrite a ",{"data":2984,"marks":2985,"value":2987,"nodeType":1293},{},[2986],{"type":1329},"$1.5B",{"data":2989,"marks":2990,"value":2991,"nodeType":1293},{},[]," loan to alleviate the supply chain impact. This was the most economically consequential cyber attack yet recorded in a G7 economy.",{"data":2993,"content":2997,"nodeType":1372},{"target":2994},{"sys":2995},{"id":2996,"type":1377,"linkType":1378},"v5YYnjP2NViOh6Ucxp2Fe",[],{"data":2999,"content":3000,"nodeType":1294},{},[3001],{"data":3002,"marks":3003,"value":3004,"nodeType":1293},{},[],"At Push, we’ve been closely tracking the evolution of browser-based attacks. Looking back at 2025, we’ve seen a notable increase in the sophistication and frequency of modern attack techniques methods like ClickFix, commodified phish kits that bypass MFA, malicious browser extensions, and many more. (Writing phish kit teardowns for the Push blog is practically a full-time job now.)",{"data":3006,"content":3007,"nodeType":1294},{},[3008],{"data":3009,"marks":3010,"value":3011,"nodeType":1293},{},[],"In this article, we’ll take a look at how real-world attacks and our own research drove the features we delivered for Push customers this year to take the fight to adversaries.",{"data":3013,"content":3014,"nodeType":1387},{},[],{"data":3016,"content":3017,"nodeType":1322},{},[3018],{"data":3019,"marks":3020,"value":3021,"nodeType":1293},{},[],"Detecting and blocking increasingly sophisticated phishing-as-a-service tools",{"data":3023,"content":3024,"nodeType":1986},{},[3025],{"data":3026,"marks":3027,"value":3028,"nodeType":1293},{},[],"What happened",{"data":3030,"content":3031,"nodeType":1294},{},[3032],{"data":3033,"marks":3034,"value":3035,"nodeType":1293},{},[],"The current state of the art for phishing centers on three core developments:",{"data":3037,"content":3038,"nodeType":1474},{},[3039,3069,3111],{"data":3040,"content":3041,"nodeType":1478},{},[3042],{"data":3043,"content":3044,"nodeType":1294},{},[3045,3050,3054,3065],{"data":3046,"marks":3047,"value":3049,"nodeType":1293},{},[3048],{"type":1329},"Detection evasion: ",{"data":3051,"marks":3052,"value":3053,"nodeType":1293},{},[],"Adversaries demonstrated a ",{"data":3055,"content":3059,"nodeType":3064},{"target":3056},{"sys":3057},{"id":3058,"type":1377,"linkType":1378},"4XZ6qCr8pjJvcD7hi09x2Y",[3060],{"data":3061,"marks":3062,"value":3063,"nodeType":1293},{},[],"creative array of approaches","entry-hyperlink",{"data":3066,"marks":3067,"value":3068,"nodeType":1293},{},[]," this year to hide their intentions from end-users and defenders, using methods such as sending phishing emails from legitimate services; serving phishing pages via malvertising and SEO poisoning; and obfuscating URLs. More sophisticated techniques used page-level obfuscation, cross-domain iframes, single-use links, and legitimate OIDC logins to evade detection and analysis from traditional tools.",{"data":3070,"content":3071,"nodeType":1478},{},[3072],{"data":3073,"content":3074,"nodeType":1294},{},[3075,3080,3084,3093,3097,3107],{"data":3076,"marks":3077,"value":3079,"nodeType":1293},{},[3078],{"type":1329},"Multi-channel delivery of lures:",{"data":3081,"marks":3082,"value":3083,"nodeType":1293},{},[]," Adversaries proved the truism of “phishing doesn’t just happen in the mailbox” this year by increasing their observed use of ",{"data":3085,"content":3089,"nodeType":3064},{"target":3086},{"sys":3087},{"id":3088,"type":1377,"linkType":1378},"72lLmy0CXnOp3LWOdcUguX",[3090],{"data":3091,"marks":3092,"value":1626,"nodeType":1293},{},[],{"data":3094,"marks":3095,"value":3096,"nodeType":1293},{},[]," and SEO poisoning — techniques that place malicious pages within trusted contexts like the Google search engine results page — as well as the use of social media services like LinkedIn to ",{"data":3098,"content":3102,"nodeType":3064},{"target":3099},{"sys":3100},{"id":3101,"type":1377,"linkType":1378},"2yEhB2gFC2TJDLquVP3cg2",[3103],{"data":3104,"marks":3105,"value":3106,"nodeType":1293},{},[],"deliver phishing lures",{"data":3108,"marks":3109,"value":3110,"nodeType":1293},{},[],". ",{"data":3112,"content":3113,"nodeType":1478},{},[3114],{"data":3115,"content":3116,"nodeType":1294},{},[3117,3122,3126,3136],{"data":3118,"marks":3119,"value":3121,"nodeType":1293},{},[3120],{"type":1329},"Commodification of phishing toolkits:",{"data":3123,"marks":3124,"value":3125,"nodeType":1293},{},[]," Phishing-as-a-service (PhaaS) kits have become another SaaS with their own supply chain, including developers of malicious tooling, operators who run the campaigns, and brokers who sell stolen credentials and tokens. The incentives for attackers are clear: quick ROI from targeting workforce identities, and out-of-the-box tools that make it easier to efficiently spin up new campaigns or try new techniques. As with any SaaS offering, the customer (attackers, in this case) benefits from rapid innovations they didn’t have to build. We saw this recently with the ",{"data":3127,"content":3131,"nodeType":3064},{"target":3128},{"sys":3129},{"id":3130,"type":1377,"linkType":1378},"6QLonRmBzbj9h88Y7jD0LU",[3132],{"data":3133,"marks":3134,"value":3135,"nodeType":1293},{},[],"addition of a browser-in-the-browser (BitB) technique",{"data":3137,"marks":3138,"value":3139,"nodeType":1293},{},[]," to the phish kit Sneaky2FA — a change that makes it even more effective.",{"data":3141,"content":3142,"nodeType":1294},{},[3143,3147,3155],{"data":3144,"marks":3145,"value":3146,"nodeType":1293},{},[],"In 2025, Push researchers tracked how each of these developments expanded in scope and sophistication. Check out our ",{"data":3148,"content":3150,"nodeType":1426},{"uri":3149},"https://pushsecurity.github.io/phishing-techniques/",[3151],{"data":3152,"marks":3153,"value":3154,"nodeType":1293},{},[],"phishing detection evasion techniques matrix",{"data":3156,"marks":3157,"value":3158,"nodeType":1293},{},[]," on Github for more detail. ",{"data":3160,"content":3161,"nodeType":1294},{},[3162],{"data":3163,"marks":3164,"value":3165,"nodeType":1293},{},[],"The takeaways for security teams?",{"data":3167,"content":3168,"nodeType":1474},{},[3169,3179,3198],{"data":3170,"content":3171,"nodeType":1478},{},[3172],{"data":3173,"content":3174,"nodeType":1294},{},[3175],{"data":3176,"marks":3177,"value":3178,"nodeType":1293},{},[],"You can’t block your way to safety when adversaries are using the same legitimate apps that your employees use.",{"data":3180,"content":3181,"nodeType":1478},{},[3182],{"data":3183,"content":3184,"nodeType":1294},{},[3185,3189,3194],{"data":3186,"marks":3187,"value":3188,"nodeType":1293},{},[],"Similarly, while end-user training is important, it’s not reasonable to expect employees to know when a SharePoint document link is malicious when it looks identical to the ones they trust every day — because adversaries ",{"data":3190,"marks":3191,"value":3193,"nodeType":1293},{},[3192],{"type":312},"are using the legitimate service",{"data":3195,"marks":3196,"value":3197,"nodeType":1293},{},[],". Push researchers have observed the abuse of hundreds of legitimate services in phishing attacks this year.",{"data":3199,"content":3200,"nodeType":1478},{},[3201],{"data":3202,"content":3203,"nodeType":1294},{},[3204],{"data":3205,"marks":3206,"value":3207,"nodeType":1293},{},[],"Security solutions need to be able to analyze real-time context and behavior, not rely solely on inferences from secondary characteristics like domain reputation.",{"data":3209,"content":3210,"nodeType":1294},{},[3211],{"data":3212,"marks":3213,"value":3214,"nodeType":1293},{},[],"Here's what we built to help defend organizations.",{"data":3216,"content":3217,"nodeType":1986},{},[3218],{"data":3219,"marks":3220,"value":3221,"nodeType":1293},{},[],"What we built",{"data":3223,"content":3224,"nodeType":1294},{},[3225],{"data":3226,"marks":3227,"value":3228,"nodeType":1293},{},[],"The feature we built in 2025 that gave us unique insight into these TTPs is Push’s Detections capability. With Detections, you can:",{"data":3230,"content":3231,"nodeType":1474},{},[3232,3242,3252],{"data":3233,"content":3234,"nodeType":1478},{},[3235],{"data":3236,"content":3237,"nodeType":1294},{},[3238],{"data":3239,"marks":3240,"value":3241,"nodeType":1293},{},[],"Get alerted when Push detects a browser-based attack, and see how the Push agent responded to block the attack. The platform provides a front-end view for quick triage, and you can also pipe the detection events to your SIEM or other platform of choice.",{"data":3243,"content":3244,"nodeType":1478},{},[3245],{"data":3246,"content":3247,"nodeType":1294},{},[3248],{"data":3249,"marks":3250,"value":3251,"nodeType":1293},{},[],"Review a timeline of the incident: Where a phishing link originated; whether a user entered their credentials; what kind of phishkit was detected; and how Push responded (configurable based on your environment).",{"data":3253,"content":3254,"nodeType":1478},{},[3255],{"data":3256,"content":3257,"nodeType":1294},{},[3258],{"data":3259,"marks":3260,"value":3261,"nodeType":1293},{},[],"Get actionable telemetry and metadata about an incident, including a screenshot of the malicious page to see exactly what the user saw; intel about the involved domains, including when they were registered and if they’ve been scanned by urlscan before; and the blast radius of an attack, including other apps that shared a password with the potentially compromised account",{"data":3263,"content":3267,"nodeType":1372},{"target":3264},{"sys":3265},{"id":3266,"type":1377,"linkType":1378},"5dygPaG3Gfw4Yeicffv6tV",[],{"data":3269,"content":3270,"nodeType":1294},{},[3271,3275,3280,3283,3288,3291,3296],{"data":3272,"marks":3273,"value":3274,"nodeType":1293},{},[],"This telemetry — combined with Push’s out-of-the-box controls like ",{"data":3276,"marks":3277,"value":3279,"nodeType":1293},{},[3278],{"type":1329},"Phishing tool detection",{"data":3281,"marks":3282,"value":2498,"nodeType":1293},{},[],{"data":3284,"marks":3285,"value":3287,"nodeType":1293},{},[3286],{"type":1329},"Cloned login page detection",{"data":3289,"marks":3290,"value":2511,"nodeType":1293},{},[],{"data":3292,"marks":3293,"value":3295,"nodeType":1293},{},[3294],{"type":1329},"Malicious copy and paste detection",{"data":3297,"marks":3298,"value":3299,"nodeType":1293},{},[]," (aka ClickFix detection) — give you a seat on the user’s side of the equation, capturing real-time information about what users did and the TTPs of an attack so you can investigate and respond efficiently and confidently.",{"data":3301,"content":3305,"nodeType":1372},{"target":3302},{"sys":3303},{"id":3304,"type":1377,"linkType":1378},"563fJFSgoLDOwSXSQ9Y0MM",[],{"data":3307,"content":3308,"nodeType":1294},{},[3309],{"data":3310,"marks":3311,"value":3312,"nodeType":1293},{},[],"With the visibility provided by this telemetry across Push’s install base, our R&D and Product teams have rapidly iterated all year on our detections to increase coverage and respond quickly to newly identified attack types.",{"data":3314,"content":3315,"nodeType":1294},{},[3316],{"data":3317,"marks":3318,"value":3319,"nodeType":1293},{},[],"This year, we also released:",{"data":3321,"content":3322,"nodeType":1474},{},[3323,3333,3343],{"data":3324,"content":3325,"nodeType":1478},{},[3326],{"data":3327,"content":3328,"nodeType":1294},{},[3329],{"data":3330,"marks":3331,"value":3332,"nodeType":1293},{},[],"Detections for new variants of cloned login pages and AiTM phish kits.",{"data":3334,"content":3335,"nodeType":1478},{},[3336],{"data":3337,"content":3338,"nodeType":1294},{},[3339],{"data":3340,"marks":3341,"value":3342,"nodeType":1293},{},[],"12+ pre-release detections focused on flagging emerging attacker techniques.",{"data":3344,"content":3345,"nodeType":1478},{},[3346],{"data":3347,"content":3348,"nodeType":1294},{},[3349],{"data":3350,"marks":3351,"value":3352,"nodeType":1293},{},[],"7+ first-class SIEM and SOAR integrations, to make it simpler to ingest Push telemetry and operationalize it.",{"data":3354,"content":3355,"nodeType":1294},{},[3356,3360,3370],{"data":3357,"marks":3358,"value":3359,"nodeType":1293},{},[],"Learn more about Push’s detections features in our ",{"data":3361,"content":3365,"nodeType":3064},{"target":3362},{"sys":3363},{"id":3364,"type":1377,"linkType":1378},"6OFdfAsoPUECeRAetWvedp",[3366],{"data":3367,"marks":3368,"value":3369,"nodeType":1293},{},[],"blog article",{"data":3371,"marks":3372,"value":1605,"nodeType":1293},{},[],{"data":3374,"content":3375,"nodeType":1387},{},[],{"data":3377,"content":3378,"nodeType":1322},{},[3379],{"data":3380,"marks":3381,"value":3382,"nodeType":1293},{},[],"Detecting and blocking ClickFix-style malicious copy and paste attacks",{"data":3384,"content":3385,"nodeType":1986},{},[3386],{"data":3387,"marks":3388,"value":3028,"nodeType":1293},{},[],{"data":3390,"content":3391,"nodeType":1294},{},[3392,3396,3404,3408,3416],{"data":3393,"marks":3394,"value":3395,"nodeType":1293},{},[],"ClickFix-style attacks left their mark in 2025, quickly becoming one of the most prevalent attack techniques — with ",{"data":3397,"content":3399,"nodeType":1426},{"uri":3398},"https://www.scworld.com/news/clickfix-phishing-links-increased-nearly-400-in-12-months-report-says",[3400],{"data":3401,"marks":3402,"value":3403,"nodeType":1293},{},[],"estimates",{"data":3405,"marks":3406,"value":3407,"nodeType":1293},{},[]," of a 400 percent year-over-year increase, and another ",{"data":3409,"content":3411,"nodeType":1426},{"uri":3410},"https://web-assets.esetstatic.com/wls/en/papers/threat-reports/eset-threat-report-h12025.pdf",[3412],{"data":3413,"marks":3414,"value":3415,"nodeType":1293},{},[],"report",{"data":3417,"marks":3418,"value":3419,"nodeType":1293},{},[]," documenting a 517 percent growth in just the last 6 months of the year.",{"data":3421,"content":3422,"nodeType":1294},{},[3423],{"data":3424,"marks":3425,"value":3426,"nodeType":1293},{},[],"What is ClickFix? This attack technique prompts the user to solve some kind of problem or troubleshooting step in the browser — often presented as a CAPTCHA challenge. The key aspect of the attack is that it tricks users into running malicious commands on their device by copying malicious code from the page clipboard and running it locally. (The copy typically occurs  automatically via the page itself, but can also be performed manually by the user.)",{"data":3428,"content":3429,"nodeType":1294},{},[3430],{"data":3431,"marks":3432,"value":3433,"nodeType":1293},{},[],"These malicious copy and paste attacks are often used to deliver infostealer malware or remote access software, with the attacker’s end goal being stealing session cookies and credentials to facilitate attacks on business apps.",{"data":3435,"content":3436,"nodeType":1294},{},[3437],{"data":3438,"marks":3439,"value":3440,"nodeType":1293},{},[],"What’s especially challenging about this attack type is that it usually can only be detected after the fact — when a machine is already compromised, or malicious code attempts to execute (if EDR catches it). Even if it is detected, security teams are left flying blind when they try to determine the initial vector for the attack, and which other users might have been targeted.",{"data":3442,"content":3443,"nodeType":1986},{},[3444],{"data":3445,"marks":3446,"value":3221,"nodeType":1293},{},[],{"data":3448,"content":3449,"nodeType":1294},{},[3450],{"data":3451,"marks":3452,"value":3453,"nodeType":1293},{},[],"Because of our position in the browser, Push is uniquely positioned to detect and block browser-native attacks like ClickFix and other forms of malicious copy and paste techniques. So that’s what we built.",{"data":3455,"content":3459,"nodeType":1372},{"target":3456},{"sys":3457},{"id":3458,"type":1377,"linkType":1378},"56jVT7dbNqUGiSRTfTCQw2",[],{"data":3461,"content":3462,"nodeType":1294},{},[3463,3467,3471],{"data":3464,"marks":3465,"value":3466,"nodeType":1293},{},[],"With our ",{"data":3468,"marks":3469,"value":3295,"nodeType":1293},{},[3470],{"type":1329},{"data":3472,"marks":3473,"value":3474,"nodeType":1293},{},[],", you can:",{"data":3476,"content":3477,"nodeType":1474},{},[3478,3488,3498,3508],{"data":3479,"content":3480,"nodeType":1478},{},[3481],{"data":3482,"content":3483,"nodeType":1294},{},[3484],{"data":3485,"marks":3486,"value":3487,"nodeType":1293},{},[],"Detect ClickFix-style attacks as soon as they target end-users, regardless of the delivery channel for the lure, or the specifics of the malware type and execution.",{"data":3489,"content":3490,"nodeType":1478},{},[3491],{"data":3492,"content":3493,"nodeType":1294},{},[3494],{"data":3495,"marks":3496,"value":3497,"nodeType":1293},{},[],"Block these attacks before the malicious code is copied to the clipboard.",{"data":3499,"content":3500,"nodeType":1478},{},[3501],{"data":3502,"content":3503,"nodeType":1294},{},[3504],{"data":3505,"marks":3506,"value":3507,"nodeType":1293},{},[],"Safely collect the payload for further investigation by your security team, and replace the clipboard contents with safe text as part of the blocking action.",{"data":3509,"content":3510,"nodeType":1478},{},[3511],{"data":3512,"content":3513,"nodeType":1294},{},[3514],{"data":3515,"marks":3516,"value":3517,"nodeType":1293},{},[],"Capture a detailed timeline of events to see how users were targeted and how the attack unfolded.",{"data":3519,"content":3523,"nodeType":1372},{"target":3520},{"sys":3521},{"id":3522,"type":1377,"linkType":1378},"sALkMt8UbTZ2f34hKvGLj",[],{"data":3525,"content":3526,"nodeType":1294},{},[3527,3531,3541],{"data":3528,"marks":3529,"value":3530,"nodeType":1293},{},[],"Learn more about ClickFix detection in our ",{"data":3532,"content":3536,"nodeType":3064},{"target":3533},{"sys":3534},{"id":3535,"type":1377,"linkType":1378},"7jygmadjoz0asAHv7e5PuK",[3537],{"data":3538,"marks":3539,"value":3540,"nodeType":1293},{},[],"documentation",{"data":3542,"marks":3543,"value":1605,"nodeType":1293},{},[],{"data":3545,"content":3546,"nodeType":1387},{},[],{"data":3548,"content":3549,"nodeType":1322},{},[3550],{"data":3551,"marks":3552,"value":3553,"nodeType":1293},{},[],"Getting ahead of breaches tied to stolen credentials and ghost logins",{"data":3555,"content":3556,"nodeType":1986},{},[3557],{"data":3558,"marks":3559,"value":3028,"nodeType":1293},{},[],{"data":3561,"content":3562,"nodeType":1294},{},[3563,3567,3577],{"data":3564,"marks":3565,"value":3566,"nodeType":1293},{},[],"Starting in November 2024 and continuing through July 2025, adversaries linked to the HELLCAT threat group compromised Jira tenants belonging to 10 organizations using ",{"data":3568,"content":3572,"nodeType":3064},{"target":3569},{"sys":3570},{"id":3571,"type":1377,"linkType":1378},"gANCbeL9AnxmbGAE5HhyG",[3573],{"data":3574,"marks":3575,"value":3576,"nodeType":1293},{},[],"stolen credentials",{"data":3578,"marks":3579,"value":3110,"nodeType":1293},{},[],{"data":3581,"content":3582,"nodeType":1294},{},[3583],{"data":3584,"marks":3585,"value":3586,"nodeType":1293},{},[],"Business-critical applications like Jira are prime targets for attackers, who in this case dumped valuable data and then held it for ransom (or sold it on criminal marketplaces). Of course, this isn’t just a problem for Jira — data from Push’s initial deployment into customer environments shows that lots of critical apps lack basic controls like strong passwords and MFA.",{"data":3588,"content":3589,"nodeType":1294},{},[3590,3594,3604,3608,3616],{"data":3591,"marks":3592,"value":3593,"nodeType":1293},{},[],"The evolving threat group known as ",{"data":3595,"content":3599,"nodeType":3064},{"target":3596},{"sys":3597},{"id":3598,"type":1377,"linkType":1378},"2sFCww9xnI8okIxhtOaiY1",[3600],{"data":3601,"marks":3602,"value":3603,"nodeType":1293},{},[],"Scattered Lapsus$ Hunters",{"data":3605,"marks":3606,"value":3607,"nodeType":1293},{},[]," has also embraced the use of stolen creds, session cookies, and unprotected local account logins — aka ",{"data":3609,"content":3611,"nodeType":1426},{"uri":3610},"https://github.com/pushsecurity/saas-attacks/blob/main/techniques/ghost_logins/description.md",[3612],{"data":3613,"marks":3614,"value":3615,"nodeType":1293},{},[],"ghost logins",{"data":3617,"marks":3618,"value":3619,"nodeType":1293},{},[]," — to compromise large organizations.",{"data":3621,"content":3622,"nodeType":1294},{},[3623,3627,3637],{"data":3624,"marks":3625,"value":3626,"nodeType":1293},{},[],"In 2025, Red Hat’s GitLab instance was compromised due to a local account that essentially provided a backdoor to an otherwise secure and SSO-connected account — an attack reminiscent of the ",{"data":3628,"content":3632,"nodeType":3064},{"target":3629},{"sys":3630},{"id":3631,"type":1377,"linkType":1378},"PAPJPr3CIB6J20udYyy1r",[3633],{"data":3634,"marks":3635,"value":3636,"nodeType":1293},{},[],"2024 Snowflake breach",{"data":3638,"marks":3639,"value":3640,"nodeType":1293},{},[],", which targeted local logins that lacked MFA.",{"data":3642,"content":3643,"nodeType":1986},{},[3644],{"data":3645,"marks":3646,"value":3221,"nodeType":1293},{},[],{"data":3648,"content":3649,"nodeType":1294},{},[3650,3654,3664],{"data":3651,"marks":3652,"value":3653,"nodeType":1293},{},[],"Push already provided the ability to detect stolen credentials being actively used by employees in your organization with our ",{"data":3655,"content":3659,"nodeType":3064},{"target":3656},{"sys":3657},{"id":3658,"type":1377,"linkType":1378},"6vCr4d3R1XA1E8dU883l7N",[3660],{"data":3661,"marks":3662,"value":3663,"nodeType":1293},{},[],"Stolen credential detection control",{"data":3665,"marks":3666,"value":3667,"nodeType":1293},{},[],". This provides an early-warning signal when Push finds a match between credentials for sale on criminal forums with those still being used by your employees, reducing some 99.5% of false positives we usually see with TI feed data.",{"data":3669,"content":3670,"nodeType":1294},{},[3671],{"data":3672,"marks":3673,"value":3674,"nodeType":1293},{},[],"With Push, you can also identify where employees are logging in with passwords on apps that otherwise should be using SAML, OIDC, or some other federated mechanism — aka the ghost login vulnerability.",{"data":3676,"content":3677,"nodeType":1294},{},[3678],{"data":3679,"marks":3680,"value":3681,"nodeType":1293},{},[],"This year, we made it easier for security teams to enforce two security fundamentals that help harden accounts and reduce the risk of ATO, even on unmanaged apps:",{"data":3683,"content":3684,"nodeType":1474},{},[3685,3714],{"data":3686,"content":3687,"nodeType":1478},{},[3688],{"data":3689,"content":3690,"nodeType":1294},{},[3691,3696,3700,3710],{"data":3692,"marks":3693,"value":3695,"nodeType":1293},{},[3694],{"type":1329},"Strong password enforcement:",{"data":3697,"marks":3698,"value":3699,"nodeType":1293},{},[]," With this control, you can prompt end-users to ",{"data":3701,"content":3705,"nodeType":3064},{"target":3702},{"sys":3703},{"id":3704,"type":1377,"linkType":1378},"5aB5x5VXrMv7PDmH0iiK0c",[3706],{"data":3707,"marks":3708,"value":3709,"nodeType":1293},{},[],"fix an insecure password",{"data":3711,"marks":3712,"value":3713,"nodeType":1293},{},[]," on all your workforce apps, even the ones you don’t centrally manage. ",{"data":3715,"content":3716,"nodeType":1478},{},[3717],{"data":3718,"content":3719,"nodeType":1294},{},[3720,3725,3728,3738],{"data":3721,"marks":3722,"value":3724,"nodeType":1293},{},[3723],{"type":1329},"MFA enforcement:",{"data":3726,"marks":3727,"value":3699,"nodeType":1293},{},[],{"data":3729,"content":3733,"nodeType":3064},{"target":3730},{"sys":3731},{"id":3732,"type":1377,"linkType":1378},"wikyVxlHwKUOKM9xo19eP",[3734],{"data":3735,"marks":3736,"value":3737,"nodeType":1293},{},[],"register for MFA",{"data":3739,"marks":3740,"value":3741,"nodeType":1293},{},[]," where Push detects it’s missing — again, even on unmanaged apps.",{"data":3743,"content":3744,"nodeType":1294},{},[3745],{"data":3746,"marks":3747,"value":3748,"nodeType":1293},{},[],"Both of these controls use in-browser banners to provide point-in-time guidance to users when they’re most likely to see it and act on it.",{"data":3750,"content":3754,"nodeType":1372},{"target":3751},{"sys":3752},{"id":3753,"type":1377,"linkType":1378},"3XH0hnnhcZNI47PhdiD4q0",[],{"data":3756,"content":3757,"nodeType":1294},{},[3758,3762,3767],{"data":3759,"marks":3760,"value":3761,"nodeType":1293},{},[],"To address the pattern of adversaries moving from targeting hardened core apps such as identity providers to the likes of GitLab, Postman, Jira, and others containing valuable corporate data, we also expanded one of the Push platform’s core security controls called ",{"data":3763,"marks":3764,"value":3766,"nodeType":1293},{},[3765],{"type":1329},"Password protection",{"data":3768,"marks":3769,"value":1605,"nodeType":1293},{},[],{"data":3771,"content":3772,"nodeType":1294},{},[3773,3777,3781],{"data":3774,"marks":3775,"value":3776,"nodeType":1293},{},[],"The ",{"data":3778,"marks":3779,"value":3766,"nodeType":1293},{},[3780],{"type":1329},{"data":3782,"marks":3783,"value":3784,"nodeType":1293},{},[]," control previously could be applied only to IdP passwords, allowing you to essentially “pin” the credential for those systems so that it could never be entered on a phishing page or reused on any other app. ",{"data":3786,"content":3787,"nodeType":1294},{},[3788,3792,3802],{"data":3789,"marks":3790,"value":3791,"nodeType":1293},{},[],"We expanded that control to allow you to ",{"data":3793,"content":3797,"nodeType":3064},{"target":3794},{"sys":3795},{"id":3796,"type":1377,"linkType":1378},"6FYHbkcRUrtznPo7RarRsz",[3798],{"data":3799,"marks":3800,"value":3801,"nodeType":1293},{},[],"protect passwords on any valuable app",{"data":3803,"marks":3804,"value":3805,"nodeType":1293},{},[],", preventing account takeover through phished creds and reducing the blast radius of attacks when a compromised account has been reusing passwords on multiple applications.",{"data":3807,"content":3811,"nodeType":1372},{"target":3808},{"sys":3809},{"id":3810,"type":1377,"linkType":1378},"74l82HIeaumFX4u9AMjj79",[],{"data":3813,"content":3814,"nodeType":1294},{},[3815,3819,3829],{"data":3816,"marks":3817,"value":3818,"nodeType":1293},{},[],"Push also now gives you visibility into where employees are ",{"data":3820,"content":3824,"nodeType":3064},{"target":3821},{"sys":3822},{"id":3823,"type":1377,"linkType":1378},"7uLeQ9twNl5RyNaWkkJNjd",[3825],{"data":3826,"marks":3827,"value":3828,"nodeType":1293},{},[],"syncing their corporate browser profile",{"data":3830,"marks":3831,"value":3832,"nodeType":1293},{},[]," to a personal profile, raising the risk of syncing corporate passwords to unmanaged devices — another vector for credential harvesting if those endpoints become compromised.",{"data":3834,"content":3835,"nodeType":1294},{},[3836],{"data":3837,"marks":3838,"value":3839,"nodeType":1293},{},[],"And of course, underlying all these features is the foundational visibility of all your apps, accounts, account vulnerabilities, and login methods that Push provides.",{"data":3841,"content":3842,"nodeType":1387},{},[],{"data":3844,"content":3845,"nodeType":1322},{},[3846],{"data":3847,"marks":3848,"value":3849,"nodeType":1293},{},[],"Blocking malicious browser extensions",{"data":3851,"content":3852,"nodeType":1986},{},[3853],{"data":3854,"marks":3855,"value":3028,"nodeType":1293},{},[],{"data":3857,"content":3858,"nodeType":1294},{},[3859],{"data":3860,"marks":3861,"value":3862,"nodeType":1293},{},[],"Getting visibility and control over all the browser extensions used across your workforce has long been a thorny problem for security teams. ",{"data":3864,"content":3865,"nodeType":1294},{},[3866],{"data":3867,"marks":3868,"value":3869,"nodeType":1293},{},[],"The possible solutions haven’t been great, either. Teams could either apply a blunt-force block for most or all extensions, or spend painstaking time trying to understand what was installed, why, and by whom, across all the browsers in the environment.",{"data":3871,"content":3872,"nodeType":1294},{},[3873,3877,3887],{"data":3874,"marks":3875,"value":3876,"nodeType":1293},{},[],"The urgency of solving this problem increased for many organizations this year after the December 2024 compromise of at least 35 Google Chrome extensions in a ",{"data":3878,"content":3882,"nodeType":3064},{"target":3879},{"sys":3880},{"id":3881,"type":1377,"linkType":1378},"6sprbTRpfnTJsP3mGR2gKa",[3883],{"data":3884,"marks":3885,"value":3886,"nodeType":1293},{},[],"campaign targeting browser extension developers",{"data":3888,"marks":3889,"value":3890,"nodeType":1293},{},[],". Cyberhaven’s extension was one of these, and the campaign inherited their name.",{"data":3892,"content":3893,"nodeType":1986},{},[3894],{"data":3895,"marks":3896,"value":3221,"nodeType":1293},{},[],{"data":3898,"content":3899,"nodeType":1294},{},[3900,3904,3914],{"data":3901,"marks":3902,"value":3903,"nodeType":1293},{},[],"With Push, you can now get visibility across ",{"data":3905,"content":3909,"nodeType":3064},{"target":3906},{"sys":3907},{"id":3908,"type":1377,"linkType":1378},"3ibVBa6u0XfcXXDVtON5th",[3910],{"data":3911,"marks":3912,"value":3913,"nodeType":1293},{},[],"all the browser extensions",{"data":3915,"marks":3916,"value":3917,"nodeType":1293},{},[]," installed on employee browsers in your environment, and block the ones you don’t want.",{"data":3919,"content":3923,"nodeType":1372},{"target":3920},{"sys":3921},{"id":3922,"type":1377,"linkType":1378},"5J5jdmwugy7yU8GGwxe7iH",[],{"data":3925,"content":3926,"nodeType":1294},{},[3927],{"data":3928,"marks":3929,"value":3930,"nodeType":1293},{},[],"You can also:",{"data":3932,"content":3933,"nodeType":1474},{},[3934,3944,3954],{"data":3935,"content":3936,"nodeType":1478},{},[3937],{"data":3938,"content":3939,"nodeType":1294},{},[3940],{"data":3941,"marks":3942,"value":3943,"nodeType":1293},{},[],"Review extensions with risky permissions.",{"data":3945,"content":3946,"nodeType":1478},{},[3947],{"data":3948,"content":3949,"nodeType":1294},{},[3950],{"data":3951,"marks":3952,"value":3953,"nodeType":1293},{},[],"Identify extensions with potentially suspicious installation methods, such as sideloaded or manually installed.",{"data":3955,"content":3956,"nodeType":1478},{},[3957],{"data":3958,"content":3959,"nodeType":1294},{},[3960],{"data":3961,"marks":3962,"value":3963,"nodeType":1293},{},[],"Block extensions based on user groups and browser profiles (e.g. profiles logged in with a company domain).",{"data":3965,"content":3966,"nodeType":1294},{},[3967,3971,3979],{"data":3968,"marks":3969,"value":3970,"nodeType":1293},{},[],"Learn more about extension visibility and management in our ",{"data":3972,"content":3975,"nodeType":3064},{"target":3973},{"sys":3974},{"id":3908,"type":1377,"linkType":1378},[3976],{"data":3977,"marks":3978,"value":3540,"nodeType":1293},{},[],{"data":3980,"marks":3981,"value":1605,"nodeType":1293},{},[],{"data":3983,"content":3984,"nodeType":1387},{},[],{"data":3986,"content":3987,"nodeType":1322},{},[3988],{"data":3989,"marks":3990,"value":3991,"nodeType":1293},{},[],"Adding a layer of protection against help desk scams",{"data":3993,"content":3994,"nodeType":1986},{},[3995],{"data":3996,"marks":3997,"value":3028,"nodeType":1293},{},[],{"data":3999,"content":4000,"nodeType":1294},{},[4001],{"data":4002,"marks":4003,"value":4004,"nodeType":1293},{},[],"Finally, another big theme in this year’s TTPs was the use of help desk social engineering to compromise organizations. ",{"data":4006,"content":4007,"nodeType":1294},{},[4008,4012,4022],{"data":4009,"marks":4010,"value":4011,"nodeType":1293},{},[],"Attackers like ",{"data":4013,"content":4017,"nodeType":3064},{"target":4014},{"sys":4015},{"id":4016,"type":1377,"linkType":1378},"wgpdyHDn9NcpIJNr7jnFp",[4018],{"data":4019,"marks":4020,"value":4021,"nodeType":1293},{},[],"Scattered Spider",{"data":4023,"marks":4024,"value":4025,"nodeType":1293},{},[]," — now known as part of the evolving cybercriminal group Scattered Lapsus$ Hunters — have targeted organizations including MGM Resorts and Marks & Spencer by convincing help desk staff to help them bypass MFA or reset credentials for accounts they then use to access corporate systems. ",{"data":4027,"content":4028,"nodeType":1986},{},[4029],{"data":4030,"marks":4031,"value":3221,"nodeType":1293},{},[],{"data":4033,"content":4034,"nodeType":1294},{},[4035,4039,4044],{"data":4036,"marks":4037,"value":4038,"nodeType":1293},{},[],"To provide an additional layer of security when verifying employee identities during help desk interactions, Push introduced ",{"data":4040,"marks":4041,"value":4043,"nodeType":1293},{},[4042],{"type":1329},"Employee verification codes",{"data":4045,"marks":4046,"value":1605,"nodeType":1293},{},[],{"data":4048,"content":4052,"nodeType":1372},{"target":4049},{"sys":4050},{"id":4051,"type":1377,"linkType":1378},"19Baqh5QwbonzsR0EcaDS8",[],{"data":4054,"content":4055,"nodeType":1294},{},[4056],{"data":4057,"marks":4058,"value":4059,"nodeType":1293},{},[],"These are a rotating 6-digit verification code accessible via the Push Security extension dropdown. When an employee contacts your help desk, staff can use this code to help verify their identity before performing any sensitive account changes.",{"data":4061,"content":4062,"nodeType":1294},{},[4063],{"data":4064,"marks":4065,"value":4066,"nodeType":1293},{},[],"Employee verification codes are lightweight, rotate every 24 hours, and don’t require any additional apps or devices.",{"data":4068,"content":4069,"nodeType":1294},{},[4070,4074,4083],{"data":4071,"marks":4072,"value":4073,"nodeType":1293},{},[],"Learn more about verification codes in our ",{"data":4075,"content":4079,"nodeType":3064},{"target":4076},{"sys":4077},{"id":4078,"type":1377,"linkType":1378},"4rLP8wr6HnvBG2OzqYYKpF",[4080],{"data":4081,"marks":4082,"value":3369,"nodeType":1293},{},[],{"data":4084,"marks":4085,"value":1605,"nodeType":1293},{},[],{"data":4087,"content":4088,"nodeType":1387},{},[],{"data":4090,"content":4091,"nodeType":1322},{},[4092],{"data":4093,"marks":4094,"value":4095,"nodeType":1293},{},[],"Learn more about Push",{"data":4097,"content":4098,"nodeType":1294},{},[4099],{"data":4100,"marks":4101,"value":4102,"nodeType":1293},{},[],"Push Security’s browser-based security platform provides comprehensive detection and response capabilities against the leading cause of breaches. Push blocks browser-based attacks like AiTM phishing, credential stuffing, malicious browser extensions, ClickFix, and session hijacking. ",{"data":4104,"content":4105,"nodeType":1294},{},[4106],{"data":4107,"marks":4108,"value":4109,"nodeType":1293},{},[],"You don’t need to wait until it all goes wrong — you can also use Push to proactively find and fix vulnerabilities across the apps that your employees use, like ghost logins, SSO coverage gaps, MFA gaps, vulnerable passwords, and more to harden your identity attack surface.",{"data":4111,"content":4112,"nodeType":1294},{},[4113,4117,4125,4129,4137],{"data":4114,"marks":4115,"value":4116,"nodeType":1293},{},[],"To learn more about Push, check out our latest ",{"data":4118,"content":4120,"nodeType":1426},{"uri":4119},"/resources/product-brochure",[4121],{"data":4122,"marks":4123,"value":4124,"nodeType":1293},{},[],"product overview",{"data":4126,"marks":4127,"value":4128,"nodeType":1293},{},[]," or book some time with one of our team for a ",{"data":4130,"content":4132,"nodeType":1426},{"uri":4131},"/demo",[4133],{"data":4134,"marks":4135,"value":4136,"nodeType":1293},{},[],"live demo",{"data":4138,"marks":4139,"value":1605,"nodeType":1293},{},[],"Taking the fight to attackers: Push’s top features of 2025","Here’s how real-world attacks and our own R&D informed what we built for Push customers over the last year.","2025-12-17T00:00:00.000Z","taking-the-fight-to-attackers-top-features-of-2025",{"items":4145},[4146,4148],{"sys":4147,"name":1306},{"id":1305},{"sys":4149,"name":1310},{"id":1309},{"items":4151},[4152],{"fullName":4153,"firstName":4154,"jobTitle":4155,"profilePicture":4156},"Kelly Davenport","Kelly","Product Team",{"url":4157},"https://images.ctfassets.net/y1cdw1ablpvd/1hi8bEuVfn5sF57LivAq6d/9a3b82426c697d765e2e450e33a18424/kelly_profile_pic.jpeg",{"items":4159},[4160],{"fullName":2825,"firstName":2826,"jobTitle":2827,"profilePicture":4161},{"url":2829},{"json":4163,"links":4967},{"nodeType":1295,"data":4164,"content":4165},{},[4166,4186,4193,4199,4255,4262,4269,4272,4280,4287,4294,4347,4355,4362,4385,4392,4395,4403,4410,4417,4424,4431,4438,4445,4450,4458,4465,4484,4504,4507,4515,4522,4529,4536,4544,4563,4570,4576,4584,4604,4624,4737,4740,4748,4755,4762,4765,4773,4780,4787,4794,4861,4891,4894,4902,4908,4915,4922,4929,4955,4961],{"nodeType":1294,"data":4167,"content":4168},{},[4169,4173,4182],{"nodeType":1293,"value":4170,"marks":4171,"data":4172},"In December, the Push Security research team discovered and blocked a brand new attack technique that we coined ",[],{},{"nodeType":1426,"data":4174,"content":4176},{"uri":4175},"https://pushsecurity.com/blog/consentfix/",[4177],{"nodeType":1293,"value":4178,"marks":4179,"data":4181},"ConsentFix",[4180],{"type":1434},{},{"nodeType":1293,"value":4183,"marks":4184,"data":4185},". This technique merged ClickFix-style social engineering with OAuth consent phishing to hijack Microsoft accounts. ",[],{},{"nodeType":1294,"data":4187,"content":4188},{},[4189],{"nodeType":1293,"value":4190,"marks":4191,"data":4192},"We saw this attack running across a large network of compromised websites that attackers were injecting the malicious payload into, forming a large-scale campaign that was detected across multiple customer estates. ",[],{},{"nodeType":1372,"data":4194,"content":4198},{"target":4195},{"sys":4196},{"id":4197,"type":1377,"linkType":1378},"603MWDqc9NsqkklIkfGNZN",[],{"nodeType":1294,"data":4200,"content":4201},{},[4202,4206,4215,4219,4227,4230,4239,4242,4251],{"nodeType":1293,"value":4203,"marks":4204,"data":4205},"ConsentFix got a pretty awesome response from the community in a very short space of time. Within days, ",[],{},{"nodeType":1426,"data":4207,"content":4209},{"uri":4208},"https://www.youtube.com/watch?v=AAiiIY-Soak",[4210],{"nodeType":1293,"value":4211,"marks":4212,"data":4214},"John Hammond shared a new and improved version of the technique",[4213],{"type":1434},{},{"nodeType":1293,"value":4216,"marks":4217,"data":4218}," that he’d spun up in his own lab, while security researchers from ",[],{},{"nodeType":1426,"data":4220,"content":4222},{"uri":4221},"https://medium.com/@nitashathakur/consentfix-poc-how-the-attack-works-end-to-end-4f8b656f977d",[4223],{"nodeType":1293,"value":2871,"marks":4224,"data":4226},[4225],{"type":1434},{},{"nodeType":1293,"value":2498,"marks":4228,"data":4229},[],{},{"nodeType":1426,"data":4231,"content":4233},{"uri":4232},"https://www.glueckkanja.com/en/posts/2025-12-31-vulnerability-consentfix",[4234],{"nodeType":1293,"value":4235,"marks":4236,"data":4238},"Glueck Kanja",[4237],{"type":1434},{},{"nodeType":1293,"value":2511,"marks":4240,"data":4241},[],{},{"nodeType":1426,"data":4243,"content":4245},{"uri":4244},"https://msendpointmgr.com/2026/01/08/consentfix-quickfix/",[4246],{"nodeType":1293,"value":4247,"marks":4248,"data":4250},"other individual contributors",[4249],{"type":1434},{},{"nodeType":1293,"value":4252,"marks":4253,"data":4254}," all shared analysis and recommendations. ",[],{},{"nodeType":1294,"data":4256,"content":4257},{},[4258],{"nodeType":1293,"value":4259,"marks":4260,"data":4261},"In this blog, we’re sharing some new insights on the campaign, pulling together some of the top recommendations and resources shared across the community, and predicting what the future holds for this novel technique as it quickly enters the mainstream. ",[],{},{"nodeType":1294,"data":4263,"content":4264},{},[4265],{"nodeType":1293,"value":4266,"marks":4267,"data":4268},"First though, let’s quickly recap what ConsentFix is and how it works. ",[],{},{"nodeType":1387,"data":4270,"content":4271},{},[],{"nodeType":1322,"data":4273,"content":4274},{},[4275],{"nodeType":1293,"value":4276,"marks":4277,"data":4279},"ConsentFix 101",[4278],{"type":1329},{},{"nodeType":1294,"data":4281,"content":4282},{},[4283],{"nodeType":1293,"value":4284,"marks":4285,"data":4286},"ConsentFix is an attack technique that prompts the victim to share an OAuth authorization code with an attacker via a phishing page. The attacker then enters this code into a target application on their own device in order to complete the authorization handshake and take over the account. ",[],{},{"nodeType":1294,"data":4288,"content":4289},{},[4290],{"nodeType":1293,"value":4291,"marks":4292,"data":4293},"By hijacking OAuth, attackers can effectively bypass identity-layer controls like passwords and MFA — even phishing resistant authentication methods like passkeys have no impact on this attack, because it sidesteps the authentication process altogether. ",[],{},{"nodeType":1294,"data":4295,"content":4296},{},[4297,4301,4309,4312,4320,4324,4331,4335,4344],{"nodeType":1293,"value":4298,"marks":4299,"data":4300},"OAuth abuse attacks are not new. Techniques like ",[],{},{"nodeType":1426,"data":4302,"content":4304},{"uri":4303},"https://github.com/pushsecurity/saas-attacks/blob/main/techniques/consent_phishing/description.md",[4305],{"nodeType":1293,"value":1671,"marks":4306,"data":4308},[4307],{"type":1434},{},{"nodeType":1293,"value":1676,"marks":4310,"data":4311},[],{},{"nodeType":1426,"data":4313,"content":4315},{"uri":4314},"https://github.com/pushsecurity/saas-attacks/blob/main/techniques/device_code_phishing/description.md",[4316],{"nodeType":1293,"value":1684,"marks":4317,"data":4319},[4318],{"type":1434},{},{"nodeType":1293,"value":4321,"marks":4322,"data":4323}," have been around for some time. However, these mainly focus on connecting your primary workspace account (e.g. Microsoft, Google, etc.) to a fraudulent, attacker-controlled application. But this is becoming increasingly difficult in core enterprise cloud environments like Azure due to ",[],{},{"nodeType":1426,"data":4325,"content":4326},{"uri":1694},[4327],{"nodeType":1293,"value":1697,"marks":4328,"data":4330},[4329],{"type":1434},{},{"nodeType":1293,"value":4332,"marks":4333,"data":4334},". That said, device code phishing still featured prominently in the recent ",[],{},{"nodeType":1426,"data":4336,"content":4338},{"uri":4337},"https://pushsecurity.com/blog/scattered-lapsus-hunters/",[4339],{"nodeType":1293,"value":4340,"marks":4341,"data":4343},"high-profile Salesforce attacks in 2025",[4342],{"type":1434},{},{"nodeType":1293,"value":1605,"marks":4345,"data":4346},[],{},{"nodeType":1986,"data":4348,"content":4349},{},[4350],{"nodeType":1293,"value":4351,"marks":4352,"data":4354},"What makes ConsentFix so dangerous?",[4353],{"type":1329},{},{"nodeType":1294,"data":4356,"content":4357},{},[4358],{"nodeType":1293,"value":4359,"marks":4360,"data":4361},"Unlike typical OAuth attacks, the novel ConsentFix approach enabled the attacker to target different types of application to what they usually go after — with big implications for detection and response. In this case, the attacker:",[],{},{"nodeType":1474,"data":4363,"content":4364},{},[4365,4375],{"nodeType":1478,"data":4366,"content":4367},{},[4368],{"nodeType":1294,"data":4369,"content":4370},{},[4371],{"nodeType":1293,"value":4372,"marks":4373,"data":4374},"Specifically targeted first-party Microsoft apps that cannot be restricted in the same way as third-party applications, and are pre-consented in every tenant (meaning users can authenticate to them without admin approval). ",[],{},{"nodeType":1478,"data":4376,"content":4377},{},[4378],{"nodeType":1294,"data":4379,"content":4380},{},[4381],{"nodeType":1293,"value":4382,"marks":4383,"data":4384},"Leveraged legacy scopes that are outside the scope of default logging to evade detection, and targeted scopes with known Conditional Access policy exclusions.",[],{},{"nodeType":1294,"data":4386,"content":4387},{},[4388],{"nodeType":1293,"value":4389,"marks":4390,"data":4391},"This means that default controls you’d expect to block malicious OAuth grants don’t apply, you may not have logging enabled to detect it if it did happen to you, and to top it off, conditional access policy exclusions mean that many organizations’ expected controls don’t work as intended in this case. ",[],{},{"nodeType":1387,"data":4393,"content":4394},{},[],{"nodeType":1322,"data":4396,"content":4397},{},[4398],{"nodeType":1293,"value":4399,"marks":4400,"data":4402},"ConsentFix campaign recap",[4401],{"type":1329},{},{"nodeType":1294,"data":4404,"content":4405},{},[4406],{"nodeType":1293,"value":4407,"marks":4408,"data":4409},"Let’s quickly recap how the ConsentFix campaign was implemented. ",[],{},{"nodeType":1294,"data":4411,"content":4412},{},[4413],{"nodeType":1293,"value":4414,"marks":4415,"data":4416},"The victim is served a page which requires that they verify that they are human by pasting a URL into the phishing page.",[],{},{"nodeType":1294,"data":4418,"content":4419},{},[4420],{"nodeType":1293,"value":4421,"marks":4422,"data":4423},"Clicking the “Sign In” button opens a legitimate Microsoft login page. If the user is already logged in (which they likely are if working in their normal browser) their account information is already pre-populated and they won’t need to authenticate again. ",[],{},{"nodeType":1294,"data":4425,"content":4426},{},[4427],{"nodeType":1293,"value":4428,"marks":4429,"data":4430},"Selecting their account redirects them to a localhost URL containing an OAuth authorization code — this is what they then post into the original phishing page to complete the attack. ",[],{},{"nodeType":1294,"data":4432,"content":4433},{},[4434],{"nodeType":1293,"value":4435,"marks":4436,"data":4437},"Once the attacker gets the URL, they can exchange it for an access token or refresh token for the particular application being targeted — in this case, Azure CLI.",[],{},{"nodeType":1294,"data":4439,"content":4440},{},[4441],{"nodeType":1293,"value":4442,"marks":4443,"data":4444},"The TL;DR is that the attacker is manually completing an authorization flow that happens when a user logs into Azure CLI — a a command line client that provides you with the ability to easily manage your Azure AD / Entra ID environment. Except in this case, they’re taking the victim’s information to log in on the attacker’s device instead. ",[],{},{"nodeType":1372,"data":4446,"content":4449},{"target":4447},{"sys":4448},{"id":1528,"type":1377,"linkType":1378},[],{"nodeType":1986,"data":4451,"content":4452},{},[4453],{"nodeType":1293,"value":4454,"marks":4455,"data":4457},"Latest campaign details",[4456],{"type":1329},{},{"nodeType":1294,"data":4459,"content":4460},{},[4461],{"nodeType":1293,"value":4462,"marks":4463,"data":4464},"Since we shared our blog post, we’ve had a number of additional details come to light about the campaign, which we’ve continued to track. ",[],{},{"nodeType":1294,"data":4466,"content":4467},{},[4468,4472,4480],{"nodeType":1293,"value":4469,"marks":4470,"data":4471},"It appears to be linked to Russian state-affiliated APT29, as corroborated by threat researchers we’ve been collaborating with. This is consistent with the ",[],{},{"nodeType":1426,"data":4473,"content":4474},{"uri":4175},[4475],{"nodeType":1293,"value":4476,"marks":4477,"data":4479},"stealthy tactics we observed",[4478],{"type":1434},{},{"nodeType":1293,"value":4481,"marks":4482,"data":4483},", which go far beyond the run-of-the-mill detection evasion techniques we see used in criminal phishing campaigns. ",[],{},{"nodeType":1294,"data":4485,"content":4486},{},[4487,4491,4500],{"nodeType":1293,"value":4488,"marks":4489,"data":4490},"It shares many similarities with, and appears to be an evolution of, ",[],{},{"nodeType":1426,"data":4492,"content":4494},{"uri":4493},"https://www.volexity.com/blog/2025/12/04/dangerous-invitations-russian-threat-actor-spoofs-european-security-events-in-targeted-phishing-attacks/",[4495],{"nodeType":1293,"value":4496,"marks":4497,"data":4499},"this Russia-affiliated campaign identified by Volexity",[4498],{"type":1434},{},{"nodeType":1293,"value":4501,"marks":4502,"data":4503}," that featured a manual version of the attack — where they victim was social engineered via email into opening the Microsoft URL, copying the localhost response, and sending it back to the attacker via email. ",[],{},{"nodeType":1387,"data":4505,"content":4506},{},[],{"nodeType":1322,"data":4508,"content":4509},{},[4510],{"nodeType":1293,"value":4511,"marks":4512,"data":4514},"Top contributions from the community",[4513],{"type":1329},{},{"nodeType":1294,"data":4516,"content":4517},{},[4518],{"nodeType":1293,"value":4519,"marks":4520,"data":4521},"As we mentioned earlier, the community response to ConsentFix has been incredible. ",[],{},{"nodeType":1294,"data":4523,"content":4524},{},[4525],{"nodeType":1293,"value":4526,"marks":4527,"data":4528},"As ever, you get a lot of vendors covering the attack technique with “install our product” as the recommendation. This is to be expected, but it’s misleading when some of these vendors are pushing EDR products that would have absolutely no way of detecting or blocking the attack. ",[],{},{"nodeType":1294,"data":4530,"content":4531},{},[4532],{"nodeType":1293,"value":4533,"marks":4534,"data":4535},"But cutting through the marketing, a lot of really great resources and recommendations were shared. ",[],{},{"nodeType":1986,"data":4537,"content":4538},{},[4539],{"nodeType":1293,"value":4540,"marks":4541,"data":4543},"V2.0 released by John Hammond",[4542],{"type":1329},{},{"nodeType":1294,"data":4545,"content":4546},{},[4547,4551,4559],{"nodeType":1293,"value":4548,"marks":4549,"data":4550},"Within days, John Hammond ",[],{},{"nodeType":1426,"data":4552,"content":4553},{"uri":4208},[4554],{"nodeType":1293,"value":4555,"marks":4556,"data":4558},"posted about ConsentFix on his Youtube channel",[4557],{"type":1434},{},{"nodeType":1293,"value":4560,"marks":4561,"data":4562},", where he showed off a slick improvement on the ConsentFix implementation used by attackers. In his version, the URL containing the Microsoft authorization code was generated in a pop-up browser window that could simply be drag-and-dropped into the phishing page. ",[],{},{"nodeType":1294,"data":4564,"content":4565},{},[4566],{"nodeType":1293,"value":4567,"marks":4568,"data":4569},"This implementation is way smoother, making it much more likely that a victim would fall for it. And this took a matter of days… ",[],{},{"nodeType":1372,"data":4571,"content":4575},{"target":4572},{"sys":4573},{"id":4574,"type":1377,"linkType":1378},"59tfJDRhGThKD48Wjg7uY2",[],{"nodeType":1986,"data":4577,"content":4578},{},[4579],{"nodeType":1293,"value":4580,"marks":4581,"data":4583},"Additional vulnerable first-party apps identified",[4582],{"type":1329},{},{"nodeType":1294,"data":4585,"content":4586},{},[4587,4591,4600],{"nodeType":1293,"value":4588,"marks":4589,"data":4590},"Fabian Bader and Dirk-jan Mollema from Glueck Kanja have ",[],{},{"nodeType":1426,"data":4592,"content":4594},{"uri":4593},"https://entrascopes.com/?bypass=true&authcodeFix=true",[4595],{"nodeType":1293,"value":4596,"marks":4597,"data":4599},"shared a great resource",[4598],{"type":1434},{},{"nodeType":1293,"value":4601,"marks":4602,"data":4603}," on wider first-party apps that are vulnerable to ConsentFix. ",[],{},{"nodeType":1294,"data":4605,"content":4606},{},[4607,4611,4620],{"nodeType":1293,"value":4608,"marks":4609,"data":4610},"In total, there are 11 apps vulnerable to ConsentFix that also have known ",[],{},{"nodeType":1426,"data":4612,"content":4614},{"uri":4613},"https://cloudbrothers.info/conditional-access-bypasses/#documented-bypasses",[4615],{"nodeType":1293,"value":4616,"marks":4617,"data":4619},"Conditional Access exclusions",[4618],{"type":1434},{},{"nodeType":1293,"value":4621,"marks":4622,"data":4623}," (either for the app generally, or when specific scopes are requested for the app):",[],{},{"nodeType":1474,"data":4625,"content":4626},{},[4627,4637,4647,4657,4667,4677,4687,4697,4707,4717,4727],{"nodeType":1478,"data":4628,"content":4629},{},[4630],{"nodeType":1294,"data":4631,"content":4632},{},[4633],{"nodeType":1293,"value":4634,"marks":4635,"data":4636},"Microsoft Azure CLI: 04b07795-8ddb-461a-bbee-02f9e1bf7b46",[],{},{"nodeType":1478,"data":4638,"content":4639},{},[4640],{"nodeType":1294,"data":4641,"content":4642},{},[4643],{"nodeType":1293,"value":4644,"marks":4645,"data":4646},"Microsoft Azure PowerShell: 1950a258-227b-4e31-a9cf-717495945fc2",[],{},{"nodeType":1478,"data":4648,"content":4649},{},[4650],{"nodeType":1294,"data":4651,"content":4652},{},[4653],{"nodeType":1293,"value":4654,"marks":4655,"data":4656},"Microsoft Teams: 1fec8e78-bce4-4aaf-ab1b-5451cc387264",[],{},{"nodeType":1478,"data":4658,"content":4659},{},[4660],{"nodeType":1294,"data":4661,"content":4662},{},[4663],{"nodeType":1293,"value":4664,"marks":4665,"data":4666},"Microsoft Whiteboard Client: 57336123-6e14-4acc-8dcf-287b6088aa28",[],{},{"nodeType":1478,"data":4668,"content":4669},{},[4670],{"nodeType":1294,"data":4671,"content":4672},{},[4673],{"nodeType":1293,"value":4674,"marks":4675,"data":4676},"Microsoft Flow Mobile PROD-GCCH-CN: 57fcbcfa-7cee-4eb1-8b25-12d2030b4ee0",[],{},{"nodeType":1478,"data":4678,"content":4679},{},[4680],{"nodeType":1294,"data":4681,"content":4682},{},[4683],{"nodeType":1293,"value":4684,"marks":4685,"data":4686},"Enterprise Roaming and Backup: 60c8bde5-3167-4f92-8fdb-059f6176dc0",[],{},{"nodeType":1478,"data":4688,"content":4689},{},[4690],{"nodeType":1294,"data":4691,"content":4692},{},[4693],{"nodeType":1293,"value":4694,"marks":4695,"data":4696},"Visual Studio: 872cd9fa-d31f-45e0-9eab-6e460a02d1f1",[],{},{"nodeType":1478,"data":4698,"content":4699},{},[4700],{"nodeType":1294,"data":4701,"content":4702},{},[4703],{"nodeType":1293,"value":4704,"marks":4705,"data":4706},"Aadrm Admin Powershell: 90f610bf-206d-4950-b61d-37fa6fd1b224",[],{},{"nodeType":1478,"data":4708,"content":4709},{},[4710],{"nodeType":1294,"data":4711,"content":4712},{},[4713],{"nodeType":1293,"value":4714,"marks":4715,"data":4716},"Microsoft SharePoint Online Management Shell: 9bc3ab49-b65d-410a-85ad-de819febfddc",[],{},{"nodeType":1478,"data":4718,"content":4719},{},[4720],{"nodeType":1294,"data":4721,"content":4722},{},[4723],{"nodeType":1293,"value":4724,"marks":4725,"data":4726},"Microsoft Power Query for Excel: a672d62c-fc7b-4e81-a576-e60dc46e951d",[],{},{"nodeType":1478,"data":4728,"content":4729},{},[4730],{"nodeType":1294,"data":4731,"content":4732},{},[4733],{"nodeType":1293,"value":4734,"marks":4735,"data":4736},"Visual Studio Code: aebc6443-996d-45c2-90f0-388ff96faa56",[],{},{"nodeType":1387,"data":4738,"content":4739},{},[],{"nodeType":1322,"data":4741,"content":4742},{},[4743],{"nodeType":1293,"value":4744,"marks":4745,"data":4747},"Predictions for ConsentFix",[4746],{"type":1329},{},{"nodeType":1294,"data":4749,"content":4750},{},[4751],{"nodeType":1293,"value":4752,"marks":4753,"data":4754},"Based on the speed at which new iterations on the ConsentFix technique were shared by security researchers, and the breadth of apps and possible scopes that can be leveraged, both red teams and criminals will inevitably adopt ConsentFix into their arsenal of TTPs in the near future. It is likely that new ConsentFix variants will emerge imminently (if not already in circulation). ",[],{},{"nodeType":1294,"data":4756,"content":4757},{},[4758],{"nodeType":1293,"value":4759,"marks":4760,"data":4761},"All security teams responsible for protecting Microsoft environments should ensure that monitoring controls and mitigations are put in place as a matter of high priority. ",[],{},{"nodeType":1387,"data":4763,"content":4764},{},[],{"nodeType":1322,"data":4766,"content":4767},{},[4768],{"nodeType":1293,"value":4769,"marks":4770,"data":4772},"Updated recommendations for security teams",[4771],{"type":1329},{},{"nodeType":1294,"data":4774,"content":4775},{},[4776],{"nodeType":1293,"value":4777,"marks":4778,"data":4779},"As an entirely browser-native attack technique, many traditional security tools and data sources are of limited use when it comes to detecting or pre-emptively blocking this attack. At the same time, the attack exploits default Microsoft security configs to evade both prevention and detection controls.",[],{},{"nodeType":1294,"data":4781,"content":4782},{},[4783],{"nodeType":1293,"value":4784,"marks":4785,"data":4786},"To be able to tackle modern attacks like ConsentFix that occur entirely within the browser context, it is vital that organizations look to monitor the browser as a detection surface, hunt for signs of malicious activity, and block attacks in real-time — in the same way that you would expect EDR to work for endpoint attacks. ",[],{},{"nodeType":1294,"data":4788,"content":4789},{},[4790],{"nodeType":1293,"value":4791,"marks":4792,"data":4793},"For organizations relying on Microsoft logging as the sole line of defense against this attack, there are some new recommendations to add to the list thanks to the community response: ",[],{},{"nodeType":1474,"data":4795,"content":4796},{},[4797,4820,4830,4851],{"nodeType":1478,"data":4798,"content":4799},{},[4800],{"nodeType":1294,"data":4801,"content":4802},{},[4803,4807,4816],{"nodeType":1293,"value":4804,"marks":4805,"data":4806},"Ensure that logging for the deprecated ",[],{},{"nodeType":1426,"data":4808,"content":4810},{"uri":4809},"https://learn.microsoft.com/en-us/azure/azure-monitor/reference/tables/aadgraphactivitylogs",[4811],{"nodeType":1293,"value":4812,"marks":4813,"data":4815},"AADGraphActivityLogs",[4814],{"type":1434},{},{"nodeType":1293,"value":4817,"marks":4818,"data":4819}," is enabled.",[],{},{"nodeType":1478,"data":4821,"content":4822},{},[4823],{"nodeType":1294,"data":4824,"content":4825},{},[4826],{"nodeType":1293,"value":4827,"marks":4828,"data":4829},"Hunt in logs for the Application IDs highlighted above, along with the Resource IDs for Windows Azure Active Directory (00000002-0000-0000-c000-000000000000) and Microsoft Intune Checkin (26a4ae64-5862-427f-a9b0-044e62572a4f)",[],{},{"nodeType":1478,"data":4831,"content":4832},{},[4833],{"nodeType":1294,"data":4834,"content":4835},{},[4836,4839,4847],{"nodeType":1293,"value":37,"marks":4837,"data":4838},[],{},{"nodeType":1426,"data":4840,"content":4841},{"uri":4244},[4842],{"nodeType":1293,"value":4843,"marks":4844,"data":4846},"Create Service Principals for each of the vulnerable apps and restrict the users that are authorized to access them",[4845],{"type":1434},{},{"nodeType":1293,"value":4848,"marks":4849,"data":4850}," to reduce the attack surface of users that can be phished with this method.",[],{},{"nodeType":1478,"data":4852,"content":4853},{},[4854],{"nodeType":1294,"data":4855,"content":4856},{},[4857],{"nodeType":1293,"value":4858,"marks":4859,"data":4860},"Block access to CLI tools via Conditional Access policy and issue exclusions for authorized users/groups. ",[],{},{"nodeType":1294,"data":4862,"content":4863},{},[4864,4868,4877,4881,4888],{"nodeType":1293,"value":4865,"marks":4866,"data":4867},"Additional resources that may be of use include community-created ",[],{},{"nodeType":1426,"data":4869,"content":4871},{"uri":4870},"https://github.com/elastic/detection-rules/pull/5485",[4872],{"nodeType":1293,"value":4873,"marks":4874,"data":4876},"Elastic detection rules",[4875],{"type":1434},{},{"nodeType":1293,"value":4878,"marks":4879,"data":4880}," for ConsentFix and further mitigation and hunting guidance from ",[],{},{"nodeType":1426,"data":4882,"content":4883},{"uri":4232},[4884],{"nodeType":1293,"value":4235,"marks":4885,"data":4887},[4886],{"type":1434},{},{"nodeType":1293,"value":2385,"marks":4889,"data":4890},[],{},{"nodeType":1387,"data":4892,"content":4893},{},[],{"nodeType":1322,"data":4895,"content":4896},{},[4897],{"nodeType":1293,"value":4898,"marks":4899,"data":4901},"Learn more about Push Security",[4900],{"type":1329},{},{"nodeType":1294,"data":4903,"content":4904},{},[4905],{"nodeType":1293,"value":2109,"marks":4906,"data":4907},[],{},{"nodeType":1294,"data":4909,"content":4910},{},[4911],{"nodeType":1293,"value":4912,"marks":4913,"data":4914},"Push tackles browser-based attacks using behavioral threat detection controls, powered by deep browser telemetry, to provide broad detection and blocking capabilities against attacks happening in the browser. This means analyzing the end-to-end process of a webpage loading/running in the browser, and how the user interacts with the page, to spot universal indicators of bad activity. ",[],{},{"nodeType":1294,"data":4916,"content":4917},{},[4918],{"nodeType":1293,"value":4919,"marks":4920,"data":4921},"This is the only reliable way to detect malicious websites in a world where IoC-based detections are trivial for attackers to get around. Rather than playing known-bad whac-a-mole, Push detects and blocks even zero-day browser threats in real time.",[],{},{"nodeType":1294,"data":4923,"content":4924},{},[4925],{"nodeType":1293,"value":4926,"marks":4927,"data":4928},"Push stops browser-based attacks like AiTM phishing, credential stuffing, malicious browser extensions, ClickFix, ConsentFix, and session hijacking. You don’t need to wait until it all goes wrong either — you can also use Push to proactively find and fix vulnerabilities across the apps that your employees use, like ghost logins, SSO coverage gaps, MFA gaps, vulnerable passwords, and more to harden your identity attack surface.",[],{},{"nodeType":1294,"data":4930,"content":4931},{},[4932,4935,4942,4945,4952],{"nodeType":1293,"value":2148,"marks":4933,"data":4934},[],{},{"nodeType":1426,"data":4936,"content":4937},{"uri":2153},[4938],{"nodeType":1293,"value":2156,"marks":4939,"data":4941},[4940],{"type":1434},{},{"nodeType":1293,"value":2161,"marks":4943,"data":4944},[],{},{"nodeType":1426,"data":4946,"content":4947},{"uri":2166},[4948],{"nodeType":1293,"value":2169,"marks":4949,"data":4951},[4950],{"type":1434},{},{"nodeType":1293,"value":1605,"marks":4953,"data":4954},[],{},{"nodeType":1372,"data":4956,"content":4960},{"target":4957},{"sys":4958},{"id":4959,"type":1377,"linkType":1378},"4D7zpYAc1tTEAmn2hpkWPe",[],{"nodeType":1294,"data":4962,"content":4963},{},[4964],{"nodeType":1293,"value":37,"marks":4965,"data":4966},[],{},{"entries":4968},{"hyperlink":4969,"inline":4970,"block":4971},[],[],[4972,4980,4986,4993],{"sys":4973,"__typename":4974,"title":4975,"caption":4975,"layoutMode":118,"file":4976},{"id":4197},"Image","“ConsentFix” phishing site detected and blocked by Push. ",{"url":4977,"width":4978,"height":4979},"https://images.ctfassets.net/y1cdw1ablpvd/3FyJ6MHYvAi7z9O7LahUer/ac4384da808287779f1e1f622186dcbc/1.png",1999,1185,{"sys":4981,"__typename":4974,"title":4982,"caption":4983,"layoutMode":118,"file":4984},{"id":1528},"ConsentFix attack breakdown.","ConsentFix attack breakdown: The victim is tricked into copy-and-pasting a URL containing OAuth key material into a phishing page.",{"url":4985,"width":4978,"height":40},"https://images.ctfassets.net/y1cdw1ablpvd/7x6SiBWarYH3w4nPfjtf7r/4c1dd037b9ad47ccbba0a87256ecd909/2.png",{"sys":4987,"__typename":4974,"title":4988,"caption":4988,"layoutMode":118,"file":4989},{"id":4574},"John Hammond showed off a slick new ConsentFix implementation.",{"url":4990,"width":4991,"height":4992},"https://images.ctfassets.net/y1cdw1ablpvd/1bjvJgwJQYYITray4cgquD/056744beab8fd24153b1c42b73090aeb/consentfix_v2.gif",1280,720,{"sys":4994,"__typename":4995,"type":4996,"ctaText":4997,"buttonLabel":4998,"buttonColour":4999,"buttonUrl":5000},{"id":4959},"CtaWidget","Custom","Want to see how security controls match up with modern browser-based attacks? Register for our upcoming webinar for an interactive walkthrough.","Register Now","sunny orange","https://pushsecurity.com/webinar/investigating-browser-threats","content:blog:consentfix-debrief.json","json","content","blog/consentfix-debrief.json","blog/consentfix-debrief",1776359982030]