[{"data":1,"prerenderedAt":3886},["ShallowReactive",2],{"application-flags":3,"navbar":7,"always-visible-banner":95,"navbar-about-highlight":155,"navbar-resource-highlight":211,"use-case-page":256,"blog/the-most-advanced-clickfix-yet":1276},[4],{"name":5,"enabled":6},"maintenanceMode",false,[8,59,76],{"createdDate":9,"id":10,"name":11,"modelId":12,"published":13,"stageModifiedSincePublish":6,"query":14,"data":15,"variations":50,"lastUpdated":51,"firstPublished":52,"testRatio":33,"createdBy":53,"lastUpdatedBy":53,"folders":54,"meta":55,"rev":58},1742213002749,"efff2a27faf4408e9f908eba4b5542fe","inductive-automation","1c6207a5f24948ab82d4a0b17f251193","published",[],{"testimonial":16,"description":43,"type":19,"link":44,"title":47,"testimonialLink":48,"image":49},{"@type":17,"id":18,"model":19,"value":20},"@builder.io/core:Reference","f028f2b685bb47cd8bf9e82a26dd5a79","testimonial",{"query":21,"folders":22,"createdDate":23,"id":18,"name":24,"modelId":25,"published":13,"data":26,"variations":30,"lastUpdated":31,"firstPublished":32,"testRatio":33,"createdBy":34,"lastUpdatedBy":34,"meta":35,"rev":42},[],[],1735823466309,"We found Push to be more accurate when compared to competitors and the browser agent offered features that others couldn’t match.","42035571a56940ac98bff4544aa79aa5",{"author":27,"jobTitle":28,"quote":24,"image":29},"Jason Waits","\u003Cp>CISO at Inductive Automation\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Ff04c0c0689ce4a89ac0f0708d78c0a07",{},1735910703862,1735823501152,1,"ST0tXQM8slWpFrmioqKHmENB2qe2",{"kind":36,"lastPreviewUrl":37,"breakpoints":38,"hasAutosaves":41},"data","",{"small":39,"medium":40},640,768,true,"3v32gocrrqz","Join the industry's top security minds as they break down the browser attack landscape.",{"url":45,"text":46},"https://pushsecurity.com/webinar/state-of-browser-security","Save Your Spot","State of Browser Attacks Series","/customer-stories/inductive-automation","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fe94fca10aa7b46ac8052b7ea22de54cd",{},1776257019270,1742221533648,"CydmZnOWU1XuAaLhEDCoYNM4Z8W2",[],{"breakpoints":56,"kind":36,"lastPreviewUrl":37,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},320,"motto9r9yg",{"createdDate":60,"id":61,"name":62,"modelId":12,"published":13,"query":63,"data":64,"variations":69,"lastUpdated":70,"firstPublished":71,"testRatio":33,"createdBy":53,"lastUpdatedBy":72,"folders":73,"meta":74,"rev":58},1742208588866,"1c7a4e423bf54ac1a328bb4063459ef2","Banner",[],{"type":65,"url":66,"text":67,"link":68},"web-banner","https://pushsecurity.com/resources/browser-attacks-report","Get our latest report analyzing browser attack techniques in 2026",{},{},1774258294825,1742208637545,"jKjF9r5jcvXU8tzZEfFQm31Iyvr2",[],{"kind":36,"lastPreviewUrl":37,"breakpoints":75,"hasAutosaves":41},{"xsmall":57,"small":39,"medium":40},{"createdDate":77,"id":78,"name":79,"modelId":12,"published":13,"stageModifiedSincePublish":6,"query":80,"data":81,"variations":89,"lastUpdated":90,"firstPublished":91,"testRatio":33,"createdBy":53,"lastUpdatedBy":53,"folders":92,"meta":93,"rev":58},1742208469288,"6763051b201f44a0838c6400c580ca67","Resource highlight",[],{"image":82,"type":83,"description":84,"link":85,"title":88},"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F7b4a5ebf81d64e8c9d7fc35f6c96c4a9","resource","Learn about the latest techniques being used in the wild.",{"url":86,"text":87},"/resources/browser-attacks-report","Download now","Report: 2026 Browser Attack Techniques",{},1776255866789,1742208570400,[],{"kind":36,"lastPreviewUrl":37,"breakpoints":94,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},{"createdDate":96,"id":97,"name":98,"modelId":99,"published":13,"query":100,"data":101,"variations":145,"lastUpdated":146,"firstPublished":147,"testRatio":33,"createdBy":34,"lastUpdatedBy":148,"folders":149,"meta":150,"rev":154},1774965361051,"fd266d0172cc47429be7ad10f48c99ad","always visible banner","0678d178ec8b41efb8a23c09dba7874d",[],{"ctaText":102,"text":103,"url":37,"blocks":104,"state":141},"ewrererw","testrfesssssssssss",[105,129],{"@type":106,"@version":107,"id":108,"component":109,"responsiveStyles":119},"@builder.io/sdk:Element",2,"builder-ca12c06a52de41d7b8743da53118cd38",{"name":110,"tag":110,"options":111,"isRSC":118},"TopBannerContent",{"text":112,"ctaText":46,"url":45,"mainText":113,"cta":116},"New Webinar Series: Join John Hammond, Troy Hunt, and Matt Johansen for the State of Browser Attacks",{"content":114,"fontSize":115},"\u003Cp>New Webinar Series: Join John Hammond, Troy Hunt, and Matt Johansen for the State of Browser Attacks\u003C/p>","text-base",{"content":117,"fontSize":115,"url":45},"\u003Cp>\u003Cstrong style=\"font-weight:700;\">Save Your Spot\u003C/strong>\u003C/p>\n",null,{"large":120},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":126,"marginBottom":126,"fontSize":127,"fontWeight":128},"flex","column","relative","0","border-box",".56rem","1.125rem","700",{"id":130,"@type":106,"tagName":131,"properties":132,"responsiveStyles":136},"builder-pixel-08zrjigffq5t","img",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},"https://cdn.builder.io/api/v1/pixel?apiKey=f3a1111ff5be48cdbb123cd9f5795a05","true","presentation",{"large":137},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},"block","hidden","none",{"deviceSize":142,"location":143},"large",{"path":37,"query":144},{},{},1775137295127,1774968080803,"ax7YYfD0OCeqT1Vxxv1G4FUbqVr1",[],{"breakpoints":151,"hasLinks":6,"kind":152,"lastPreviewUrl":153,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},"component","https://pushsecurity.com/?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CeditProjects%2CmodifyMcpServers%2CmodifyWorkflowIntegrations%2CmodifyProjectSettings%2CconnectCodeRepository%2CcreateProjects%2CindexDesignSystems%2CsendPullRequests%2CmergePullRequests&builder.user.role.name=Developer&builder.user.role.id=developer&builder.cachebust=true&builder.preview=always-visible-banner&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.always-visible-banner=fd266d0172cc47429be7ad10f48c99ad&builder.overrides.fd266d0172cc47429be7ad10f48c99ad=fd266d0172cc47429be7ad10f48c99ad&builder.options.locale=Default","2lvuonnywj",[156,180],{"createdDate":157,"id":158,"name":159,"modelId":160,"published":13,"stageModifiedSincePublish":6,"query":161,"data":162,"variations":173,"lastUpdated":174,"firstPublished":175,"testRatio":33,"createdBy":53,"lastUpdatedBy":53,"folders":176,"meta":177,"rev":179},1776247359804,"9136a8f18b3b4a6ba29b8653a99372b1","testimonial-inductive-automation","20d9eaa352304613b3d1a794b400703d",[],{"link":163,"type":19,"testimonialLink":48,"testimonial":164},{},{"@type":17,"id":18,"model":19,"value":165},{"query":166,"folders":167,"createdDate":23,"id":18,"name":24,"modelId":25,"published":13,"data":168,"variations":169,"lastUpdated":31,"firstPublished":32,"testRatio":33,"createdBy":34,"lastUpdatedBy":34,"meta":170,"rev":172},[],[],{"author":27,"jobTitle":28,"quote":24,"image":29},{},{"kind":36,"lastPreviewUrl":37,"breakpoints":171,"hasAutosaves":41},{"small":39,"medium":40},"7t755zfvte3",{},1776247404986,1776247404973,[],{"breakpoints":178,"kind":36,"lastPreviewUrl":37,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},"4moh0qpywtr",{"createdDate":181,"id":182,"name":88,"modelId":160,"published":13,"meta":183,"stageModifiedSincePublish":6,"query":185,"data":186,"variations":207,"lastUpdated":208,"firstPublished":209,"testRatio":33,"createdBy":53,"lastUpdatedBy":53,"folders":210,"rev":179},1776255761419,"05a9322735fc427db12e2740e4302300",{"breakpoints":184,"kind":36,"lastPreviewUrl":37,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},[],{"testimonial":187,"link":206,"type":83,"title":88,"description":84,"image":82},{"@type":17,"id":188,"model":19,"value":189},"192acbb1f9ca4cac918c0ec435a8bae3",{"query":190,"folders":191,"createdDate":192,"id":188,"name":193,"modelId":25,"published":13,"data":194,"variations":200,"lastUpdated":201,"firstPublished":202,"testRatio":33,"createdBy":34,"lastUpdatedBy":53,"meta":203,"rev":205},[],[],1728981467463,"Push does for identity what CrowdStrike did for the endpoint",{"video":195,"jobTitle":196,"author":197,"qoute":37,"quote":198,"image":199},"https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F8b30e8ca50064058bbaef0f3c6164575%2Fcompressed?apiKey=f3a1111ff5be48cdbb123cd9f5795a05&token=8b30e8ca50064058bbaef0f3c6164575&alt=media&optimized=true","\u003Cp>Deputy CISO at Microsoft\u003C/p>\u003Cp>Former LinkedIn, Slack, Palantir\u003C/p>","Geoff Belknap","Push does for identity what CrowdStrike did for the endpoint.","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F748f0ad0a5064a00a13f4721fcc8dea1",{},1742902158597,1728981782923,{"kind":36,"lastPreviewUrl":37,"breakpoints":204,"hasAutosaves":41},{"small":39,"medium":40},"6s8ic0w0ao6",{"text":87,"url":86},{},1776255810913,1776255810900,[],[212,235],{"createdDate":213,"id":214,"name":88,"modelId":215,"published":13,"meta":216,"stageModifiedSincePublish":6,"query":218,"data":219,"variations":230,"lastUpdated":231,"firstPublished":232,"testRatio":33,"createdBy":53,"lastUpdatedBy":53,"folders":233,"rev":234},1776256900280,"1f429607996e4e5fae8fe3f9b9610e55","4829faa81e7c4ee8bd2d000e160e8d3c",{"breakpoints":217,"kind":36,"lastPreviewUrl":37,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},[],{"testimonial":220,"link":229,"type":83,"title":88,"description":84,"image":82},{"@type":17,"id":188,"model":19,"value":221},{"query":222,"folders":223,"createdDate":192,"id":188,"name":193,"modelId":25,"published":13,"data":224,"variations":225,"lastUpdated":201,"firstPublished":202,"testRatio":33,"createdBy":34,"lastUpdatedBy":53,"meta":226,"rev":228},[],[],{"video":195,"jobTitle":196,"author":197,"qoute":37,"quote":198,"image":199},{},{"kind":36,"lastPreviewUrl":37,"breakpoints":227,"hasAutosaves":41},{"small":39,"medium":40},"r77qqueuo3j",{"text":87,"url":86},{},1776256937553,1776256937540,[],"q0jkez80wkg",{"createdDate":236,"id":237,"name":11,"modelId":215,"published":13,"stageModifiedSincePublish":6,"query":238,"data":239,"variations":250,"lastUpdated":251,"firstPublished":252,"testRatio":33,"createdBy":53,"lastUpdatedBy":53,"folders":253,"meta":254,"rev":234},1776256949234,"ce043785b71b4ece98eac811ecf4ba10",[],{"link":240,"type":19,"testimonial":241,"testimonialLink":48},{},{"@type":17,"id":18,"model":19,"value":242},{"query":243,"folders":244,"createdDate":23,"id":18,"name":24,"modelId":25,"published":13,"data":245,"variations":246,"lastUpdated":31,"firstPublished":32,"testRatio":33,"createdBy":34,"lastUpdatedBy":34,"meta":247,"rev":249},[],[],{"author":27,"jobTitle":28,"quote":24,"image":29},{},{"kind":36,"lastPreviewUrl":37,"breakpoints":248,"hasAutosaves":41},{"small":39,"medium":40},"mnaneamy308",{},1776256974140,1776256974130,[],{"breakpoints":255,"kind":36,"lastPreviewUrl":37,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},[257,441,560,679,797,917,1037,1157],{"createdDate":258,"id":259,"name":260,"modelId":261,"published":13,"stageModifiedSincePublish":6,"query":262,"data":268,"variations":429,"lastUpdated":430,"firstPublished":431,"testRatio":33,"screenshot":432,"createdBy":34,"lastUpdatedBy":433,"folders":434,"meta":435,"rev":440},1744829487099,"387451215c314dd5bd654668cdc1a197","Zero-day phishing","cca4143377554c5a9163cc203a8ed2ba",[263],{"@type":264,"property":265,"operator":266,"value":267},"@builder.io/core:Query","urlPath","is","/uc/zero-day-phishing-protection",{"inputs":269,"customFonts":270,"seoTitle":318,"title":318,"tsCode":37,"seoDescription":319,"fontAwesomeIcon":320,"jsCode":37,"blocks":321,"url":267,"state":426},[],[271],{"family":272,"kind":273,"version":274,"lastModified":275,"files":276,"category":295,"menu":296,"subsets":297,"variants":300},"DM Sans","webfonts#webfont","v14","2023-07-13",{"100":277,"200":278,"300":279,"500":280,"600":281,"700":282,"800":283,"900":284,"800italic":285,"900italic":286,"700italic":287,"100italic":288,"italic":289,"regular":290,"200italic":291,"500italic":292,"300italic":293,"600italic":294},"https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAop1hTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAIpxhTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwA_JxhTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAkJxhTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAfJthTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwARZthTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAIpthTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAC5thTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat8JCm3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat8gCm3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat9uCm3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat-JDG3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat-JDW3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAopxhTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat8JDW3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat-7DW3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat_XDW3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat9XCm3zRmYJpso5.ttf","sans-serif","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAopxRT23z.ttf",[298,299],"latin","latin-ext",[301,302,303,304,305,306,128,307,308,309,310,311,312,313,314,315,316,317],"100","200","300","regular","500","600","800","900","100italic","200italic","300italic","italic","500italic","600italic","700italic","800italic","900italic","Zero-day phishing protection","Detect phishing TTPs directly in the browser and stop credential theft.","faFishingRod",[322,421],{"@type":106,"@version":107,"tagName":323,"id":324,"children":325},"div","builder-76c6b8d1499346c7bc1fd56ae4e93638",[326,343,351,358,370,385,396,407,413],{"@type":106,"@version":107,"layerName":327,"id":328,"component":329,"responsiveStyles":340},"UseCaseHero","builder-5228fe062bef4a40a91e43f1112832fa",{"name":327,"options":330,"isRSC":118},{"title":318,"description":331,"points":332,"video":339},"\u003Cp>Push detects phishing as it happens. Autonomous agents hunt for new phishing techniques, identify kit signatures, and deploy detections within minutes of a new attack being analyzed. From cloned login pages to AiTM credential harvesting, Push sees what traditional filters miss and stops threats before they escalate.\u003C/p>",[333,335,337],{"item":334},"Detect phishing that bypasses traditional filters, including AiTM, SSO password theft, and fake login pages",{"item":336},"Stop never-before-seen attacks with AI-native behavioral and on-page analysis inside the browser",{"item":338},"Investigate faster with unified browser, user, and page context","https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F40433ceeb4f94b43a82e039a0f4fd411%2Fcompressed?apiKey=f3a1111ff5be48cdbb123cd9f5795a05&token=40433ceeb4f94b43a82e039a0f4fd411&alt=media&optimized=true",{"large":341},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":342},"transparent",{"@type":106,"@version":107,"id":344,"component":345,"responsiveStyles":348},"builder-96634044407e491299e291ed64669e39",{"name":346,"options":347,"isRSC":118},"TrustedBy",{"AllPartners":41,"backgroundTransparent":6},{"large":349},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":350},"#000",{"@type":106,"@version":107,"id":352,"component":353,"responsiveStyles":356},"builder-2c3768f930534557bb8978e32b6a6a0f",{"name":354,"options":355,"isRSC":118},"Diagonal",{"darkMode":41},{"large":357},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"layerName":359,"id":360,"component":361,"responsiveStyles":368},"TextImageBlockVertical","builder-7c3c1c2840424db2ad2ccbfaf382dd64",{"name":359,"tag":359,"options":362,"isRSC":118},{"darkMode":6,"maxWidth":363,"maxTextWidth":364,"title":365,"description":366,"animatedTitle":37,"image":367,"reverse":6,"descriptionPaddingHorizontal":118},1200,800,"\u003Ch2>Why stop at the inbox?\u003C/h2>","\u003Cp>Phishing attacks have evolved. Whether attackers lure users with QR codes, instant messages, or OAuth consent screens, the outcome is the same: it plays out in the browser. Push gives you real-time detection for in-browser threats, stopping phishing and consent-based attacks before they lead to compromise\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F7fdcac241f0e4a049166d7076858adeb",{"large":369},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":371,"component":372,"responsiveStyles":380},"builder-41c978b3669749cf947e622b4e79e4d7",{"name":373,"options":374,"isRSC":118},"TextImageBlockHorizontal",{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":376,"title":377,"description":378,"reverse":41,"image":379},600,100,"\u003Cp>Detect phishing at the edge\u003C/p>","\u003Cp>Push uses industry-first telemetry to detect phishing based on behavior, not static indicators. Autonomous agents analyze how phishing pages behave and how users interact with them, uncovering fake logins, credential theft, and phishing kits the moment they load in the browser.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F9df3d180c97b4e61af142af2ccd68721",{"large":381},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"fontFamily":382,"paddingTop":383,"marginTop":384},"DM Sans, sans-serif","20px","0px",{"@type":106,"@version":107,"id":386,"component":387,"responsiveStyles":393},"builder-d2a7bc941feb43cdb898bc116b203cf9",{"name":373,"options":388,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":389,"title":390,"description":391,"reverse":6,"image":392},120,"\u003Ch2>Go beyond blocklists and IOCs\u003C/h2>","\u003Cp>Push goes beyond URLs and easy-to-change indicators. It reads the full phishing playbook like script behavior, session hijacks, DOM changes, user inputs, then connects the dots in real time. This gives your team a complete picture of how the phishing attempt worked, not just an alert.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fabfd58db169b433e96d3f1261797156e",{"large":394},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":395},"36px",{"@type":106,"@version":107,"layerName":373,"id":397,"component":398,"responsiveStyles":404},"builder-42c32198083f4880acb37c5cb76934da",{"name":373,"options":399,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":400,"title":401,"description":402,"reverse":41,"image":403},140,"\u003Ch2>Enhance your phishing response\u003C/h2>","\u003Cp>When phishing enters your environment, speed matters. Push gives you instant access to the telemetry that counts like session data, user behavior, and page activity, so you can investigate fast, trigger in-browser prompts, or forward alerts to your SIEM or SOAR for response. All in real time, right from the browser.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fbb195aec46904056b85e8688629e558e",{"large":405},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":406},"47px",{"@type":106,"@version":107,"id":408,"component":409,"responsiveStyles":411},"builder-9a95b9cbc4854421a92ef7b90f6c7adb",{"name":354,"options":410,"isRSC":118},{"darkMode":6},{"large":412},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":414,"component":415,"responsiveStyles":419},"builder-0afa17a9f25c4661a90f314d5578aa18",{"name":416,"tag":416,"options":417,"isRSC":118},"LatestResources",{"sectionHeading":37,"customClass":418},"bg-black",{"large":420},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":422,"@type":106,"tagName":131,"properties":423,"responsiveStyles":424},"builder-pixel-21yj6h3p4wh",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":425},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":427},{"path":37,"query":428},{},{},1776275046831,1745499158657,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fff60c30a8442489c8ed7e0af9599d14f","kYgMv6WsbvfmlOUYqR2SFwGzw6e2",[],{"lastPreviewUrl":436,"winningTest":118,"breakpoints":437,"kind":438,"hasLinks":6,"originalContentId":439,"hasAutosaves":6},"https://pushsecurity.com/uc/zero-day-phishing-protection?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CcreateProjects%2CsendPullRequests&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=387451215c314dd5bd654668cdc1a197&builder.overrides.387451215c314dd5bd654668cdc1a197=387451215c314dd5bd654668cdc1a197&builder.overrides.use-case-page:/uc/zero-day-phishing-protection=387451215c314dd5bd654668cdc1a197&builder.options.locale=Default",{"xsmall":57,"small":39,"medium":40},"page","2daa5670b8504fc7ba4700633e8bd921","atvz4dp24b7",{"createdDate":442,"id":443,"name":444,"modelId":261,"published":13,"stageModifiedSincePublish":6,"query":445,"data":448,"variations":552,"lastUpdated":553,"firstPublished":554,"testRatio":33,"screenshot":555,"createdBy":34,"lastUpdatedBy":433,"folders":556,"meta":557,"rev":440},1756833377777,"54f8256648f54d439303734b1e69221b","Browser extension security",[446],{"@type":264,"property":265,"operator":266,"value":447},"/uc/browser-extension-security",{"seoDescription":449,"jsCode":37,"fontAwesomeIcon":450,"tsCode":37,"title":444,"seoTitle":444,"customFonts":451,"inputs":456,"blocks":457,"url":447,"state":549},"Shine a light on risky browser extensions.","faPuzzlePiece",[452],{"kind":273,"family":272,"version":274,"files":453,"category":295,"lastModified":275,"subsets":454,"variants":455,"menu":296},{"100":277,"200":278,"300":279,"500":280,"600":281,"700":282,"800":283,"900":284,"100italic":288,"italic":289,"regular":290,"900italic":286,"800italic":285,"700italic":287,"200italic":291,"300italic":293,"500italic":292,"600italic":294},[298,299],[301,302,303,304,305,306,128,307,308,309,310,311,312,313,314,315,316,317],[],[458,544],{"@type":106,"@version":107,"tagName":323,"id":459,"meta":460,"children":461},"builder-71d0648c1d2f4ede8d0d0b5b28b7b94c",{"previousId":324},[462,478,485,492,501,511,521,531,538],{"@type":106,"@version":107,"id":463,"meta":464,"component":465,"responsiveStyles":476},"builder-ff325b4b8fad4edea53f38865947e854",{"previousId":328},{"name":327,"options":466,"isRSC":118},{"title":444,"description":467,"points":468,"video":475},"\u003Cp>Browser extensions introduce new code, new permissions, and new potential for risk. Many include AI features, and most go completely unnoticed. Push gives you full visibility into every extension used across your workforce, across major browsers, so you can uncover shadow IT, assess risky permissions, and block unsafe tools before they lead to compromise.\u003C/p>",[469,471,473],{"item":470},"Discover every browser extension in use",{"item":472},"Spot risky or unsanctioned behavior",{"item":474},"Make informed decisions on extension policy","https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fc538aad95d7f403aa3c3551af72f67c0?alt=media&token=1411fa6d-2eac-4e6c-94bf-ea117da12d67&apiKey=f3a1111ff5be48cdbb123cd9f5795a05",{"large":477},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":342},{"@type":106,"@version":107,"id":479,"meta":480,"component":481,"responsiveStyles":483},"builder-fb89d128c64e47cf9cbb11d90fc24523",{"previousId":344},{"name":346,"options":482,"isRSC":118},{"AllPartners":41,"backgroundTransparent":6},{"large":484},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":350},{"@type":106,"@version":107,"id":486,"meta":487,"component":488,"responsiveStyles":490},"builder-54388d35126c4d0096eeebaf8c4448cd",{"previousId":352},{"name":354,"options":489,"isRSC":118},{"darkMode":41},{"large":491},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"layerName":359,"id":493,"component":494,"responsiveStyles":499},"builder-3c8fa6785dd6466abf52a2470d66d85a",{"name":359,"tag":359,"options":495,"isRSC":118},{"darkMode":6,"maxWidth":363,"maxTextWidth":364,"title":496,"description":497,"image":498,"reverse":6},"\u003Ch2>Take control of browser extensions\u003C/h2>","\u003Cp>Attackers are increasingly using malicious browser extensions to gain access to data processed and stored in the browser. And the problem is, most security teams have no visibility into what extensions are being used. Push changes that. With browser-native telemetry, the Push extension continuously inventories browser extensions across your environment, flags the risky ones, and gives you intelligence to act.&nbsp;\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F0a004f16a6874f4c8fdf14344acc9fec",{"large":500},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":502,"meta":503,"component":504,"responsiveStyles":509},"builder-93738f98109a4009affb349afd7bb182",{"previousId":371},{"name":373,"options":505,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":376,"title":506,"description":507,"reverse":41,"image":508},"\u003Ch2>Discover every extension in use\u003C/h2>","\u003Cp>Push gives you structured, searchable data about every extension in your environment, so you’re not just seeing what’s there, but also understanding how it got there, what it can do, and who it affects. It’s the kind of granular insight that’s nearly impossible to get from traditional tools, and it lays the groundwork for better policy decisions and faster investigations.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F0e5727ca99474f14b1b7916bf6bbb782",{"large":510},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"fontFamily":382,"paddingTop":383,"marginTop":384},{"@type":106,"@version":107,"id":512,"meta":513,"component":514,"responsiveStyles":519},"builder-83393acb12ee4fdd840839185b51edb4",{"previousId":386},{"name":373,"options":515,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":389,"title":516,"description":517,"reverse":6,"image":518},"\u003Ch2>Spot risky or malicious extensions\u003C/h2>","\u003Cp>Push highlights extensions with dangerous permissions, broad access, or poor reputations. This includes AI extensions that request access far beyond what their stated purpose requires. You can quickly detect sideloaded, manually installed, or development-mode extensions that bypass normal controls. And because Push shows you who’s using them and where, you can respond precisely and effectively.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fa104d58c8da34fbb8901f738fb21453b",{"large":520},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":395},{"@type":106,"@version":107,"layerName":373,"id":522,"meta":523,"component":524,"responsiveStyles":529},"builder-da98e3de949646d89c53a0d1c2784664",{"previousId":397},{"name":373,"options":525,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":400,"title":526,"description":527,"reverse":41,"image":528},"\u003Ch2>Accelerate security reviews\u003C/h2>","\u003Cp>Most teams have extension policies, they just don’t have the data to enforce them. Push reveals how each extension entered your environment, whether it was installed manually, sideloaded, or deployed in dev mode. You’ll see which users are running what, and where, so you can surface violations, investigate quickly, and respond with confidence.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F229f355be6f243b180f410d237a75bb3",{"large":530},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":406},{"@type":106,"@version":107,"id":532,"meta":533,"component":534,"responsiveStyles":536},"builder-1a689287d1a1418997d57db578a71105",{"previousId":408},{"name":354,"options":535,"isRSC":118},{"darkMode":6},{"large":537},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":539,"component":540,"responsiveStyles":542},"builder-feb4e75029f84c10b6498ef1f8f79128",{"name":416,"tag":416,"options":541,"isRSC":118},{"sectionHeading":37,"customClass":418},{"large":543},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":545,"@type":106,"tagName":131,"properties":546,"responsiveStyles":547},"builder-pixel-0edn39avfcei",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":548},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":550},{"path":37,"query":551},{},{},1776275365038,1757000441666,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F8d496cf111644ee5afcc046b72d1ca5a",[],{"kind":438,"winningTest":118,"breakpoints":558,"lastPreviewUrl":559,"hasLinks":6,"originalContentId":259,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},"https://pushsecurity.com/uc/browser-extension-security?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CcreateProjects%2CsendPullRequests&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=54f8256648f54d439303734b1e69221b&builder.overrides.54f8256648f54d439303734b1e69221b=54f8256648f54d439303734b1e69221b&builder.overrides.use-case-page:/uc/browser-extension-security=54f8256648f54d439303734b1e69221b&builder.options.locale=Default",{"createdDate":561,"id":562,"name":563,"modelId":261,"published":13,"query":564,"data":567,"variations":670,"lastUpdated":671,"firstPublished":672,"testRatio":33,"screenshot":673,"createdBy":34,"lastUpdatedBy":674,"folders":675,"meta":676,"rev":440},1744923509705,"94bebb7bb99d48629ad157e80cf4d81d","Account takeover detection",[565],{"@type":264,"property":265,"operator":266,"value":566},"/uc/account-takeover-detection",{"title":563,"customFonts":568,"jsCode":37,"seoTitle":563,"seoDescription":573,"fontAwesomeIcon":574,"tsCode":37,"blocks":575,"url":566,"state":667},[569],{"kind":273,"category":295,"variants":570,"menu":296,"files":571,"family":272,"subsets":572,"version":274,"lastModified":275},[301,302,303,304,305,306,128,307,308,309,310,311,312,313,314,315,316,317],{"100":277,"200":278,"300":279,"500":280,"600":281,"700":282,"800":283,"900":284,"300italic":293,"500italic":292,"800italic":285,"700italic":287,"italic":289,"900italic":286,"600italic":294,"200italic":291,"regular":290,"100italic":288},[298,299],"Stop ATO with stolen credential and compromised token detection.","faUserSecret",[576,662],{"@type":106,"@version":107,"tagName":323,"id":577,"meta":578,"children":579},"builder-e7913a774cae44c5a23d6081c5c30a52",{"previousId":324},[580,596,603,610,619,629,639,649,656],{"@type":106,"@version":107,"id":581,"meta":582,"component":583,"responsiveStyles":594},"builder-f1f1ab1601bc4c0f8c2a8aafd173675d",{"previousId":328},{"name":327,"options":584,"isRSC":118},{"title":563,"description":585,"points":586,"video":593},"\u003Cp>Attackers don’t need to phish, they just need a password that works. Push monitors for signs of credential-based attacks in real time, directly in the browser, catching account takeover attempts before the damage spreads. From ghost logins to credential stuffing, Push cuts off the paths attackers use to quietly slip in the back door.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>",[587,589,591],{"item":588},"Identify credential-based ATO as it unfolds",{"item":590},"Surface hijacked sessions and token misuse",{"item":592},"Strengthen authentication where your IdP can’t","https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fb4dd9db24bc9495b8a686b1b4d492016%2Fcompressed?apiKey=f3a1111ff5be48cdbb123cd9f5795a05&token=b4dd9db24bc9495b8a686b1b4d492016&alt=media&optimized=true",{"large":595},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":342},{"@type":106,"@version":107,"id":597,"meta":598,"component":599,"responsiveStyles":601},"builder-0bc0d1c78ece4994993c3a6427a4d533",{"previousId":344},{"name":346,"options":600,"isRSC":118},{"AllPartners":41,"backgroundTransparent":6},{"large":602},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":350},{"@type":106,"@version":107,"id":604,"meta":605,"component":606,"responsiveStyles":608},"builder-e45de8f3768c4f16938dbf78e4e87524",{"previousId":352},{"name":354,"options":607,"isRSC":118},{"darkMode":41},{"large":609},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":611,"component":612,"responsiveStyles":617},"builder-c98e8bfd341146c1b67c02d5698ff093",{"name":359,"tag":359,"options":613,"isRSC":118},{"darkMode":6,"maxWidth":363,"maxTextWidth":364,"title":614,"description":615,"image":616,"reverse":6},"\u003Ch2>Assume less. See more.\u003C/h2>","\u003Cp>Most account takeovers don’t start with a breach, they start with a login. Whether it’s a reused password, a local account, or an outdated login flow, Push shows you how accounts are actually accessed day to day, not just how policies say they should be. That means no more blind spots around ghost logins, bypassed SSO, or stale access paths that quietly persist.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F18630ad2746d4eb7b7fcc0428b11a8f0",{"large":618},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":620,"meta":621,"component":622,"responsiveStyles":627},"builder-55c1fc38ddc04fd1a0d6a8e2fb819e00",{"previousId":371},{"name":373,"options":623,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":376,"title":624,"description":625,"reverse":41,"image":626},"\u003Ch2>Catch stolen credential use in real time\u003C/h2>","\u003Cp>Push monitors login activity directly in the browser to detect signs of credential-based attacks like leaked password use or suspicious login flows. By analyzing attacker TTPs instead of relying on known indicators, Push spots credential stuffing and account takeover attempts the moment they begin, not after they’ve succeeded.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F52b0123cac2c4dfdb1dc0af6adf9d603",{"large":628},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"fontFamily":382,"paddingTop":384,"marginTop":384},{"@type":106,"@version":107,"id":630,"meta":631,"component":632,"responsiveStyles":637},"builder-dfb31737b30948c6b95323655d571a50",{"previousId":386},{"name":373,"options":633,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":389,"title":634,"description":635,"reverse":6,"image":636},"\u003Ch2>Detect session hijacks and stealth access\u003C/h2>","\u003Cp>Attackers don’t always need a login screen, they often sidestep it entirely using stolen session tokens. Push detects when valid sessions are reused in unexpected ways, identifying hijacked sessions and stealth access attempts that traditional tools miss. Because we monitor directly in the browser, you see what’s happening inside active sessions in real time.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F94a6859a99e04d309ffe5841f3dbdf5c",{"large":638},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":395},{"@type":106,"@version":107,"layerName":373,"id":640,"meta":641,"component":642,"responsiveStyles":647},"builder-f7585b90eb974d03a7dc7eae5b58d227",{"previousId":397},{"name":373,"options":643,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":400,"title":644,"description":645,"reverse":41,"image":646},"\u003Ch2>Harden accounts before they’re compromised\u003C/h2>","\u003Cp>Push goes beyond alerts. It identifies apps that still allow local logins, even when SSO is configured, so you can remove weak access paths. Push also flags users without MFA, reused work credentials, or weak passwords, and prompts users in-browser to fix risky behaviors before they’re exploited.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F01c1b638f1b6497093a4f2b8ceddb5bb",{"large":648},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":406},{"@type":106,"@version":107,"id":650,"meta":651,"component":652,"responsiveStyles":654},"builder-ad81d1e3afec49a791214194eae09bdc",{"previousId":408},{"name":354,"options":653,"isRSC":118},{"darkMode":6},{"large":655},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":657,"component":658,"responsiveStyles":660},"builder-8dac1aa4b9d148628d92252bd8eff822",{"name":416,"tag":416,"options":659,"isRSC":118},{"sectionHeading":37,"customClass":418},{"large":661},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":663,"@type":106,"tagName":131,"properties":664,"responsiveStyles":665},"builder-pixel-s5u3wmvz7jq",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":666},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":668},{"path":37,"query":669},{},{},1770892814499,1745499162732,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F58b660fa94aa4b30b0faeb9b663ae41a","SfUPqW5tkibIPby49keNFMdHFTr1",[],{"lastPreviewUrl":677,"hasLinks":6,"originalContentId":259,"breakpoints":678,"winningTest":118,"kind":438,"hasAutosaves":41},"https://pushsecurity.com/uc/account-takeover-detection?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CeditProjects%2CmodifyMcpServers%2CmodifyWorkflowIntegrations%2CmodifyProjectSettings%2CconnectCodeRepository%2CcreateProjects%2CindexDesignSystems%2CsendPullRequests&builder.user.role.name=Developer&builder.user.role.id=developer&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=94bebb7bb99d48629ad157e80cf4d81d&builder.overrides.94bebb7bb99d48629ad157e80cf4d81d=94bebb7bb99d48629ad157e80cf4d81d&builder.overrides.use-case-page:/uc/account-takeover-detection=94bebb7bb99d48629ad157e80cf4d81d&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"xsmall":57,"small":39,"medium":40},{"createdDate":680,"id":681,"name":682,"modelId":261,"published":13,"query":683,"data":686,"variations":789,"lastUpdated":790,"firstPublished":791,"testRatio":33,"screenshot":792,"createdBy":34,"lastUpdatedBy":674,"folders":793,"meta":794,"rev":440},1745009370904,"23eb48fb56d3451cab77cb6ed140ee6d","Attack path hardening",[684],{"@type":264,"property":265,"operator":266,"value":685},"/uc/attack-path-hardening",{"tsCode":37,"seoDescription":687,"jsCode":37,"customFonts":688,"fontAwesomeIcon":693,"seoTitle":682,"title":682,"blocks":694,"url":685,"state":786},"Harden access paths with visibility,  detection, and guardrails.",[689],{"kind":273,"files":690,"version":274,"lastModified":275,"subsets":691,"menu":296,"category":295,"variants":692,"family":272},{"100":277,"200":278,"300":279,"500":280,"600":281,"700":282,"800":283,"900":284,"regular":290,"italic":289,"800italic":285,"500italic":292,"600italic":294,"200italic":291,"900italic":286,"700italic":287,"100italic":288,"300italic":293},[298,299],[301,302,303,304,305,306,128,307,308,309,310,311,312,313,314,315,316,317],"faRadar",[695,781],{"@type":106,"@version":107,"tagName":323,"id":696,"meta":697,"children":698},"builder-1d8553eddcaa44d7bba9e2f4ca13af2a",{"previousId":577},[699,715,722,729,738,748,758,768,775],{"@type":106,"@version":107,"id":700,"meta":701,"component":702,"responsiveStyles":713},"builder-84fe3d7c85a743cf8cef649aa974f1ef",{"previousId":581},{"name":327,"options":703,"isRSC":118},{"title":682,"description":704,"points":705,"video":712},"\u003Cp>Push continuously monitors your environment for exposed login paths, weak credentials, and missing protections like MFA. It detects the gaps attackers exploit and helps you close them before they’re used.\u003C/p>",[706,708,710],{"item":707},"Find weak spots like reused passwords, local logins, and missing MFA",{"item":709},"Monitor how users actually log in across apps, flows, and tools",{"item":711},"Enforce secure access with in-browser guardrails","https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fdbdcf52892034f1bbddded77f753a343%2Fcompressed?apiKey=f3a1111ff5be48cdbb123cd9f5795a05&token=dbdcf52892034f1bbddded77f753a343&alt=media&optimized=true",{"large":714},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":342},{"@type":106,"@version":107,"id":716,"meta":717,"component":718,"responsiveStyles":720},"builder-b3f66f5b08054cc78a06fecfc3ae2337",{"previousId":597},{"name":346,"options":719,"isRSC":118},{"AllPartners":41,"backgroundTransparent":6},{"large":721},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":350},{"@type":106,"@version":107,"id":723,"meta":724,"component":725,"responsiveStyles":727},"builder-4c73418b84be49ed85e6e13d2625c5a0",{"previousId":604},{"name":354,"options":726,"isRSC":118},{"darkMode":41},{"large":728},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":730,"component":731,"responsiveStyles":736},"builder-dec0246085e1485c803f7152b1922a81",{"name":359,"tag":359,"options":732,"isRSC":118},{"darkMode":6,"maxWidth":363,"maxTextWidth":364,"title":733,"description":734,"image":735,"reverse":6},"\u003Ch2>Find the gaps that lead to compromise\u003C/h2>","\u003Cp>Misconfigurations don’t show up in your config files, they show up in how users actually access apps. Push monitors real login behavior in the browser, surfacing risky patterns like local login access, duplicate accounts, or missing protections that leave doors wide open.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F309a59bba8d247a19476bb369397460e",{"large":737},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":739,"meta":740,"component":741,"responsiveStyles":746},"builder-ebf049a645604a249550996a88f8f3b6",{"previousId":620},{"name":373,"options":742,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":376,"title":743,"description":744,"reverse":41,"image":745},"\u003Ch2>See real login behavior\u003C/h2>","\u003Cp>Push watches authentication flows as they happen, giving you a live view of how users log in, which methods they choose, and where protections like MFA are missing. Plus, uncover every app and account in use, even shadow IT you didn’t know existed, without relying on stale config files or IdP assumptions. \u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fb51f6b0357cc451b87a7a5016d984e5e",{"large":747},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"fontFamily":382,"paddingTop":383,"marginTop":384},{"@type":106,"@version":107,"id":749,"meta":750,"component":751,"responsiveStyles":756},"builder-431d175c59004669b0b2776b07d71737",{"previousId":630},{"name":373,"options":752,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":389,"title":753,"description":754,"reverse":6,"image":755},"\u003Ch2>Find and fix posture drift\u003C/h2>","\u003Cp>Security posture isn’t static. Push continuously monitors for issues like missing MFA or legacy login methods. When something falls out of policy, you know immediately with custom notifications so you can act before it turns into risk.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F324e39127dfc41e592b1183dfb39892d",{"large":757},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":395},{"@type":106,"@version":107,"layerName":373,"id":759,"meta":760,"component":761,"responsiveStyles":766},"builder-3dffdcbe0a484e2ca4c03f019b6d40ee",{"previousId":640},{"name":373,"options":762,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":400,"title":763,"description":764,"reverse":41,"image":765},"\u003Ch2>Guide users with in-browser guardrails\u003C/h2>","\u003Cp>Push doesn’t just surface problems, it helps you fix them. When users sign in without MFA, reuse a password, or use insecure credentials, Push prompts them directly in the browser to secure their access. It’s faster, more effective, and actually gets results.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fee8b75d13e45488aba55434a8b49ebb0",{"large":767},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":406},{"@type":106,"@version":107,"id":769,"meta":770,"component":771,"responsiveStyles":773},"builder-976bc222cd7647ff905f1e01cfedc453",{"previousId":650},{"name":354,"options":772,"isRSC":118},{"darkMode":6},{"large":774},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":776,"component":777,"responsiveStyles":779},"builder-8c47ec2fd0f74382bb3e6c870555632c",{"name":416,"tag":416,"options":778,"isRSC":118},{"sectionHeading":37,"customClass":418},{"large":780},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":782,"@type":106,"tagName":131,"properties":783,"responsiveStyles":784},"builder-pixel-7akm7dayau8",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":785},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":787},{"path":37,"query":788},{},{},1770892844854,1745499166112,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F6ca12bf728a045f1a31d40c0beb3bfe5",[],{"kind":438,"lastPreviewUrl":795,"breakpoints":796,"hasLinks":6,"originalContentId":562,"winningTest":118,"hasAutosaves":6},"https://pushsecurity.com/uc/attack-path-hardening?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CeditProjects%2CmodifyMcpServers%2CmodifyWorkflowIntegrations%2CmodifyProjectSettings%2CconnectCodeRepository%2CcreateProjects%2CindexDesignSystems%2CsendPullRequests&builder.user.role.name=Developer&builder.user.role.id=developer&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=23eb48fb56d3451cab77cb6ed140ee6d&builder.overrides.23eb48fb56d3451cab77cb6ed140ee6d=23eb48fb56d3451cab77cb6ed140ee6d&builder.overrides.use-case-page:/uc/attack-path-hardening=23eb48fb56d3451cab77cb6ed140ee6d&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"xsmall":57,"small":39,"medium":40},{"createdDate":798,"id":799,"name":800,"modelId":261,"published":13,"query":801,"data":804,"variations":909,"lastUpdated":910,"firstPublished":911,"testRatio":33,"screenshot":912,"createdBy":34,"lastUpdatedBy":674,"folders":913,"meta":914,"rev":440},1761675020232,"ea4f309d2ffe46c5aa97ebf0fda4e2e3","ClickFix Protection",[802],{"@type":264,"property":265,"operator":266,"value":803},"/uc/clickfix-protection",{"seoDescription":805,"fontAwesomeIcon":806,"customFonts":807,"seoTitle":812,"jsCode":37,"tsCode":37,"title":812,"blocks":813,"url":803,"state":906},"Block attacks that trick users into running malicious code.","faLaptopCode",[808],{"files":809,"subsets":810,"menu":296,"version":274,"kind":273,"family":272,"lastModified":275,"variants":811,"category":295},{"100":277,"200":278,"300":279,"500":280,"600":281,"700":282,"800":283,"900":284,"200italic":291,"800italic":285,"700italic":287,"600italic":294,"100italic":288,"italic":289,"regular":290,"300italic":293,"500italic":292,"900italic":286},[298,299],[301,302,303,304,305,306,128,307,308,309,310,311,312,313,314,315,316,317],"ClickFix protection",[814,901],{"@type":106,"@version":107,"tagName":323,"id":815,"meta":816,"children":817},"builder-d7eefdde0f2a4b2b9de3dcb2978fd6cb",{"previousId":696},[818,834,841,848,858,868,878,888,895],{"@type":106,"@version":107,"id":819,"meta":820,"component":821,"responsiveStyles":832},"builder-56e2c54bcce040a4af8b92ae03706c12",{"previousId":700},{"name":327,"options":822,"isRSC":118},{"title":812,"description":823,"points":824,"image":831},"\u003Cp>ClickFix attacks are one of the fastest-growing threats, tricking users into copying malicious code from a webpage and running it locally. This technique bypasses traditional EDR, email gateways, and network filters, leading directly to ransomware and data theft. Push stops this attack at the source, in the browser, by detecting and blocking the malicious behavior before the user can ever paste the code.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>",[825,827,829],{"item":826},"Detect ClickFix, FileFix, and fake CAPTCHA in the browser",{"item":828},"Block malicious copy-and-paste actions before code is executed",{"item":830},"See full telemetry into which users were targeted and what they saw","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F7b74af62889847ebb3927364485b0546",{"large":833},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":342},{"@type":106,"@version":107,"id":835,"meta":836,"component":837,"responsiveStyles":839},"builder-05f9614d4e3e4dc88b3ee8658f54e10e",{"previousId":716},{"name":346,"options":838,"isRSC":118},{"AllPartners":41,"backgroundTransparent":6},{"large":840},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":350},{"@type":106,"@version":107,"id":842,"meta":843,"component":844,"responsiveStyles":846},"builder-c4fb5179366243c1b6c32d368675cf47",{"previousId":723},{"name":354,"options":845,"isRSC":118},{"darkMode":41},{"large":847},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":849,"meta":850,"component":851,"responsiveStyles":856},"builder-261af50705fd445d8cca4a6ba20d5391",{"previousId":730},{"name":359,"tag":359,"options":852,"isRSC":118},{"darkMode":6,"maxWidth":363,"maxTextWidth":364,"title":853,"description":854,"reverse":6,"image":855},"\u003Ch2>Stop ClickFix-style attacks before they become a breach\u003C/h2>","\u003Cp>Traditional security tools are blind to malicious copy and paste attacks because the attack exploits a gap between the browser and the endpoint. EDR only sees the payload after it runs, and network tools see only part of the picture.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F98b2f7e08dec4eafaf8e24937605b8cf",{"large":857},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":859,"meta":860,"component":861,"responsiveStyles":866},"builder-7d21b8aab8064c40b1e5dd23c4749309",{"previousId":739},{"name":373,"options":862,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":376,"title":863,"description":864,"reverse":41,"image":865},"\u003Ch2>Discover lures at the source\u003C/h2>","\u003Cp>Push inspects page behavior to identify ClickFix attacks as they happen. By inspecting the page, its structure, and how the user interacts with it, Push can detect and block these in-browser threats in real time. This deep, TTP-based inspection spots the trap even on novel pages that are built to bypass traditional web filters and blocklists.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F665bf47e01544c75bf9ddafd3917927b",{"large":867},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"fontFamily":382,"paddingTop":383,"marginTop":384},{"@type":106,"@version":107,"id":869,"meta":870,"component":871,"responsiveStyles":876},"builder-fb91943adf6149259ed9e1e6566c9afe",{"previousId":749},{"name":373,"options":872,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":389,"title":873,"description":874,"reverse":6,"image":875},"\u003Ch2>Block the malicious action\u003C/h2>","\u003Cp>When Push detects a malicious script, it intercepts the user's action and blocks the code from being copied to the clipboard. The user is protected, the attack is stopped, and no malicious code ever reaches the endpoint. Unlike broad DLP tools, this action is surgical, targeting only malicious behavior without disrupting normal work.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F5ee68f81f1ac416685cbfe91298cf827",{"large":877},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":395},{"@type":106,"@version":107,"layerName":373,"id":879,"meta":880,"component":881,"responsiveStyles":886},"builder-bfac95fada864e5a8259b955b5b5f98b",{"previousId":759},{"name":373,"options":882,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":400,"title":883,"description":884,"reverse":41,"image":885},"\u003Ch2>Accelerate ClickFix investigations\u003C/h2>","\u003Cp>When an attack happens, knowing what the user saw or did is critical. Push provides rich browser session data for rapid investigation and containment. Security teams get detailed telemetry on which users were targeted, what lure they were served, and when the block occurred. This enables defenders to reconstruct what happened and respond quickly, even when other tools miss the activity entirely.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F6cdf2a8aeddc4e9a9023cbf974e40239",{"large":887},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":406},{"@type":106,"@version":107,"id":889,"meta":890,"component":891,"responsiveStyles":893},"builder-136892e831684a6987f87d3be67c33d1",{"previousId":769},{"name":354,"options":892,"isRSC":118},{"darkMode":6},{"large":894},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":896,"component":897,"responsiveStyles":899},"builder-dec26b739f2f42beb5a73cfc6c675b60",{"name":416,"tag":416,"options":898,"isRSC":118},{"sectionHeading":37,"customClass":418},{"large":900},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":902,"@type":106,"tagName":131,"properties":903,"responsiveStyles":904},"builder-pixel-zzjpxxgrc2l",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":905},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":907},{"path":37,"query":908},{},{},1770892881888,1761847585203,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F375467b8bef34ed1a8a1cc5b8b67d75f",[],{"lastPreviewUrl":915,"originalContentId":681,"winningTest":118,"hasLinks":6,"kind":438,"breakpoints":916,"hasAutosaves":6},"https://pushsecurity.com/uc/clickfix-protection?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CeditProjects%2CmodifyMcpServers%2CmodifyWorkflowIntegrations%2CmodifyProjectSettings%2CconnectCodeRepository%2CcreateProjects%2CindexDesignSystems%2CsendPullRequests&builder.user.role.name=Developer&builder.user.role.id=developer&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=ea4f309d2ffe46c5aa97ebf0fda4e2e3&builder.overrides.ea4f309d2ffe46c5aa97ebf0fda4e2e3=ea4f309d2ffe46c5aa97ebf0fda4e2e3&builder.overrides.use-case-page:/uc/clickfix-protection=ea4f309d2ffe46c5aa97ebf0fda4e2e3&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"xsmall":57,"small":39,"medium":40},{"createdDate":918,"id":919,"name":920,"modelId":261,"published":13,"query":921,"data":924,"variations":1029,"lastUpdated":1030,"firstPublished":1031,"testRatio":33,"screenshot":1032,"createdBy":34,"lastUpdatedBy":674,"folders":1033,"meta":1034,"rev":440},1745009743870,"a9d5556e77f84a37b5bd52310a7110c1","Incident response",[922],{"@type":264,"property":265,"operator":266,"value":923},"/uc/incident-response",{"seoDescription":925,"customFonts":926,"title":920,"jsCode":37,"fontAwesomeIcon":931,"seoTitle":932,"tsCode":37,"blocks":933,"url":923,"state":1026},"Investigate and respond faster with unique browser telemetry.",[927],{"kind":273,"subsets":928,"menu":296,"variants":929,"category":295,"family":272,"version":274,"lastModified":275,"files":930},[298,299],[301,302,303,304,305,306,128,307,308,309,310,311,312,313,314,315,316,317],{"100":277,"200":278,"300":279,"500":280,"600":281,"700":282,"800":283,"900":284,"900italic":286,"600italic":294,"200italic":291,"300italic":293,"100italic":288,"700italic":287,"800italic":285,"regular":290,"italic":289,"500italic":292},"faSatelliteDish","Browser based incident response",[934,1021],{"@type":106,"@version":107,"tagName":323,"id":935,"meta":936,"children":937},"builder-653c4aed737b4def88dc4cd2d695660a",{"previousId":696},[938,955,962,969,978,988,998,1008,1015],{"@type":106,"@version":107,"id":939,"meta":940,"component":941,"responsiveStyles":953},"builder-18190bd36518467d9154d27d7e945b9b",{"previousId":700},{"name":327,"options":942,"isRSC":118},{"title":943,"description":944,"points":945,"video":952},"Browser-based incident response","\u003Cp>Push gives you real-time visibility into what actually happened during a breach, right in the browser where the attack played out. From credential theft to session hijacking, Push captures high-fidelity telemetry so you can investigate quickly, contain confidently, and shut it down before it spreads.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>",[946,948,950],{"item":947},"Reconstruct what happened with real browser session context",{"item":949},"Investigate faster with real-world session context",{"item":951},"Trigger response actions automatically through your SIEM or SOAR","https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fd00e39d3b6e346c296261d875cf55652%2Fcompressed?apiKey=f3a1111ff5be48cdbb123cd9f5795a05&token=d00e39d3b6e346c296261d875cf55652&alt=media&optimized=true",{"large":954},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":342},{"@type":106,"@version":107,"id":956,"meta":957,"component":958,"responsiveStyles":960},"builder-8a0a8ea63f5d48dd8a6726f2d49cf0ca",{"previousId":716},{"name":346,"options":959,"isRSC":118},{"AllPartners":41,"backgroundTransparent":6},{"large":961},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":350},{"@type":106,"@version":107,"id":963,"meta":964,"component":965,"responsiveStyles":967},"builder-2df65c3f54334df2b26e7cb744886cdc",{"previousId":723},{"name":354,"options":966,"isRSC":118},{"darkMode":41},{"large":968},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":970,"component":971,"responsiveStyles":976},"builder-2c32c869efc2423ab69ef06b150e9f97",{"name":359,"tag":359,"options":972,"isRSC":118},{"darkMode":6,"maxWidth":363,"maxTextWidth":364,"title":973,"description":974,"image":975,"reverse":6},"\u003Ch2>See attacks unfold, not just their aftermath\u003C/h2>","\u003Cp>Attacks happen in the browser, not in logs. Push captures what traditional tools miss: what users clicked, what loaded, what was entered, and how attackers moved. That gives you real-world evidence, not just assumptions, when every second matters.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F36fc719bd1de4a38b916f4d25c81a26d",{"large":977},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":979,"meta":980,"component":981,"responsiveStyles":986},"builder-370e53c6016e432db01e9193a2ce90f6",{"previousId":739},{"name":373,"options":982,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":376,"title":983,"description":984,"reverse":41,"image":985},"\u003Ch2>Investigate faster with high-fidelity data\u003C/h2>","\u003Cp>Reconstructing an incident shouldn’t feel like guesswork. Push records detailed telemetry from inside the browser: page loads, credential inputs, DOM changes, session activity, user behavior. It’s structured, exportable, and ready to plug into your investigation workflows, so you can move fast without digging through proxy logs or relying on user reports.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fa6adda040e684e67a8d68a55c5ce5f6d",{"large":987},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"fontFamily":382,"paddingTop":384,"marginTop":384},{"@type":106,"@version":107,"id":989,"meta":990,"component":991,"responsiveStyles":996},"builder-a7f3767a8d184bd08fb24520bf210e95",{"previousId":749},{"name":373,"options":992,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":389,"title":993,"description":994,"reverse":6,"image":995},"\u003Ch2>Contain and respond in real time\u003C/h2>","\u003Cp>When something looks off, Push doesn’t just alert you, it gives you options. Guide users with in-browser prompts. Terminate sessions. Trigger SOAR workflows. Enrich SIEM alerts. Push gives you the context and control to stop spread before it starts.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fb3dedeed5aba4847a2c2d22e10d0ec12",{"large":997},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":395},{"@type":106,"@version":107,"layerName":373,"id":999,"meta":1000,"component":1001,"responsiveStyles":1006},"builder-b92036ee0ece4b32acdbdcc7c377366b",{"previousId":759},{"name":373,"options":1002,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":400,"title":1003,"description":1004,"reverse":41,"image":1005},"\u003Ch2>Prevent the next one\u003C/h2>","\u003Cp>Push helps you respond fast, but it also helps you fix what went wrong. It surfaces misconfigurations and risky behaviors that made the attack possible in the first place, then guides users in-browser to remediate. One tool. Full loop. No loose ends.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fc1ecc2d5d3814b62b072fac01827ff96",{"large":1007},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":406},{"@type":106,"@version":107,"id":1009,"meta":1010,"component":1011,"responsiveStyles":1013},"builder-5e8ae39655274de89da32ab573a2525a",{"previousId":769},{"name":354,"options":1012,"isRSC":118},{"darkMode":6},{"large":1014},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":1016,"component":1017,"responsiveStyles":1019},"builder-dfd6850cfb4741d2b8a0c16c2780f00a",{"name":416,"tag":416,"options":1018,"isRSC":118},{"sectionHeading":37,"customClass":418},{"large":1020},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":1022,"@type":106,"tagName":131,"properties":1023,"responsiveStyles":1024},"builder-pixel-z197gdgcmu",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":1025},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":1027},{"path":37,"query":1028},{},{},1770892908052,1745427419274,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fb07017bfd318431690a5bb35bda35b99",[],{"kind":438,"breakpoints":1035,"originalContentId":681,"winningTest":118,"lastPreviewUrl":1036,"hasLinks":6,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},"https://pushsecurity.com/uc/incident-response?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CeditProjects%2CmodifyMcpServers%2CmodifyWorkflowIntegrations%2CmodifyProjectSettings%2CconnectCodeRepository%2CcreateProjects%2CindexDesignSystems%2CsendPullRequests&builder.user.role.name=Developer&builder.user.role.id=developer&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=a9d5556e77f84a37b5bd52310a7110c1&builder.overrides.a9d5556e77f84a37b5bd52310a7110c1=a9d5556e77f84a37b5bd52310a7110c1&builder.overrides.use-case-page:/uc/incident-response=a9d5556e77f84a37b5bd52310a7110c1&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"createdDate":1038,"id":1039,"name":1040,"modelId":261,"published":13,"query":1041,"data":1044,"variations":1149,"lastUpdated":1150,"firstPublished":1151,"testRatio":33,"screenshot":1152,"createdBy":34,"lastUpdatedBy":674,"folders":1153,"meta":1154,"rev":440},1746122471259,"5f118e24433d46ceb79f5099987156d7","Shadow SaaS",[1042],{"@type":264,"property":265,"operator":266,"value":1043},"/uc/shadow-saas",{"seoTitle":1045,"seoDescription":1046,"customFonts":1047,"fontAwesomeIcon":1052,"title":1053,"jsCode":37,"tsCode":37,"blocks":1054,"url":1043,"state":1146},"Find and secure shadow SaaS","See and control shadow SaaS in the browser.",[1048],{"kind":273,"variants":1049,"files":1050,"family":272,"version":274,"subsets":1051,"lastModified":275,"category":295,"menu":296},[301,302,303,304,305,306,128,307,308,309,310,311,312,313,314,315,316,317],{"100":277,"200":278,"300":279,"500":280,"600":281,"700":282,"800":283,"900":284,"300italic":293,"500italic":292,"regular":290,"900italic":286,"italic":289,"100italic":288,"200italic":291,"600italic":294,"700italic":287,"800italic":285},[298,299],"faShieldCheck","Secure shadow SaaS",[1055,1141],{"@type":106,"@version":107,"tagName":323,"id":1056,"meta":1057,"children":1058},"builder-04da805c4cd34652a2db452fcda52e1d",{"previousId":935},[1059,1075,1082,1089,1098,1108,1118,1128,1135],{"@type":106,"@version":107,"id":1060,"meta":1061,"component":1062,"responsiveStyles":1073},"builder-830d414faeaf41439142f9157e8288c8",{"previousId":939},{"name":327,"options":1063,"isRSC":118},{"title":1045,"description":1064,"points":1065,"video":1072},"\u003Cp>SaaS sprawl is one of today’s fastest-growing security blind spots because most tools monitor around the edges. Push sees it at the source, in the browser, revealing every app users access, flagging risky tools, and helping you shut down exposure before it leads to a breach. No guesswork. No nasty surprises. Just real-time visibility and control.\u003C/p>",[1066,1068,1070],{"item":1067},"Discover every SaaS app users access, managed or not",{"item":1069},"Spot accounts with weak security postures like missing MFA, unmanaged access, and no SSO",{"item":1071},"Control usage with in-browser prompts, blocks, and security guardrails","https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F3e4eece318d04d6586e691d59d0741cf%2Fcompressed?apiKey=f3a1111ff5be48cdbb123cd9f5795a05&token=3e4eece318d04d6586e691d59d0741cf&alt=media&optimized=true",{"large":1074},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":342},{"@type":106,"@version":107,"id":1076,"meta":1077,"component":1078,"responsiveStyles":1080},"builder-cd7833f966cb4c7e8adf0d6c979414a6",{"previousId":956},{"name":346,"options":1079,"isRSC":118},{"AllPartners":41,"backgroundTransparent":6},{"large":1081},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":350},{"@type":106,"@version":107,"id":1083,"meta":1084,"component":1085,"responsiveStyles":1087},"builder-49d720b45430454e8b08c526f267c19f",{"previousId":963},{"name":354,"options":1086,"isRSC":118},{"darkMode":41},{"large":1088},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":1090,"component":1091,"responsiveStyles":1096},"builder-3dde0bf6c8544e5e9ab41b18a9d68034",{"name":359,"tag":359,"options":1092,"isRSC":118},{"darkMode":6,"maxWidth":363,"maxTextWidth":364,"title":1093,"description":1094,"image":1095,"reverse":6},"\u003Ch2>Use your browser to curb Saas Sprawl\u003C/h2>","\u003Cp>Shadow SaaS isn’t hiding in your network, it’s in your browser. From AI tools to unsanctioned file-sharing sites, security risks live in the apps your users sign into every day. Push maps your organization's true SaaS footprint in real time, exposing apps and accounts with unmanaged access, poor authentication, or no security oversight.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fb6811a214c7949b6bbe0b9a3bca62efd",{"large":1097},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":1099,"meta":1100,"component":1101,"responsiveStyles":1106},"builder-e2420451ccdc4f088d0a4904cff45935",{"previousId":979},{"name":373,"options":1102,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":376,"title":1103,"description":1104,"reverse":41,"image":1105},"\u003Ch2>Discover hidden SaaS usage\u003C/h2>","\u003Cp>Push captures live browser telemetry across every tab and session. Whether a user signs into a sanctioned app with a personal account or tries a new AI plugin, you’ll see it in real time, with no integrations or manual tagging.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fe16e301f9af94665b95d98232a863d8a",{"large":1107},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"fontFamily":382,"paddingTop":384,"marginTop":384},{"@type":106,"@version":107,"id":1109,"meta":1110,"component":1111,"responsiveStyles":1116},"builder-b36de7fce7994beea9e58d94662e7166",{"previousId":989},{"name":373,"options":1112,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":389,"title":1113,"description":1114,"reverse":6,"image":1115},"\u003Ch2>Spot risky access and unsafe usage\u003C/h2>","\u003Cp>Discovery is just the beginning. Push flags apps with risky traits, no MFA, no SSO, known vulnerabilities, or broad access scopes. You’ll know which tools introduce real risk, and which users are exposed so you can act with precision.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F6585f3c242da4d70ae3cb7d02f481bef",{"large":1117},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":395},{"@type":106,"@version":107,"layerName":373,"id":1119,"meta":1120,"component":1121,"responsiveStyles":1126},"builder-dc366b5134684fe7a508edf8913103ea",{"previousId":999},{"name":373,"options":1122,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":400,"title":1123,"description":1124,"reverse":41,"image":1125},"\u003Ch2>Close gaps before they grow\u003C/h2>","\u003Cp>Push turns insight into action. When risky SaaS use is detected, guide users to enable MFA, block high-risk apps, or apply in-browser guardrails automatically. All without deploying new infrastructure or managing dozens of integrations.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fe6d60b6d91414819bc6258a318f00557",{"large":1127},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":406},{"@type":106,"@version":107,"id":1129,"meta":1130,"component":1131,"responsiveStyles":1133},"builder-8708f6f0d8da4b3f9e17bf16cda70219",{"previousId":1009},{"name":354,"options":1132,"isRSC":118},{"darkMode":6},{"large":1134},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":1136,"component":1137,"responsiveStyles":1139},"builder-8ff4b38d60534cf28cb523ab0f754875",{"name":416,"tag":416,"options":1138,"isRSC":118},{"sectionHeading":37,"customClass":418},{"large":1140},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":1142,"@type":106,"tagName":131,"properties":1143,"responsiveStyles":1144},"builder-pixel-d1ul2kmxbed",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":1145},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":1147},{"path":37,"query":1148},{},{},1770892936802,1746714967208,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F01bfb2304521412fbd2e1a1180904d40",[],{"originalContentId":919,"winningTest":118,"lastPreviewUrl":1155,"breakpoints":1156,"kind":438,"hasLinks":6,"hasAutosaves":6},"https://pushsecurity.com/uc/shadow-saas?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CeditProjects%2CmodifyMcpServers%2CmodifyWorkflowIntegrations%2CmodifyProjectSettings%2CconnectCodeRepository%2CcreateProjects%2CindexDesignSystems%2CsendPullRequests&builder.user.role.name=Developer&builder.user.role.id=developer&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=5f118e24433d46ceb79f5099987156d7&builder.overrides.5f118e24433d46ceb79f5099987156d7=5f118e24433d46ceb79f5099987156d7&builder.overrides.use-case-page:/uc/shadow-saas=5f118e24433d46ceb79f5099987156d7&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"xsmall":57,"small":39,"medium":40},{"createdDate":1158,"id":1159,"name":1160,"modelId":261,"published":13,"query":1161,"data":1164,"variations":1268,"lastUpdated":1269,"firstPublished":1270,"testRatio":33,"screenshot":1271,"createdBy":34,"lastUpdatedBy":674,"folders":1272,"meta":1273,"rev":440},1764707470172,"b62629ce2f3741158d961cd10fe74b31","Shadow AI",[1162],{"@type":264,"property":265,"operator":266,"value":1163},"/uc/shadow-ai",{"fontAwesomeIcon":1165,"seoTitle":1166,"jsCode":37,"customFonts":1167,"title":1172,"tsCode":37,"seoDescription":1173,"blocks":1174,"url":1163,"state":1265},"faBrainCircuit","Secure AI native and AI enhanced apps. ",[1168],{"variants":1169,"category":295,"files":1170,"subsets":1171,"family":272,"kind":273,"menu":296,"lastModified":275,"version":274},[301,302,303,304,305,306,128,307,308,309,310,311,312,313,314,315,316,317],{"100":277,"200":278,"300":279,"500":280,"600":281,"700":282,"800":283,"900":284,"800italic":285,"regular":290,"700italic":287,"200italic":291,"italic":289,"500italic":292,"600italic":294,"300italic":293,"100italic":288,"900italic":286},[298,299],"Secure shadow AI","See and control shadow AI apps in the browser.",[1175,1260],{"@type":106,"@version":107,"tagName":323,"id":1176,"meta":1177,"children":1178},"builder-a6e5717a2c914d5695058e4ee201a05d",{"previousId":1056},[1179,1195,1202,1209,1219,1228,1237,1247,1254],{"@type":106,"@version":107,"id":1180,"meta":1181,"component":1182,"responsiveStyles":1193},"builder-3e0ed678683f4a0eb7aa00253cf263b2",{"previousId":1060},{"name":327,"options":1183,"isRSC":118},{"title":1172,"description":1184,"points":1185,"image":1192},"\u003Cp>Your employees are adopting AI faster than you can track it. From native features in corporate apps to unapproved shadow tools, it’s all happening in the browser. Push detects every AI interaction in real time, letting you categorize apps and enforce acceptable use policies in the browser.\u003C/p>",[1186,1188,1190],{"item":1187},"Map every AI tool used across your workforce",{"item":1189},"Review and classify apps by sensitivity, purpose, and policy status",{"item":1191},"Enforce AI usage rules directly in the browser","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F33cf153d920f4e389f3650253577cff7",{"large":1194},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":342},{"@type":106,"@version":107,"id":1196,"meta":1197,"component":1198,"responsiveStyles":1200},"builder-76968f8471d14893b8189d75b08fb426",{"previousId":1076},{"name":346,"options":1199,"isRSC":118},{"AllPartners":41,"backgroundTransparent":6},{"large":1201},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":350},{"@type":106,"@version":107,"id":1203,"meta":1204,"component":1205,"responsiveStyles":1207},"builder-b55b9d4bc5a649d8839ce7f6c2043d95",{"previousId":1083},{"name":354,"options":1206,"isRSC":118},{"darkMode":41},{"large":1208},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":1210,"meta":1211,"component":1212,"responsiveStyles":1217},"builder-c3f38ef4d75d4989a29b5903175ed8a1",{"previousId":1090},{"name":359,"tag":359,"options":1213,"isRSC":118},{"darkMode":6,"maxWidth":363,"maxTextWidth":364,"title":1214,"description":1215,"image":1216,"reverse":6},"\u003Ch2>Use your browser to govern AI \u003C/h2>","\u003Cp>The AI footprint inside your company is bigger than you think. From text generators to meeting assistants and design copilots, employees test, adopt, and connect new tools constantly. Push shows you those tools and which users are accessing them, without relying on network scans or API integrations.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F30b43bda6f1644c19478fb1efa20050c",{"large":1218},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":1220,"meta":1221,"component":1222,"responsiveStyles":1226},"builder-90ee9cb9afc44e7f885523715bf51a53",{"previousId":1099},{"name":373,"options":1223,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":376,"title":1224,"description":1225,"reverse":41,"image":1115},"\u003Ch2>Discover every AI tool users touch\u003C/h2>","\u003Cp>Push captures live telemetry from the browser, identifying every AI-native and AI-enhanced application users access. You’ll know which corporate identities are connected, how data flows, and what new AI apps appear across your environment. \u003C/p>",{"large":1227},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"fontFamily":382,"paddingTop":384,"marginTop":384},{"@type":106,"@version":107,"id":1229,"meta":1230,"component":1231,"responsiveStyles":1235},"builder-9e44539fa53c4d8e87406036c921fc46",{"previousId":1109},{"name":373,"options":1232,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":389,"title":1233,"description":1234,"reverse":6,"image":1125},"\u003Ch2>Classify and manage AI risk\u003C/h2>","\u003Cp>For apps you choose to allow, Push lets you apply custom in-browser banners. You can bulk-select categories of AI tools and require users to read and acknowledge your acceptable use policy before they proceed. This creates an auditable trail and moves policy from an easy to forget document to an active, in-workflow control.\u003C/p>",{"large":1236},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":395},{"@type":106,"@version":107,"layerName":373,"id":1238,"meta":1239,"component":1240,"responsiveStyles":1245},"builder-44c1a891926f4bdeaaa37e90721fe6ac",{"previousId":1119},{"name":373,"options":1241,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":400,"title":1242,"description":1243,"reverse":41,"image":1244},"\u003Ch2>Enforce your AI policy in the browser\u003C/h2>","\u003Cp>When an AI tool is deemed non-compliant or too risky, Push blocks it at the source. The block happens directly in the browser, preventing the user from accessing the site or submitting data. This gives you an immediate, powerful lever to stop data exfiltration and enforce a hard line on unacceptable risk.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fa359ac1805af4e15a8a7f84632b9bb55",{"large":1246},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":406},{"@type":106,"@version":107,"id":1248,"meta":1249,"component":1250,"responsiveStyles":1252},"builder-dcc906f9cbe54dc68b3c672668e7a38f",{"previousId":1129},{"name":354,"options":1251,"isRSC":118},{"darkMode":6},{"large":1253},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":1255,"component":1256,"responsiveStyles":1258},"builder-d2d64780c31b4349bc75805b23a07e38",{"name":416,"tag":416,"options":1257,"isRSC":118},{"sectionHeading":37,"customClass":418},{"large":1259},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":1261,"@type":106,"tagName":131,"properties":1262,"responsiveStyles":1263},"builder-pixel-wxx9tk70r9p",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":1264},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":1266},{"path":37,"query":1267},{},{},1770892957225,1764950077593,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fe558b8b069884037a8e6904f7ecc029c",[],{"winningTest":118,"breakpoints":1274,"originalContentId":1039,"kind":438,"lastPreviewUrl":1275,"hasLinks":6,"hasAutosaves":41},{"xsmall":57,"small":39,"medium":40},"https://pushsecurity.com/uc/shadow-ai?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CeditProjects%2CmodifyMcpServers%2CmodifyWorkflowIntegrations%2CmodifyProjectSettings%2CconnectCodeRepository%2CcreateProjects%2CindexDesignSystems%2CsendPullRequests&builder.user.role.name=Developer&builder.user.role.id=developer&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=b62629ce2f3741158d961cd10fe74b31&builder.overrides.b62629ce2f3741158d961cd10fe74b31=b62629ce2f3741158d961cd10fe74b31&builder.overrides.use-case-page:/uc/shadow-ai=b62629ce2f3741158d961cd10fe74b31&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"_path":1277,"_dir":1278,"_draft":6,"_partial":6,"_locale":37,"sys":1279,"ogImage":118,"summary":1282,"title":1296,"subtitle":118,"metaTitle":1296,"synopsis":1292,"hashTags":118,"publishedDate":1297,"slug":1298,"tagsCollection":1299,"relatedBlogPostsCollection":1309,"authorsCollection":3219,"content":3223,"_id":3881,"_type":3882,"_source":3883,"_file":3884,"_stem":3885,"_extension":3882},"/blog/the-most-advanced-clickfix-yet","blog",{"id":1280,"publishedAt":1281},"7rVNBW6rYXnXMpI0JEwzgR","2025-11-06T10:00:13.092Z",{"json":1283},{"data":1284,"content":1285,"nodeType":1295},{},[1286],{"data":1287,"content":1288,"nodeType":1294},{},[1289],{"data":1290,"marks":1291,"value":1292,"nodeType":1293},{},[],"Breaking down the most sophisticated ClickFix page we’ve seen in the wild — and what it tells us about the future of malicious copy-and-paste attacks. ","text","paragraph","document","The most advanced ClickFix yet?","2025-11-06T00:00:00.000Z","the-most-advanced-clickfix-yet",{"items":1300},[1301,1305],{"sys":1302,"name":1304},{"id":1303},"4ksQNCFeBf8H4QIORqpRLw","Detection & response",{"sys":1306,"name":1308},{"id":1307},"6A5RXS31ZQx3PwryGb1IMy","Browser-based attacks",{"items":1310},[1311,1911,2556],{"__typename":1312,"sys":1313,"content":1315,"title":1893,"synopsis":1894,"hashTags":118,"publishedDate":1895,"slug":1896,"tagsCollection":1897,"authorsCollection":1903},"BlogPosts",{"id":1314},"4wtqKNN8D4tvbICAQ17L1Z",{"json":1316},{"data":1317,"content":1318,"nodeType":1295},{},[1319,1329,1336,1343,1350,1359,1363,1371,1378,1385,1401,1449,1455,1462,1478,1485,1491,1494,1502,1509,1525,1545,1565,1585,1592,1595,1603,1622,1655,1661,1667,1670,1678,1697,1717,1724,1744,1750,1756,1759,1767,1774,1781,1814,1821,1824,1832,1839,1846,1853,1860],{"data":1320,"content":1321,"nodeType":1328},{},[1322],{"data":1323,"marks":1324,"value":1327,"nodeType":1293},{},[1325],{"type":1326},"bold","Phishing has moved outside of the mailbox","heading-1",{"data":1330,"content":1331,"nodeType":1294},{},[1332],{"data":1333,"marks":1334,"value":1335,"nodeType":1293},{},[],"Because of the changes to working practices, employees are more accessible than ever to external attackers. Once upon a time, email was the primary communication channel with the wider world, and work happened locally — on your device, and inside your locked-down network environment. This made email and the endpoint the highest priority from a security perspective. ",{"data":1337,"content":1338,"nodeType":1294},{},[1339],{"data":1340,"marks":1341,"value":1342,"nodeType":1293},{},[],"But now, with modern work happening across a network of decentralized internet apps, and more varied communication channels outside of email, it’s harder to stop users from interacting with malicious content.",{"data":1344,"content":1345,"nodeType":1294},{},[1346],{"data":1347,"marks":1348,"value":1349,"nodeType":1293},{},[],"Attackers can deliver links over instant messenger apps, social media, SMS, malicious ads, and using in-app messenger functionality, as well as sending emails directly from SaaS services to bypass email-based checks. Likewise, there are now hundreds of apps per enterprise to target, with varying levels of account security configuration.",{"data":1351,"content":1357,"nodeType":1358},{"target":1352},{"sys":1353},{"id":1354,"type":1355,"linkType":1356},"1tDciIJqKnNoR4FqZChjTy","Link","Entry",[],"embedded-entry-block",{"data":1360,"content":1361,"nodeType":1362},{},[],"hr",{"data":1364,"content":1365,"nodeType":1328},{},[1366],{"data":1367,"marks":1368,"value":1370,"nodeType":1293},{},[1369],{"type":1326},"Why am I not hearing about this more? ",{"data":1372,"content":1373,"nodeType":1294},{},[1374],{"data":1375,"marks":1376,"value":1377,"nodeType":1293},{},[],"Phishing attacks outside of email usually go unreported. This is to be expected when most of the industry’s data on phishing attacks comes from email security vendors and tools. ",{"data":1379,"content":1380,"nodeType":1294},{},[1381],{"data":1382,"marks":1383,"value":1384,"nodeType":1293},{},[],"If phishing bypasses the email layer, most organizations are left relying on user reported attacks. Some organizations might supplement this with a web proxy, but these are being increasingly defeated by modern phishing kits, which use an array of obfuscation and detection evasion techniques to bypass these detections. ",{"data":1386,"content":1387,"nodeType":1294},{},[1388,1392,1397],{"data":1389,"marks":1390,"value":1391,"nodeType":1293},{},[],"The most valuable information for security teams today is the webpage that is loaded ",{"data":1393,"marks":1394,"value":1396,"nodeType":1293},{},[1395],{"type":312},"through",{"data":1398,"marks":1399,"value":1400,"nodeType":1293},{},[]," the network traffic: What does the HTML body look like? What is the user likely seeing on the page? To do this, you need to stitch together and reconstruct what the browser is doing by looking at the network data. Except for very simple websites, this happens through JavaScript on the client side. ",{"data":1402,"content":1403,"nodeType":1294},{},[1404,1408,1419,1423,1432,1436,1445],{"data":1405,"marks":1406,"value":1407,"nodeType":1293},{},[],"This is hard enough when analysing a typical SaaS app. But the latest generation of fully customized Attacker-in-the-Middle (AitM) phishing kits are going out of their way to make this as challenging as possible, using techniques like ",{"data":1409,"content":1411,"nodeType":1418},{"uri":1410},"https://phishing-techniques.pushsecurity.com/techniques/dom-obfuscation/",[1412],{"data":1413,"marks":1414,"value":1417,"nodeType":1293},{},[1415],{"type":1416},"underline","DOM obfuscation","hyperlink",{"data":1420,"marks":1421,"value":1422,"nodeType":1293},{},[],", ",{"data":1424,"content":1426,"nodeType":1418},{"uri":1425},"https://phishing-techniques.pushsecurity.com/techniques/page-obfuscation/",[1427],{"data":1428,"marks":1429,"value":1431,"nodeType":1293},{},[1430],{"type":1416},"Page obfuscation",{"data":1433,"marks":1434,"value":1435,"nodeType":1293},{},[],", and ",{"data":1437,"content":1439,"nodeType":1418},{"uri":1438},"https://phishing-techniques.pushsecurity.com/techniques/code-obfuscation/",[1440],{"data":1441,"marks":1442,"value":1444,"nodeType":1293},{},[1443],{"type":1416},"Code obfuscation",{"data":1446,"marks":1447,"value":1448,"nodeType":1293},{},[]," so all you see at a network layer is a garbled, obfuscated mess of JS code.",{"data":1450,"content":1454,"nodeType":1358},{"target":1451},{"sys":1452},{"id":1453,"type":1355,"linkType":1356},"71QsaPju68i5QiJcgQlHDs",[],{"data":1456,"content":1457,"nodeType":1294},{},[1458],{"data":1459,"marks":1460,"value":1461,"nodeType":1293},{},[],"So, non-email phishing is going broadly undetected through technical controls. And even when spotted and reported by a user — what can you really do about it?",{"data":1463,"content":1464,"nodeType":1294},{},[1465,1469,1474],{"data":1466,"marks":1467,"value":1468,"nodeType":1293},{},[],"Take a social media phish. You can’t see which other accounts were targeted or hit in your user base. Unlike email, there’s no way to recall or quarantine the same message hitting multiple users. There’s no rule you can modify, or senders you can block. You can report the account, and ",{"data":1470,"marks":1471,"value":1473,"nodeType":1293},{},[1472],{"type":312},"maybe",{"data":1475,"marks":1476,"value":1477,"nodeType":1293},{},[]," something will happen when the site owner gets around to it — but the attacker has probably got what they needed by then and moved on. ",{"data":1479,"content":1480,"nodeType":1294},{},[1481],{"data":1482,"marks":1483,"value":1484,"nodeType":1293},{},[],"Most organizations simply block the URLs involved. But this doesn’t really help when attackers are rapidly rotating their phishing domains — by the time you block one site, another three have already taken its place. ",{"data":1486,"content":1490,"nodeType":1358},{"target":1487},{"sys":1488},{"id":1489,"type":1355,"linkType":1356},"1II2kHyOZcShLsexx1TAgy",[],{"data":1492,"content":1493,"nodeType":1362},{},[],{"data":1495,"content":1496,"nodeType":1328},{},[1497],{"data":1498,"marks":1499,"value":1501,"nodeType":1293},{},[1500],{"type":1326},"But aren’t these just personal accounts?",{"data":1503,"content":1504,"nodeType":1294},{},[1505],{"data":1506,"marks":1507,"value":1508,"nodeType":1293},{},[],"Modern phishing attacks blur the boundary between corporate and personal. The fact is that your employees are routinely accessing personal messaging and social media apps on their corporate devices. Users are signed into apps like LinkedIn, X, WhatsApp, Signal, even message boards like Reddit on their work laptop and/or mobile devices. And with malicious links being found on search engines (aka. malvertising), they can even stumble upon them while browsing the web normally.",{"data":1510,"content":1511,"nodeType":1294},{},[1512,1516,1521],{"data":1513,"marks":1514,"value":1515,"nodeType":1293},{},[],"In short: anywhere that your users can be contacted by someone outside of your organization presents an opportunity for phishing. In fact, in most of these cases people ",{"data":1517,"marks":1518,"value":1520,"nodeType":1293},{},[1519],{"type":1326},"expect ",{"data":1522,"marks":1523,"value":1524,"nodeType":1293},{},[],"to be contacted by people they don’t know. ",{"data":1526,"content":1527,"nodeType":1294},{},[1528,1532,1541],{"data":1529,"marks":1530,"value":1531,"nodeType":1293},{},[],"It’s also a myth that campaigns can’t be targeted in the same way on these platforms, that they’re somehow more random and therefore less dangerous. For example, social media accounts are some of the easiest for attackers to create en masse — or take over. According to the most recent ",{"data":1533,"content":1535,"nodeType":1418},{"uri":1534},"https://www.verizon.com/business/resources/T149/reports/2025-dbir-data-breach-investigations-report.pdf",[1536],{"data":1537,"marks":1538,"value":1540,"nodeType":1293},{},[1539],{"type":1416},"Verizon DBIR",{"data":1542,"marks":1543,"value":1544,"nodeType":1293},{},[],", 60%+ of creds found in infostealer logs were from social media sites. They’re also likely to use single-factor logins. If an attacker can take over one account, and use it to credibly communicate with one of your employees, they have a way higher likelihood of being successful than with your average unsolicited email. ",{"data":1546,"content":1547,"nodeType":1294},{},[1548,1552,1561],{"data":1549,"marks":1550,"value":1551,"nodeType":1293},{},[],"Malicious ads can also be targeted. For example, Google Ads can be targeted to searches coming from specific geographic locations, tailored to specific email domain matches, or specific device types (e.g. desktop, mobile, etc.). If you know where your target organization is located, you can tailor the ad to that location. Phishing sites also often come with ",{"data":1553,"content":1555,"nodeType":1418},{"uri":1554},"https://phishing-techniques.pushsecurity.com/techniques/conditional-loading/",[1556],{"data":1557,"marks":1558,"value":1560,"nodeType":1293},{},[1559],{"type":1416},"conditional loading",{"data":1562,"marks":1563,"value":1564,"nodeType":1293},{},[]," parameters to only deliver the malicious payload under specific conditions — for example, only if the visitor came from a particular email campaign link, or only if they are in a certain organization, using a certain browser, from a specific IP range, etc. ",{"data":1566,"content":1567,"nodeType":1294},{},[1568,1572,1581],{"data":1569,"marks":1570,"value":1571,"nodeType":1293},{},[],"And even if the attacker only manages to reach your employee on their personal device, this can still be laundered into a corporate account compromise. Just look at the ",{"data":1573,"content":1575,"nodeType":1418},{"uri":1574},"https://sec.okta.com/articles/2023/11/unauthorized-access-oktas-support-case-management-system-root-cause",[1576],{"data":1577,"marks":1578,"value":1580,"nodeType":1293},{},[1579],{"type":1416},"2023 Okta breach",{"data":1582,"marks":1583,"value":1584,"nodeType":1293},{},[],", where an attacker exploited the fact that an Okta employee had signed into a personal Google profile on their work device. This meant any credentials saved in their browser were synced to their personal device — including a customer support system service account providing access to 134 customer tenants. When their personal device got hacked, so too did all of their work credentials.",{"data":1586,"content":1587,"nodeType":1294},{},[1588],{"data":1589,"marks":1590,"value":1591,"nodeType":1293},{},[],"So, there’s plenty of scope for non-email phishing to result in targeted phishing campaigns. If anything, it’s arguably less work for the attacker to spin up these non-email campaigns than it is to do the necessary legwork to create and build up email sender reputation!",{"data":1593,"content":1594,"nodeType":1362},{},[],{"data":1596,"content":1597,"nodeType":1328},{},[1598],{"data":1599,"marks":1600,"value":1602,"nodeType":1293},{},[1601],{"type":1326},"Case study: LinkedIn spear-phishing",{"data":1604,"content":1605,"nodeType":1294},{},[1606,1609,1618],{"data":1607,"marks":1608,"value":37,"nodeType":1293},{},[],{"data":1610,"content":1612,"nodeType":1418},{"uri":1611},"https://pushsecurity.com/blog/how-push-stopped-a-high-risk-linkedin-spear-phishing-attack/",[1613],{"data":1614,"marks":1615,"value":1617,"nodeType":1293},{},[1616],{"type":1416},"Attackers recently ran a LinkedIn spear-phishing campaign targeting tech company execs.",{"data":1619,"marks":1620,"value":1621,"nodeType":1293},{},[]," The victims were targeted via LinkedIn direct message from another exec about a fake investment opportunity. The sender’s account had been compromised and used to approach high-value targets. ",{"data":1623,"content":1624,"nodeType":1294},{},[1625,1629,1638,1642,1651],{"data":1626,"marks":1627,"value":1628,"nodeType":1293},{},[],"The attack led the victim through a chain of custom pages hosted on ",{"data":1630,"content":1632,"nodeType":1418},{"uri":1631},"https://phishing-techniques.pushsecurity.com/techniques/trusted-website-hosting/",[1633],{"data":1634,"marks":1635,"value":1637,"nodeType":1293},{},[1636],{"type":1416},"legitimate sites",{"data":1639,"marks":1640,"value":1641,"nodeType":1293},{},[]," (a well-known ",{"data":1643,"content":1645,"nodeType":1418},{"uri":1644},"https://pushsecurity.com/resources/phishing-evolution?",[1646],{"data":1647,"marks":1648,"value":1650,"nodeType":1293},{},[1649],{"type":1416},"detection evasion technique",{"data":1652,"marks":1653,"value":1654,"nodeType":1293},{},[],") such as Google Sites, Google Search, and Microsoft Dynamics, before serving up an Attacker-in-the-Middle phishing page impersonating Google Workspace, before serving up a session-stealing AitM phishing page. ",{"data":1656,"content":1660,"nodeType":1358},{"target":1657},{"sys":1658},{"id":1659,"type":1355,"linkType":1356},"1cEvEzLdKIuj6zuGn9aWJB",[],{"data":1662,"content":1666,"nodeType":1358},{"target":1663},{"sys":1664},{"id":1665,"type":1355,"linkType":1356},"6LfBXkDKqh1ogCMxaxyV6x",[],{"data":1668,"content":1669,"nodeType":1362},{},[],{"data":1671,"content":1672,"nodeType":1328},{},[1673],{"data":1674,"marks":1675,"value":1677,"nodeType":1293},{},[1676],{"type":1326},"Case study: Google Search malvertising",{"data":1679,"content":1680,"nodeType":1294},{},[1681,1684,1693],{"data":1682,"marks":1683,"value":37,"nodeType":1293},{},[],{"data":1685,"content":1687,"nodeType":1418},{"uri":1686},"https://pushsecurity.com/blog/investigating-a-recent-malvertising-campaign-targeting-onfido-customers/",[1688],{"data":1689,"marks":1690,"value":1692,"nodeType":1293},{},[1691],{"type":1416},"A company was hit with a targeted Google ad",{"data":1694,"marks":1695,"value":1696,"nodeType":1293},{},[]," which was designed to look highly convincing, and positioned above the legitimate ad. This took advantage of the fact that many users will search for login pages rather than accessing the site via bookmark. ",{"data":1698,"content":1699,"nodeType":1294},{},[1700,1704,1713],{"data":1701,"marks":1702,"value":1703,"nodeType":1293},{},[],"In this case, the attacker had made use of a ",{"data":1705,"content":1707,"nodeType":1418},{"uri":1706},"https://phishing-techniques.pushsecurity.com/techniques/rentable-subdomains/",[1708],{"data":1709,"marks":1710,"value":1712,"nodeType":1293},{},[1711],{"type":1416},"rentable subdomain",{"data":1714,"marks":1715,"value":1716,"nodeType":1293},{},[]," (us[.]com) to make the link appear highly legitimate, with only small changes to the real URL that were easy to miss. ",{"data":1718,"content":1719,"nodeType":1294},{},[1720],{"data":1721,"marks":1722,"value":1723,"nodeType":1293},{},[],"Instead of the real login, the link took the victim to a session-stealing AITM page.  ",{"data":1725,"content":1726,"nodeType":1294},{},[1727,1731,1740],{"data":1728,"marks":1729,"value":1730,"nodeType":1293},{},[],"This was later traced back to a ",{"data":1732,"content":1734,"nodeType":1418},{"uri":1733},"https://pushsecurity.com/blog/scattered-spider-ttp-evolution-in-2025/",[1735],{"data":1736,"marks":1737,"value":1739,"nodeType":1293},{},[1738],{"type":1416},"Scattered Spider",{"data":1741,"marks":1742,"value":1743,"nodeType":1293},{},[]," campaign.",{"data":1745,"content":1749,"nodeType":1358},{"target":1746},{"sys":1747},{"id":1748,"type":1355,"linkType":1356},"5o1LEkZfeYVjMZmROi3Yh",[],{"data":1751,"content":1755,"nodeType":1358},{"target":1752},{"sys":1753},{"id":1754,"type":1355,"linkType":1356},"4RAXFNPdvUXjMDUE7tc10a",[],{"data":1757,"content":1758,"nodeType":1362},{},[],{"data":1760,"content":1761,"nodeType":1328},{},[1762],{"data":1763,"marks":1764,"value":1766,"nodeType":1293},{},[1765],{"type":1326},"What can an attacker do with a compromised account? ",{"data":1768,"content":1769,"nodeType":1294},{},[1770],{"data":1771,"marks":1772,"value":1773,"nodeType":1293},{},[],"It’s important to think about the bigger picture when it comes to a modern phishing compromise. ",{"data":1775,"content":1776,"nodeType":1294},{},[1777],{"data":1778,"marks":1779,"value":1780,"nodeType":1293},{},[],"Most phishing attacks focus on core enterprise cloud platforms such as Microsoft and Google, or specialist Identity Providers like Okta. Taking over one of these accounts doesn’t just give access to the core apps and data within the respective app, but also enables the attacker to leverage SSO to sign into any connected app that the employee logs into with their account. ",{"data":1782,"content":1783,"nodeType":1294},{},[1784,1788,1797,1801,1810],{"data":1785,"marks":1786,"value":1787,"nodeType":1293},{},[],"This gives an attacker access to just about every core business function and dataset in your organization. And from this point, it’s much easier to target other users of these internal apps — using internal messenger apps like ",{"data":1789,"content":1791,"nodeType":1418},{"uri":1790},"https://pushsecurity.com/blog/phishing-slack-persistence/",[1792],{"data":1793,"marks":1794,"value":1796,"nodeType":1293},{},[1795],{"type":1416},"Slack or Teams",{"data":1798,"marks":1799,"value":1800,"nodeType":1293},{},[],", or techniques like ",{"data":1802,"content":1804,"nodeType":1418},{"uri":1803},"https://github.com/pushsecurity/saas-attacks/blob/main/techniques/samljacking/description.md",[1805],{"data":1806,"marks":1807,"value":1809,"nodeType":1293},{},[1808],{"type":1416},"SAMLjacking",{"data":1811,"marks":1812,"value":1813,"nodeType":1293},{},[]," to turn an app into a watering hole for other users trying to log in. ",{"data":1815,"content":1816,"nodeType":1294},{},[1817],{"data":1818,"marks":1819,"value":1820,"nodeType":1293},{},[],"A single account compromise can quickly snowball into a multi-million dollar, business-wide breach.",{"data":1822,"content":1823,"nodeType":1362},{},[],{"data":1825,"content":1826,"nodeType":1328},{},[1827],{"data":1828,"marks":1829,"value":1831,"nodeType":1293},{},[1830],{"type":1326},"What can organizations do about non-email phishing? ",{"data":1833,"content":1834,"nodeType":1294},{},[1835],{"data":1836,"marks":1837,"value":1838,"nodeType":1293},{},[],"It’s clear that the traditional anti-phishing toolset hasn’t kept up with phishing innovation. ",{"data":1840,"content":1841,"nodeType":1294},{},[1842],{"data":1843,"marks":1844,"value":1845,"nodeType":1293},{},[],"To tackle modern phishing attacks, organizations need a solution that detects and blocks phishing across all apps and delivery vectors. ",{"data":1847,"content":1848,"nodeType":1294},{},[1849],{"data":1850,"marks":1851,"value":1852,"nodeType":1293},{},[],"Push Security doesn’t detect the redirect tricks, or rely on outdated domain TI feeds. It doesn’t matter what delivery channel or camouflage methods are used, Push detects and blocks attacks by identifying the attack in real time, as the user loads and interacts with the page in their web browser.",{"data":1854,"content":1855,"nodeType":1294},{},[1856],{"data":1857,"marks":1858,"value":1859,"nodeType":1293},{},[],"Push’s browser-based security platform provides comprehensive identity attack detection and response capabilities against techniques like AiTM phishing, credential stuffing, ClickFixing, malicious browser extensions, and session hijacking using stolen session tokens. ",{"data":1861,"content":1862,"nodeType":1294},{},[1863,1867,1876,1880,1889],{"data":1864,"marks":1865,"value":1866,"nodeType":1293},{},[],"To learn more about Push, ",{"data":1868,"content":1870,"nodeType":1418},{"uri":1869},"https://pushsecurity.com/resources/product-brochure",[1871],{"data":1872,"marks":1873,"value":1875,"nodeType":1293},{},[1874],{"type":1416},"check out our latest product overview",{"data":1877,"marks":1878,"value":1879,"nodeType":1293},{},[]," or ",{"data":1881,"content":1883,"nodeType":1418},{"uri":1882},"https://pushsecurity.com/demo",[1884],{"data":1885,"marks":1886,"value":1888,"nodeType":1293},{},[1887],{"type":1416},"book some time with one of our team for a live demo",{"data":1890,"marks":1891,"value":1892,"nodeType":1293},{},[],".","Why attackers are moving beyond email-based phishing","Why phishing attacks are moving away from exclusively email-based delivery, and what this means for security teams. \n","2025-09-18T00:00:00.000Z","why-attackers-are-moving-beyond-email-based-phishing",{"items":1898},[1899,1901],{"sys":1900,"name":1308},{"id":1307},{"sys":1902,"name":1304},{"id":1303},{"items":1904},[1905],{"fullName":1906,"firstName":1907,"jobTitle":1908,"profilePicture":1909},"Dan Green","Dan","Threat Research",{"url":1910},"https://images.ctfassets.net/y1cdw1ablpvd/7jik1VhFgA3kgzXBXTm2Vw/fcd8c171da644903d0827eafcfbcaad0/Dan_Headshot_2025.png",{"__typename":1312,"sys":1912,"content":1914,"title":2542,"synopsis":2543,"hashTags":118,"publishedDate":2544,"slug":2545,"tagsCollection":2546,"authorsCollection":2552},{"id":1913},"1u8RJxC00HbBhCBVxcDnkK",{"json":1915},{"nodeType":1295,"data":1916,"content":1917},{},[1918,1964,2021,2037,2043,2050,2053,2061,2068,2075,2082,2102,2109,2115,2134,2140,2143,2151,2158,2167,2187,2194,2201,2208,2216,2223,2230,2236,2243,2278,2284,2292,2311,2318,2341,2348,2355,2361,2368,2371,2379,2393,2413,2420,2427,2434,2439,2447,2466,2469,2477,2484,2491,2498,2505,2531,2536],{"nodeType":1294,"data":1919,"content":1920},{},[1921,1925,1934,1938,1947,1951,1960],{"nodeType":1293,"value":1922,"marks":1923,"data":1924},"One of the biggest security trends in the past year has been the emergence of the attack technique known as ",[],{},{"nodeType":1418,"data":1926,"content":1928},{"uri":1927},"https://www.microsoft.com/en-us/security/blog/2025/08/21/think-before-you-clickfix-analyzing-the-clickfix-social-engineering-technique/",[1929],{"nodeType":1293,"value":1930,"marks":1931,"data":1933},"ClickFix",[1932],{"type":1416},{},{"nodeType":1293,"value":1935,"marks":1936,"data":1937},". Various reports indicate that ClickFix is fast becoming one of the most prevalent attack techniques this year, with ",[],{},{"nodeType":1418,"data":1939,"content":1941},{"uri":1940},"https://www.scworld.com/news/clickfix-phishing-links-increased-nearly-400-in-12-months-report-says",[1942],{"nodeType":1293,"value":1943,"marks":1944,"data":1946},"one study",[1945],{"type":1416},{},{"nodeType":1293,"value":1948,"marks":1949,"data":1950}," reporting that email-based ClickFix attacks have increased by 400% YOY, and ",[],{},{"nodeType":1418,"data":1952,"content":1954},{"uri":1953},"https://web-assets.esetstatic.com/wls/en/papers/threat-reports/eset-threat-report-h12025.pdf",[1955],{"nodeType":1293,"value":1956,"marks":1957,"data":1959},"another",[1958],{"type":1416},{},{"nodeType":1293,"value":1961,"marks":1962,"data":1963}," highlighting a 517% increase in the past 6 months. ",[],{},{"nodeType":1294,"data":1965,"content":1966},{},[1967,1971,1980,1983,1992,1995,2004,2008,2017],{"nodeType":1293,"value":1968,"marks":1969,"data":1970},"ClickFix is known to be regularly used by the Interlock ransomware group and other prolific threat actors. A number of recent public data breaches have been linked to ClickFix attacks as the attack vector, such as ",[],{},{"nodeType":1418,"data":1972,"content":1974},{"uri":1973},"https://www.bleepingcomputer.com/news/security/kettering-health-confirms-interlock-ransomware-behind-cyberattack/",[1975],{"nodeType":1293,"value":1976,"marks":1977,"data":1979},"Kettering Health",[1978],{"type":1416},{},{"nodeType":1293,"value":1422,"marks":1981,"data":1982},[],{},{"nodeType":1418,"data":1984,"content":1986},{"uri":1985},"https://www.bleepingcomputer.com/news/security/interlock-ransomware-claims-davita-attack-leaks-stolen-data/",[1987],{"nodeType":1293,"value":1988,"marks":1989,"data":1991},"DaVita",[1990],{"type":1416},{},{"nodeType":1293,"value":1422,"marks":1993,"data":1994},[],{},{"nodeType":1418,"data":1996,"content":1998},{"uri":1997},"https://www.infosecurity-magazine.com/news/st-paul-mayor-interlock-data-leak/",[1999],{"nodeType":1293,"value":2000,"marks":2001,"data":2003},"City of St. Paul, Minnesota",[2002],{"type":1416},{},{"nodeType":1293,"value":2005,"marks":2006,"data":2007},", and the ",[],{},{"nodeType":1418,"data":2009,"content":2011},{"uri":2010},"https://www.blackfog.com/texas-tech-cyberattack-1-4m-records-compromised/",[2012],{"nodeType":1293,"value":2013,"marks":2014,"data":2016},"Texas Tech University Health Sciences Centers",[2015],{"type":1416},{},{"nodeType":1293,"value":2018,"marks":2019,"data":2020}," (with many more breaches likely to involve ClickFix where the attack vector wasn’t known or disclosed).",[],{},{"nodeType":1294,"data":2022,"content":2023},{},[2024,2028,2033],{"nodeType":1293,"value":2025,"marks":2026,"data":2027},"Push’s latest feature, ",[],{},{"nodeType":1293,"value":2029,"marks":2030,"data":2032},"malicious copy and paste detection",[2031],{"type":1326},{},{"nodeType":1293,"value":2034,"marks":2035,"data":2036},", tackles ClickFix-style attacks at the earliest opportunity through browser-based detection, with a universally effective control that works regardless of the lure delivery channel, or page style and structure. ",[],{},{"nodeType":1358,"data":2038,"content":2042},{"target":2039},{"sys":2040},{"id":2041,"type":1355,"linkType":1356},"sALkMt8UbTZ2f34hKvGLj",[],{"nodeType":1294,"data":2044,"content":2045},{},[2046],{"nodeType":1293,"value":2047,"marks":2048,"data":2049},"Before we get into the specifics of the feature, let’s take a look at what ClickFix is and why it poses a detection and response challenge to security teams.",[],{},{"nodeType":1362,"data":2051,"content":2052},{},[],{"nodeType":1328,"data":2054,"content":2055},{},[2056],{"nodeType":1293,"value":2057,"marks":2058,"data":2060},"ClickFix 101",[2059],{"type":1326},{},{"nodeType":1294,"data":2062,"content":2063},{},[2064],{"nodeType":1293,"value":2065,"marks":2066,"data":2067},"ClickFix attacks prompt the user to solve some kind of problem or challenge in the browser — most commonly a CAPTCHA, but also things like fixing an error on a webpage. The name is a little misleading though — the key factor in the attack is that they trick users into running malicious commands on their device by copying malicious code from the page clipboard and running it locally. (For simplicity we’ll keep calling it ClickFix, but we’re not happy about it.)",[],{},{"nodeType":1294,"data":2069,"content":2070},{},[2071],{"nodeType":1293,"value":2072,"marks":2073,"data":2074},"The copy action is either performed manually by the user, or automatically by the page. Manual copies typically include additional social engineering to lure the victim into hitting CTRL+C, while automatic copies are performed using JavaScript running on the page. Most ClickFix pages we've seen are automatic copies, which makes sense — fewer steps means the user is more likely to follow the instruction.",[],{},{"nodeType":1294,"data":2076,"content":2077},{},[2078],{"nodeType":1293,"value":2079,"marks":2080,"data":2081},"Most commonly, these attacks are used to deliver remote access software or infostealer malware using stolen session cookies and credentials to facilitate attacks on business apps and services. From there, the attacker simply dumps the data and holds the victim to ransom for its deletion — often dropping ransomware afterwards for double the extortion. ",[],{},{"nodeType":1294,"data":2083,"content":2084},{},[2085,2089,2098],{"nodeType":1293,"value":2086,"marks":2087,"data":2088},"The attack gives the victim instructions that involve clicking prompts and copying, pasting, and running commands directly in the Windows Run dialog box, Terminal, or PowerShell in order to “fix” the fake problem that they’re experiencing. Variants such as ",[],{},{"nodeType":1418,"data":2090,"content":2092},{"uri":2091},"https://mrd0x.com/filefix-clickfix-alternative/",[2093],{"nodeType":1293,"value":2094,"marks":2095,"data":2097},"FileFix",[2096],{"type":1416},{},{"nodeType":1293,"value":2099,"marks":2100,"data":2101}," have also emerged which instead use the File Explorer Address Bar to execute OS commands.",[],{},{"nodeType":1294,"data":2103,"content":2104},{},[2105],{"nodeType":1293,"value":2106,"marks":2107,"data":2108},"Links to malicious ClickFix pages are distributed over various delivery channels, with attacks shifting from traditional email-based delivery to social media, instant messaging apps, malicious ads in places like Google Search, and using in-app notifications and messages across numerous SaaS services. ",[],{},{"nodeType":1358,"data":2110,"content":2114},{"target":2111},{"sys":2112},{"id":2113,"type":1355,"linkType":1356},"1I9ERDY2tuspw5zVMV5DbY",[],{"nodeType":1294,"data":2116,"content":2117},{},[2118,2122,2130],{"nodeType":1293,"value":2119,"marks":2120,"data":2121},"ClickFix comes in a variety of lures, including impersonating CAPTCHA, Cloudflare Turnstile, simulating an error loading a webpage, and many more. They have also been observed targeting a ",[],{},{"nodeType":1418,"data":2123,"content":2125},{"uri":2124},"https://mhaggis.github.io/ClickGrab/techniques.html",[2126],{"nodeType":1293,"value":2127,"marks":2128,"data":2129},"wide range of services",[],{},{"nodeType":1293,"value":2131,"marks":2132,"data":2133}," to execute code. ",[],{},{"nodeType":1358,"data":2135,"content":2139},{"target":2136},{"sys":2137},{"id":2138,"type":1355,"linkType":1356},"1SG52ta1hcBZ3gYDsSJvsm",[],{"nodeType":1362,"data":2141,"content":2142},{},[],{"nodeType":1328,"data":2144,"content":2145},{},[2146],{"nodeType":1293,"value":2147,"marks":2148,"data":2150},"Why are ClickFix attacks so effective?",[2149],{"type":1326},{},{"nodeType":1294,"data":2152,"content":2153},{},[2154],{"nodeType":1293,"value":2155,"marks":2156,"data":2157},"To understand the effectiveness of ClickFix-style attacks, we need to look more closely at the mechanisms that security teams have at their disposal to counter these attacks. ",[],{},{"nodeType":2159,"data":2160,"content":2161},"heading-2",{},[2162],{"nodeType":1293,"value":2163,"marks":2164,"data":2166},"Detection challenges during delivery",[2165],{"type":1326},{},{"nodeType":1294,"data":2168,"content":2169},{},[2170,2174,2183],{"nodeType":1293,"value":2171,"marks":2172,"data":2173},"We’ve written extensively about ",[],{},{"nodeType":1418,"data":2175,"content":2177},{"uri":2176},"https://pushsecurity.com/blog/phishing-detection-evasion-launch/",[2178],{"nodeType":1293,"value":2179,"marks":2180,"data":2182},"the evolution in phishing techniques and tooling",[2181],{"type":1416},{},{"nodeType":1293,"value":2184,"marks":2185,"data":2186},", and what this means for the reliability of traditional detections at the network and endpoint layer. ",[],{},{"nodeType":1294,"data":2188,"content":2189},{},[2190],{"nodeType":1293,"value":2191,"marks":2192,"data":2193},"The latest generation of phishing pages are dynamically obfuscating the code that loads the web page, implementing custom bot protection (e.g. CAPTCHA or Cloudflare Turnstile), using runtime anti-analysis features, and using legitimate SaaS and cloud services to host and deliver phishing links to cover their tracks.",[],{},{"nodeType":1294,"data":2195,"content":2196},{},[2197],{"nodeType":1293,"value":2198,"marks":2199,"data":2200},"This means that traditional anti-phishing tools at the email and network layer are struggling to keep up, with many attacks evading email-based detections (or bypassing email altogether). At the same time, proxy-based solutions now see a garbled mess of JavaScript code without the necessary context of what is actually happening in the browser to be able to piece it together effectively. Even if they don’t realize it, this means many organizations are now relying solely on blocking known-bad sites and hosts — a wildly ineffective solution in 2025 with the rate that attackers refresh and rotate their phishing infrastructure. ",[],{},{"nodeType":1294,"data":2202,"content":2203},{},[2204],{"nodeType":1293,"value":2205,"marks":2206,"data":2207},"In addition to the fact that ClickFix page styles and content can vary significantly, this means that detecting ClickFix delivery using traditional tooling is highly unreliable. ",[],{},{"nodeType":2159,"data":2209,"content":2210},{},[2211],{"nodeType":1293,"value":2212,"marks":2213,"data":2215},"Detection challenges during execution",[2214],{"type":1326},{},{"nodeType":1294,"data":2217,"content":2218},{},[2219],{"nodeType":1293,"value":2220,"marks":2221,"data":2222},"Most of the detection heavy lifting is being done at the endpoint, looking for user-level code execution and malware running on a device. ",[],{},{"nodeType":1294,"data":2224,"content":2225},{},[2226],{"nodeType":1293,"value":2227,"marks":2228,"data":2229},"However, the number of ClickFix-related headlines in the news would indicate that endpoint controls are being routinely bypassed, or perhaps evaded altogether by targeting personal or BYOD devices. ",[],{},{"nodeType":1358,"data":2231,"content":2235},{"target":2232},{"sys":2233},{"id":2234,"type":1355,"linkType":1356},"pocty4OhER5EXr8BDwdzo",[],{"nodeType":1294,"data":2237,"content":2238},{},[2239],{"nodeType":1293,"value":2240,"marks":2241,"data":2242},"There are a number of reasons that endpoint-level ClickFix detections can be bypassed:",[],{},{"nodeType":2244,"data":2245,"content":2246},"unordered-list",{},[2247,2258,2268],{"nodeType":2248,"data":2249,"content":2250},"list-item",{},[2251],{"nodeType":1294,"data":2252,"content":2253},{},[2254],{"nodeType":1293,"value":2255,"marks":2256,"data":2257},"The step of downloading a file from the web is bypassed altogether. In a ClickFix/FileFix attack, the initial “dropper” is essentially a command string provided by the attacker and executed by legitimate system utilities. There is often no new executable file written to disk when the user runs the command. The final payload may be loaded directly into memory or injected into trusted programs (using living-off-the-land techniques). Without a file to quarantine, there's no \"Mark of the Web\" to make it appear suspicious. ",[],{},{"nodeType":2248,"data":2259,"content":2260},{},[2261],{"nodeType":1294,"data":2262,"content":2263},{},[2264],{"nodeType":1293,"value":2265,"marks":2266,"data":2267},"From the EDR’s point of view, a trusted parent process is launching a script – which might not immediately be judged as malicious, especially if the command is obfuscated or uses allowed system functions. Since the action is initiated by the user, it blends in with normal user-driven administration tasks. ",[],{},{"nodeType":2248,"data":2269,"content":2270},{},[2271],{"nodeType":1294,"data":2272,"content":2273},{},[2274],{"nodeType":1293,"value":2275,"marks":2276,"data":2277},"The PowerShell commands themselves might be obfuscated or broken into stages to avoid easy detection by heuristic rules. EDR telemetry might record that a PowerShell process ran, but without a known bad signature or a clear policy violation, it may not flag it immediately. ",[],{},{"nodeType":1358,"data":2279,"content":2283},{"target":2280},{"sys":2281},{"id":2282,"type":1355,"linkType":1356},"6djGsqBFTHlLLITpTK7IMk",[],{"nodeType":2159,"data":2285,"content":2286},{},[2287],{"nodeType":1293,"value":2288,"marks":2289,"data":2291},"Accessing ClickFix-style capabilities is easier than ever",[2290],{"type":1326},{},{"nodeType":1294,"data":2293,"content":2294},{},[2295,2299,2307],{"nodeType":1293,"value":2296,"marks":2297,"data":2298},"This capability is increasingly available to all levels of threat actor, with ",[],{},{"nodeType":1418,"data":2300,"content":2301},{"uri":1927},[2302],{"nodeType":1293,"value":2303,"marks":2304,"data":2306},"off-the-shelf options available",[2305],{"type":1416},{},{"nodeType":1293,"value":2308,"marks":2309,"data":2310}," in the form of ClickFix builders (also called “Win + R”) on popular hacker forums since late 2024. ",[],{},{"nodeType":1294,"data":2312,"content":2313},{},[2314],{"nodeType":1293,"value":2315,"marks":2316,"data":2317},"Attackers are bundling ClickFix builders into their existing kits to:",[],{},{"nodeType":2244,"data":2319,"content":2320},{},[2321,2331],{"nodeType":2248,"data":2322,"content":2323},{},[2324],{"nodeType":1294,"data":2325,"content":2326},{},[2327],{"nodeType":1293,"value":2328,"marks":2329,"data":2330},"Use pre-canned landing pages with various lures including Cloudflare. ",[],{},{"nodeType":2248,"data":2332,"content":2333},{},[2334],{"nodeType":1294,"data":2335,"content":2336},{},[2337],{"nodeType":1293,"value":2338,"marks":2339,"data":2340},"Offer construction of malicious commands that users will paste into the Windows Run dialog. ",[],{},{"nodeType":1294,"data":2342,"content":2343},{},[2344],{"nodeType":1293,"value":2345,"marks":2346,"data":2347},"These kits claim to guarantee antivirus and web protection bypass (some even promise that they can bypass Microsoft Defender SmartScreen), as well as payload persistence. The cost of subscription to such a service might be between US$200 to US$1,500 per month. ",[],{},{"nodeType":1294,"data":2349,"content":2350},{},[2351],{"nodeType":1293,"value":2352,"marks":2353,"data":2354},"In short, these capabilities are increasingly accessible to the general population of hackers, and it is increasingly in the interests of malware developers to offer premium hacker tools designed to bypass current detections. ",[],{},{"nodeType":1358,"data":2356,"content":2360},{"target":2357},{"sys":2358},{"id":2359,"type":1355,"linkType":1356},"5hkRsOBZCOABAShCo8RjJg",[],{"nodeType":1294,"data":2362,"content":2363},{},[2364],{"nodeType":1293,"value":2365,"marks":2366,"data":2367},"In any case, relying on just-in-time detection at the point of execution is increasingly unreliable and will always be at the mercy of the cat-and-mouse game between attackers and defenders. Organizations employing custom detections looking for specific malware behavior are likely to have better success than those relying on out-of-the-box EDR configs, but this requires continual maintenance to be effective. ",[],{},{"nodeType":1362,"data":2369,"content":2370},{},[],{"nodeType":1328,"data":2372,"content":2373},{},[2374],{"nodeType":1293,"value":2375,"marks":2376,"data":2378},"Solving ClickFix detection in the browser with Push",[2377],{"type":1326},{},{"nodeType":1294,"data":2380,"content":2381},{},[2382,2385,2389],{"nodeType":1293,"value":2025,"marks":2383,"data":2384},[],{},{"nodeType":1293,"value":2029,"marks":2386,"data":2388},[2387],{"type":1326},{},{"nodeType":1293,"value":2390,"marks":2391,"data":2392},", tackles ClickFix-style attacks at the earliest opportunity through browser-based detection and blocking, with a universally effective control that works regardless of the lure delivery channel, page style and structure, or the specifics of the malware type and execution.",[],{},{"nodeType":1294,"data":2394,"content":2395},{},[2396,2400,2409],{"nodeType":1293,"value":2397,"marks":2398,"data":2399},"A key part of our design philosophy is to find ways to universally detect attacker TTPs by analyzing generic attacker actions that can’t be avoided by the attacker. One of our best prior examples of this is with our ",[],{},{"nodeType":1418,"data":2401,"content":2403},{"uri":2402},"https://pushsecurity.com/blog/introducing-sso-password-protection/",[2404],{"nodeType":1293,"value":2405,"marks":2406,"data":2408},"password protection feature",[2407],{"type":1416},{},{"nodeType":1293,"value":2410,"marks":2411,"data":2412},", which detects and blocks phishing attacks by triggering when a user attempts to enter a password that belongs to one domain on a different domain. ",[],{},{"nodeType":1294,"data":2414,"content":2415},{},[2416],{"nodeType":1293,"value":2417,"marks":2418,"data":2419},"In the case of ClickFix, every attack involves copying a malicious script from a page — a behavior the attacker can’t avoid.",[],{},{"nodeType":1294,"data":2421,"content":2422},{},[2423],{"nodeType":1293,"value":2424,"marks":2425,"data":2426},"Unlike heavy-handed DLP solutions that block copy-paste altogether, Push protects your employees without disrupting their user experience or hampering productivity. ",[],{},{"nodeType":1294,"data":2428,"content":2429},{},[2430],{"nodeType":1293,"value":2431,"marks":2432,"data":2433},"Check out the video below to see Push in action. ",[],{},{"nodeType":1358,"data":2435,"content":2438},{"target":2436},{"sys":2437},{"id":2041,"type":1355,"linkType":1356},[],{"nodeType":2159,"data":2440,"content":2441},{},[2442],{"nodeType":1293,"value":2443,"marks":2444,"data":2446},"Enable ClickFix detection in just a few clicks",[2445],{"type":1326},{},{"nodeType":1294,"data":2448,"content":2449},{},[2450,2454,2462],{"nodeType":1293,"value":2451,"marks":2452,"data":2453},"Check out the ",[],{},{"nodeType":1418,"data":2455,"content":2457},{"uri":2456},"https://pushsecurity.com/help/10141/#start",[2458],{"nodeType":1293,"value":2459,"marks":2460,"data":2461},"help article",[],{},{"nodeType":1293,"value":2463,"marks":2464,"data":2465}," for step-by-step instructions on how to enable the control. ",[],{},{"nodeType":1362,"data":2467,"content":2468},{},[],{"nodeType":1328,"data":2470,"content":2471},{},[2472],{"nodeType":1293,"value":2473,"marks":2474,"data":2476},"Learn more about Push",[2475],{"type":1326},{},{"nodeType":1294,"data":2478,"content":2479},{},[2480],{"nodeType":1293,"value":2481,"marks":2482,"data":2483},"Push provides last mile protection against browser-based attacks, adding a net-new layer of technical protection in the browser. ",[],{},{"nodeType":1294,"data":2485,"content":2486},{},[2487],{"nodeType":1293,"value":2488,"marks":2489,"data":2490},"Right now, most organizations are left relying on user awareness. Faced with increasingly novel attack types, encountered all over the internet, users are being caught unawares — further reducing the efficacy of an already fragile control. ",[],{},{"nodeType":1294,"data":2492,"content":2493},{},[2494],{"nodeType":1293,"value":2495,"marks":2496,"data":2497},"By seeing what the user sees in the browser, as they see it, as well as monitoring for risky behaviors, Push provides a strong backstop against an ever-expanding landscape of browser-based exploits. ",[],{},{"nodeType":1294,"data":2499,"content":2500},{},[2501],{"nodeType":1293,"value":2502,"marks":2503,"data":2504},"Push’s browser-based security platform provides comprehensive identity attack detection and response capabilities against techniques like AiTM phishing, credential stuffing, ClickFixing, malicious browser extensions, and session hijacking using stolen session tokens. You can also use Push to find and fix vulnerabilities across the apps that your employees use, like ghost logins, SSO coverage gaps, MFA gaps, vulnerable passwords, risky OAuth integrations, and more to harden your identity attack surface.",[],{},{"nodeType":1294,"data":2506,"content":2507},{},[2508,2511,2518,2521,2528],{"nodeType":1293,"value":1866,"marks":2509,"data":2510},[],{},{"nodeType":1418,"data":2512,"content":2513},{"uri":1869},[2514],{"nodeType":1293,"value":1875,"marks":2515,"data":2517},[2516],{"type":1416},{},{"nodeType":1293,"value":1879,"marks":2519,"data":2520},[],{},{"nodeType":1418,"data":2522,"content":2523},{"uri":1882},[2524],{"nodeType":1293,"value":1888,"marks":2525,"data":2527},[2526],{"type":1416},{},{"nodeType":1293,"value":1892,"marks":2529,"data":2530},[],{},{"nodeType":1358,"data":2532,"content":2535},{"target":2533},{"sys":2534},{"id":2282,"type":1355,"linkType":1356},[],{"nodeType":1294,"data":2537,"content":2538},{},[2539],{"nodeType":1293,"value":37,"marks":2540,"data":2541},[],{},"Introducing malicious copy and paste detection","Push now detects malware delivery in the browser, supporting a layered defense against endpoint attacks. ","2025-10-09T00:00:00.000Z","introducing-malicious-copy-paste-detection",{"items":2547},[2548,2550],{"sys":2549,"name":1304},{"id":1303},{"sys":2551,"name":1308},{"id":1307},{"items":2553},[2554],{"fullName":1906,"firstName":1907,"jobTitle":1908,"profilePicture":2555},{"url":1910},{"__typename":1312,"sys":2557,"content":2559,"title":3205,"synopsis":3206,"hashTags":118,"publishedDate":3207,"slug":3208,"tagsCollection":3209,"authorsCollection":3215},{"id":2558},"62Zyr35VUmijkpupWk3hoD",{"json":2560},{"data":2561,"content":2562,"nodeType":1295},{},[2563,2579,2586,2589,2597,2604,2611,2631,2637,2644,2651,2658,2665,2668,2676,2683,2689,2696,2704,2711,2718,2724,2744,2750,2757,2763,2770,2775,2778,2786,2803,2810,2840,2847,2854,2860,2867,2874,2881,2884,2892,2911,2917,2924,2931,2937,2944,2951,2954,2962,2969,2989,3033,3040,3047,3054,3057,3065,3072,3079,3086,3089,3097,3104,3135,3155,3162,3165,3173,3180,3187],{"data":2564,"content":2565,"nodeType":1294},{},[2566,2570,2575],{"data":2567,"marks":2568,"value":2569,"nodeType":1293},{},[],"The view that \"the browser is the new endpoint\" and \"the new battleground for cyber attacks\" is becoming increasingly advocated by security leaders. But what does this ",{"data":2571,"marks":2572,"value":2574,"nodeType":1293},{},[2573],{"type":312},"actually",{"data":2576,"marks":2577,"value":2578,"nodeType":1293},{},[]," mean for security teams? ",{"data":2580,"content":2581,"nodeType":1294},{},[2582],{"data":2583,"marks":2584,"value":2585,"nodeType":1293},{},[],"In this article, we’re cutting out the jargon to explore what a browser-based attack is, and what’s required for effective detection and response. ",{"data":2587,"content":2588,"nodeType":1362},{},[],{"data":2590,"content":2591,"nodeType":1328},{},[2592],{"data":2593,"marks":2594,"value":2596,"nodeType":1293},{},[2595],{"type":1326},"What is the goal of a browser-based attack?   ",{"data":2598,"content":2599,"nodeType":1294},{},[2600],{"data":2601,"marks":2602,"value":2603,"nodeType":1293},{},[],"First, it’s important to establish what the point of a browser-based attack is.",{"data":2605,"content":2606,"nodeType":1294},{},[2607],{"data":2608,"marks":2609,"value":2610,"nodeType":1293},{},[],"In most scenarios, attackers don’t think of themselves as attacking your web browser. Their end-goal is to compromise your business apps and data. That means going after the third-party apps and services that are now the backbone of business IT — and therefore the top target for attackers. ",{"data":2612,"content":2613,"nodeType":1294},{},[2614,2618,2627],{"data":2615,"marks":2616,"value":2617,"nodeType":1293},{},[],"The most common attack path today sees attackers log into third-party services, dump the data, and monetize it through extortion. You need only look at last year’s ",{"data":2619,"content":2621,"nodeType":1418},{"uri":2620},"https://pushsecurity.com/blog/snowflake-retro?utm_source=bleeping-computer&utm_medium=sponsored-content&utm_term=article",[2622],{"data":2623,"marks":2624,"value":2626,"nodeType":1293},{},[2625],{"type":1416},"Snowflake",{"data":2628,"marks":2629,"value":2630,"nodeType":1293},{},[]," customer breaches or the still-ongoing Salesforce attacks to see the impact.",{"data":2632,"content":2636,"nodeType":1358},{"target":2633},{"sys":2634},{"id":2635,"type":1355,"linkType":1356},"5agrVXzEdwALmew2F5SPDp",[],{"data":2638,"content":2639,"nodeType":1294},{},[2640],{"data":2641,"marks":2642,"value":2643,"nodeType":1293},{},[],"The most logical way to do this is by targeting users of those apps. And because of the changes to working practices, your users are more accessible than ever to external attackers.",{"data":2645,"content":2646,"nodeType":1294},{},[2647],{"data":2648,"marks":2649,"value":2650,"nodeType":1293},{},[],"Once upon a time, email was the primary communication channel with the wider world, and work happened locally — on your device, and inside your locked-down network environment. This made email and the endpoint the highest priority from a security perspective. But now, with modern work happening across a network of decentralized internet apps, and more varied communication channels outside of email, it’s harder to stop users from interacting with malicious content (at least, without significantly impeding their ability to do their jobs).",{"data":2652,"content":2653,"nodeType":1294},{},[2654],{"data":2655,"marks":2656,"value":2657,"nodeType":1293},{},[],"Given that the browser is the place where business apps are accessed and used, it makes sense that attacks are increasingly playing out there too. ",{"data":2659,"content":2660,"nodeType":1294},{},[2661],{"data":2662,"marks":2663,"value":2664,"nodeType":1293},{},[],"With that covered off, let’s take a closer look at the most prevalent browser-based attack techniques being used by attackers in the wild today.",{"data":2666,"content":2667,"nodeType":1362},{},[],{"data":2669,"content":2670,"nodeType":1328},{},[2671],{"data":2672,"marks":2673,"value":2675,"nodeType":1293},{},[2674],{"type":1326},"The 6 key browser-based attacks that security teams need to know about",{"data":2677,"content":2678,"nodeType":1294},{},[2679],{"data":2680,"marks":2681,"value":2682,"nodeType":1293},{},[],"Attacks that target users in their web browsers have seen an unprecedented rise in recent years. ",{"data":2684,"content":2688,"nodeType":1358},{"target":2685},{"sys":2686},{"id":2687,"type":1355,"linkType":1356},"4ogNqZdObSIJXavHP44lom",[],{"data":2690,"content":2691,"nodeType":1294},{},[2692],{"data":2693,"marks":2694,"value":2695,"nodeType":1293},{},[],"Here's our breakdown of the top 6 browser-based attacks that should be on every security team's radar right now. ",{"data":2697,"content":2698,"nodeType":2159},{},[2699],{"data":2700,"marks":2701,"value":2703,"nodeType":1293},{},[2702],{"type":1326},"1. Phishing for credentials and sessions",{"data":2705,"content":2706,"nodeType":1294},{},[2707],{"data":2708,"marks":2709,"value":2710,"nodeType":1293},{},[],"The most direct way for an attacker to compromise a business application is to phish a user of that app. You might not necessarily think of phishing as a browser-based attack, but that’s exactly what it is today. ",{"data":2712,"content":2713,"nodeType":1294},{},[2714],{"data":2715,"marks":2716,"value":2717,"nodeType":1293},{},[],"Phishing tooling and infrastructure has evolved a lot in the past decade, while the changes to business IT means there are both many more vectors for phishing attack delivery, and apps and identities to target. Attackers can deliver links over instant messenger apps, social media, SMS, malicious ads, and using in-app messenger functionality, as well as sending emails directly from SaaS services to bypass email-based checks. Likewise, there are now hundreds of apps per enterprise to target, with varying levels of account security configuration. ",{"data":2719,"content":2723,"nodeType":1358},{"target":2720},{"sys":2721},{"id":2722,"type":1355,"linkType":1356},"3SrKOgpedLMQRpKIZqUQur",[],{"data":2725,"content":2726,"nodeType":1294},{},[2727,2731,2740],{"data":2728,"marks":2729,"value":2730,"nodeType":1293},{},[],"Whereas phishing was once entirely focused on credential theft, modern phishing attacks see the attacker intercept the victim’s session on the target app, using reverse-proxy Attacker-in-the-Middle kits that are the standard choice for attackers today. This means most forms of MFA can be bypassed, with the exception of passkeys (though attackers are finding ways to work around passkeys using ",{"data":2732,"content":2734,"nodeType":1418},{"uri":2733},"https://pushsecurity.com/blog/mfa-downgrade-attacks/?utm_source=bleeping-computer&utm_medium=sponsored-content&utm_term=article",[2735],{"data":2736,"marks":2737,"value":2739,"nodeType":1293},{},[2738],{"type":1416},"downgrade attacks",{"data":2741,"marks":2742,"value":2743,"nodeType":1293},{},[],"). ",{"data":2745,"content":2749,"nodeType":1358},{"target":2746},{"sys":2747},{"id":2748,"type":1355,"linkType":1356},"2sOFEdAwQZjWOGzNAlGavb",[],{"data":2751,"content":2752,"nodeType":1294},{},[2753],{"data":2754,"marks":2755,"value":2756,"nodeType":1293},{},[],"There are other key differences to be aware of too. Today, phishing operates on an industrial scale, using an array of obfuscation and detection evasion techniques. The latest generation of fully customized AitM phishing kits are dynamically obfuscating the code that loads the web page, implementing custom bot protection (e.g. CAPTCHA or Cloudflare Turnstile), using runtime anti-analysis features, and using legitimate SaaS and cloud services to host and deliver phishing links to cover their tracks.",{"data":2758,"content":2759,"nodeType":1294},{},[2760],{"data":2761,"marks":2762,"value":2198,"nodeType":1293},{},[],{"data":2764,"content":2765,"nodeType":1294},{},[2766],{"data":2767,"marks":2768,"value":2769,"nodeType":1293},{},[],"These changes make phishing more effective than ever, and increasingly difficult to detect and block without being able to observe and analyze web pages that a user interacts with in real time — something only possible with browser-level visibility. ",{"data":2771,"content":2774,"nodeType":1358},{"target":2772},{"sys":2773},{"id":1489,"type":1355,"linkType":1356},[],{"data":2776,"content":2777,"nodeType":1362},{},[],{"data":2779,"content":2780,"nodeType":2159},{},[2781],{"data":2782,"marks":2783,"value":2785,"nodeType":1293},{},[2784],{"type":1326},"2. Malicious copy and paste (aka. ClickFix, FileFix, etc.)",{"data":2787,"content":2788,"nodeType":1294},{},[2789,2792,2799],{"data":2790,"marks":2791,"value":1922,"nodeType":1293},{},[],{"data":2793,"content":2794,"nodeType":1418},{"uri":1927},[2795],{"data":2796,"marks":2797,"value":1930,"nodeType":1293},{},[2798],{"type":1416},{"data":2800,"marks":2801,"value":2802,"nodeType":1293},{},[],". ",{"data":2804,"content":2805,"nodeType":1294},{},[2806],{"data":2807,"marks":2808,"value":2809,"nodeType":1293},{},[],"Originally known as “Fake CAPTCHA”, these attacks attempt to trick users into running malicious commands on their device — typically by solving some form of verification challenge in the browser. ",{"data":2811,"content":2812,"nodeType":1294},{},[2813,2817,2824,2828,2837],{"data":2814,"marks":2815,"value":2816,"nodeType":1293},{},[],"In reality, by solving the challenge, the victim is actually copying malicious code from the page clipboard and running it on their device. It typically gives the victim instructions that involve clicking prompts and copying, pasting, and running commands directly in the Windows Run dialog box, Terminal, or PowerShell. Variants such as ",{"data":2818,"content":2819,"nodeType":1418},{"uri":2091},[2820],{"data":2821,"marks":2822,"value":2094,"nodeType":1293},{},[2823],{"type":1416},{"data":2825,"marks":2826,"value":2827,"nodeType":1293},{},[]," have also emerged which instead uses the File Explorer Address Bar to execute OS commands, while recent examples have seen this attack branch out to ",{"data":2829,"content":2831,"nodeType":1418},{"uri":2830},"https://www.bleepingcomputer.com/news/security/fake-mac-fixes-trick-users-into-installing-new-shamos-infostealer/",[2832],{"data":2833,"marks":2834,"value":2836,"nodeType":1293},{},[2835],{"type":1416},"Mac via the macOS terminal",{"data":2838,"marks":2839,"value":1892,"nodeType":1293},{},[],{"data":2841,"content":2842,"nodeType":1294},{},[2843],{"data":2844,"marks":2845,"value":2846,"nodeType":1293},{},[],"Most commonly, these attacks are used to deliver infostealer malware, using stolen session cookies and credentials to access business apps and services. ",{"data":2848,"content":2849,"nodeType":1294},{},[2850],{"data":2851,"marks":2852,"value":2853,"nodeType":1293},{},[],"Like modern credential and session phishing, links to malicious pages are distributed over various delivery channels and using a variety of lures, including impersonating CAPTCHA, Cloudflare Turnstile, simulating an error loading a webpage, and many more. ",{"data":2855,"content":2859,"nodeType":1358},{"target":2856},{"sys":2857},{"id":2858,"type":1355,"linkType":1356},"6O9YiOfhpGFCDsTil9F3On",[],{"data":2861,"content":2862,"nodeType":1294},{},[2863],{"data":2864,"marks":2865,"value":2866,"nodeType":1293},{},[],"The variance in lure, and differences between different versions of the same lure, can make it difficult to fingerprint and detect based on visual elements alone. Also, many of the same protections being used to obfuscate and prevent analysis of phishing pages also apply to ClickFix pages, making it equally challenging to detect and block them. ",{"data":2868,"content":2869,"nodeType":1294},{},[2870],{"data":2871,"marks":2872,"value":2873,"nodeType":1293},{},[],"This leaves most of the detection and blocking down to endpoint-layer controls around user-level code execution and malware running on a device. The quantity of ClickFix-related headlines in the news would indicate that endpoint controls are being routinely bypassed, or perhaps evaded altogether by targeting personal or BYOD devices. ",{"data":2875,"content":2876,"nodeType":1294},{},[2877],{"data":2878,"marks":2879,"value":2880,"nodeType":1293},{},[],"There is a significant opportunity to detect these attacks in the browser and stop them at the earliest opportunity, before they reach the endpoint. Every ClickFix attack and variant has a key action in common — malicious code is copied from the page’s clipboard. In some cases, this happens without any user interaction (where the only requirement on the user is to run code that has been silently copied behind the scenes), presenting a strong indicator of malicious behavior that can be observed in the browser. ",{"data":2882,"content":2883,"nodeType":1362},{},[],{"data":2885,"content":2886,"nodeType":2159},{},[2887],{"data":2888,"marks":2889,"value":2891,"nodeType":1293},{},[2890],{"type":1326},"3. Malicious OAuth integrations",{"data":2893,"content":2894,"nodeType":1294},{},[2895,2899,2907],{"data":2896,"marks":2897,"value":2898,"nodeType":1293},{},[],"Malicious OAuth integrations are another way for attackers to compromise an app by tricking a user into authorizing an integration with a malicious, attacker-controlled app, with the level of data access and functionality dictated by the scopes authorized in the request. This is also known as ",{"data":2900,"content":2902,"nodeType":1418},{"uri":2901},"https://github.com/pushsecurity/saas-attacks/blob/main/techniques/consent_phishing/description.md",[2903],{"data":2904,"marks":2905,"value":2906,"nodeType":1293},{},[],"consent phishing",{"data":2908,"marks":2909,"value":2910,"nodeType":1293},{},[],". ",{"data":2912,"content":2916,"nodeType":1358},{"target":2913},{"sys":2914},{"id":2915,"type":1355,"linkType":1356},"5JaP4WSfFsFSbvaa9BQBOq",[],{"data":2918,"content":2919,"nodeType":1294},{},[2920],{"data":2921,"marks":2922,"value":2923,"nodeType":1293},{},[],"This is an effective way for attackers to bypass hardened authentication and access controls by sidestepping the typical login process to take over an account and compromise business apps. This includes phishing-resistant MFA methods like passkeys — since the standard login process does not apply. ",{"data":2925,"content":2926,"nodeType":1294},{},[2927],{"data":2928,"marks":2929,"value":2930,"nodeType":1293},{},[],"A variant of this attack has dominated the headlines recently with the ongoing Salesforce breaches. In this scenario, the attacker tricked the victim into authorizing an attacker-controlled OAuth app via the device code authorization flow in Salesforce, which requires the user to enter an 8-digit code in place of a password or MFA factor.",{"data":2932,"content":2936,"nodeType":1358},{"target":2933},{"sys":2934},{"id":2935,"type":1355,"linkType":1356},"3odEFcUcpKN553gHh2P5yr",[],{"data":2938,"content":2939,"nodeType":1294},{},[2940],{"data":2941,"marks":2942,"value":2943,"nodeType":1293},{},[],"Preventing malicious OAuth grants being authorized requires tight in-app management of user permissions and tenant security settings. This is no mean feat when considering the 100s of apps in use across the modern enterprise, many of which are not centrally managed by IT and security teams (or in some cases, are completely unknown to them). Even then, you’re limited by the controls made available by the app vendor. In this case, Salesforce has announced planned changes to OAuth app authorization in order to improve security prompted by these attacks — but many more apps with insecure configs exist for attackers to take advantage of in future. ",{"data":2945,"content":2946,"nodeType":1294},{},[2947],{"data":2948,"marks":2949,"value":2950,"nodeType":1293},{},[],"However, unlike app-specific integrations, browser-based security tools are well positioned to observe OAuth grants across all apps accessed in the browser — even the ones the security team doesn’t manage or know about, or without needing to pay for the app’s special security add-on to get visibility.",{"data":2952,"content":2953,"nodeType":1362},{},[],{"data":2955,"content":2956,"nodeType":2159},{},[2957],{"data":2958,"marks":2959,"value":2961,"nodeType":1293},{},[2960],{"type":1326},"4. Malicious browser extensions",{"data":2963,"content":2964,"nodeType":1294},{},[2965],{"data":2966,"marks":2967,"value":2968,"nodeType":1293},{},[],"Malicious browser extensions are another way for attackers to compromise your business apps by observing and capturing logins as they happen, and/or extracting session cookies and credentials saved in the browser cache and password manager. ",{"data":2970,"content":2971,"nodeType":1294},{},[2972,2976,2985],{"data":2973,"marks":2974,"value":2975,"nodeType":1293},{},[],"Attackers do this by creating their own malicious extension and tricking your users into installing it, or taking over an existing extension to gain access to browsers where it is already installed (",{"data":2977,"content":2979,"nodeType":1418},{"uri":2978},"https://secureannex.com/blog/buying-browser-extensions/",[2980],{"data":2981,"marks":2982,"value":2984,"nodeType":1293},{},[2983],{"type":1416},"it’s very easy for attackers to buy and add malicious updates to existing extensions",{"data":2986,"marks":2987,"value":2988,"nodeType":1293},{},[],", easily passing extension web store security checks). ",{"data":2990,"content":2991,"nodeType":1294},{},[2992,2996,3005,3009,3018,3021,3030],{"data":2993,"marks":2994,"value":2995,"nodeType":1293},{},[],"The news around extension-based compromises has been on the rise since the ",{"data":2997,"content":2999,"nodeType":1418},{"uri":2998},"https://www.bleepingcomputer.com/news/security/new-details-reveal-how-hackers-hijacked-35-google-chrome-extensions/",[3000],{"data":3001,"marks":3002,"value":3004,"nodeType":1293},{},[3003],{"type":1416},"Cyberhaven extension",{"data":3006,"marks":3007,"value":3008,"nodeType":1293},{},[]," was hacked in December 2024, along with at least 35 other extensions. Since then, there has been regular reporting on data-stealing extensions ",{"data":3010,"content":3012,"nodeType":1418},{"uri":3011},"https://www.bleepingcomputer.com/news/security/data-stealing-chrome-extensions-impersonate-fortinet-youtube-vpns/",[3013],{"data":3014,"marks":3015,"value":3017,"nodeType":1293},{},[3016],{"type":1416},"impersonating legitimate brands",{"data":3019,"marks":3020,"value":1435,"nodeType":1293},{},[],{"data":3022,"content":3024,"nodeType":1418},{"uri":3023},"https://www.bleepingcomputer.com/news/security/chrome-extensions-with-6-million-installs-have-hidden-tracking-code/",[3025],{"data":3026,"marks":3027,"value":3029,"nodeType":1293},{},[3028],{"type":1416},"impacting millions of users",{"data":3031,"marks":3032,"value":1892,"nodeType":1293},{},[],{"data":3034,"content":3035,"nodeType":1294},{},[3036],{"data":3037,"marks":3038,"value":3039,"nodeType":1293},{},[],"Risky browser extension permissions include broad data access, the ability to modify website content, track user activity, capture screenshots, and manage tabs or network requests. Permissions like \"read and change all data on all websites\" or access to cookies and browsing history are particularly dangerous as they can be exploited for session hijacking, data theft, malware injection, or phishing.",{"data":3041,"content":3042,"nodeType":1294},{},[3043],{"data":3044,"marks":3045,"value":3046,"nodeType":1293},{},[],"Generally, your employees should not be randomly installing browser extensions unless pre-approved by your security team. The reality, however, is that many organizations have very little visibility of the extensions their employees are using, and the potential risk they’re exposed to as a result. ",{"data":3048,"content":3049,"nodeType":1294},{},[3050],{"data":3051,"marks":3052,"value":3053,"nodeType":1293},{},[],"To tackle malicious extensions, security tools operating in the browser can track the browser extensions deployed, highlight risky permissions, compare with known-malicious extensions, identify fraudulent/unofficial versions of a legitimate extension, and highlight other risky properties commonly associated with malicious extensions (e.g. “Developer” extensions). ",{"data":3055,"content":3056,"nodeType":1362},{},[],{"data":3058,"content":3059,"nodeType":2159},{},[3060],{"data":3061,"marks":3062,"value":3064,"nodeType":1293},{},[3063],{"type":1326},"5. Malicious file delivery",{"data":3066,"content":3067,"nodeType":1294},{},[3068],{"data":3069,"marks":3070,"value":3071,"nodeType":1293},{},[],"Malicious files have been a core part of malware delivery and credential theft for many years. Just as non-email channels like malvertising and drive-by attacks are used to deliver phishing and ClickFix lures, malicious files are also distributed through similar means — leaving malicious file detection to basic known-bad checks, sandbox analysis using a proxy (not that useful in the context of sandbox-aware malware) or runtime analysis on the endpoint. ",{"data":3073,"content":3074,"nodeType":1294},{},[3075],{"data":3076,"marks":3077,"value":3078,"nodeType":1293},{},[],"This doesn’t just have to be malicious executables directly dropping malware onto the device. File downloads can also contain additional links taking the user to malicious content. In fact, one of the most common types of downloadable content are HTML Applications (HTAs), commonly used to spawn local phishing pages to stealthily capture credentials. More recently, attackers have been weaponizing SVG files for a similar purpose, running as self-contained phishing pages that render fake login portals entirely client-side. ",{"data":3080,"content":3081,"nodeType":1294},{},[3082],{"data":3083,"marks":3084,"value":3085,"nodeType":1293},{},[],"Even if malicious content cannot always be flagged from surface-level inspection of a file, recording file downloads in the browser is a useful addition to endpoint-based malware protection, and provides another layer of defense against file downloads that perform client-side attacks, or redirect the user to malicious web-based content. ",{"data":3087,"content":3088,"nodeType":1362},{},[],{"data":3090,"content":3091,"nodeType":2159},{},[3092],{"data":3093,"marks":3094,"value":3096,"nodeType":1293},{},[3095],{"type":1326},"6. Stolen credentials and MFA gaps",{"data":3098,"content":3099,"nodeType":1294},{},[3100],{"data":3101,"marks":3102,"value":3103,"nodeType":1293},{},[],"This last one isn’t so much a browser-based attack, but it is a product of them. When credentials are stolen through phishing or infostealer malware they can be used to take over accounts missing MFA. ",{"data":3105,"content":3106,"nodeType":1294},{},[3107,3111,3118,3122,3131],{"data":3108,"marks":3109,"value":3110,"nodeType":1293},{},[],"This isn’t the most sophisticated attack, but it’s very effective. You need only look at last year’s ",{"data":3112,"content":3113,"nodeType":1418},{"uri":2620},[3114],{"data":3115,"marks":3116,"value":2626,"nodeType":1293},{},[3117],{"type":1416},{"data":3119,"marks":3120,"value":3121,"nodeType":1293},{},[]," account compromises or the ",{"data":3123,"content":3125,"nodeType":1418},{"uri":3124},"https://pushsecurity.com/blog/why-attackers-are-targeting-jira-with-stolen-credentials?utm_source=bleeping-computer&utm_medium=sponsored-content&utm_term=article",[3126],{"data":3127,"marks":3128,"value":3130,"nodeType":1293},{},[3129],{"type":1416},"Jira",{"data":3132,"marks":3133,"value":3134,"nodeType":1293},{},[]," attacks earlier this year to see how attackers harness stolen credentials at scale. ",{"data":3136,"content":3137,"nodeType":1294},{},[3138,3142,3151],{"data":3139,"marks":3140,"value":3141,"nodeType":1293},{},[],"With the modern enterprise using hundreds of apps, the likelihood that an app hasn’t been configured for mandatory MFA (if possible) is high. And even when an app has been configured for SSO and connected to your primary corporate identity, ",{"data":3143,"content":3145,"nodeType":1418},{"uri":3144},"https://pushsecurity.com/blog/how-many-vulnerable-identities-do-you-have/?utm_source=bleeping-computer&utm_medium=sponsored-content&utm_term=sidebar",[3146],{"data":3147,"marks":3148,"value":3150,"nodeType":1293},{},[3149],{"type":1416},"local “ghost logins” can continue to exist",{"data":3152,"marks":3153,"value":3154,"nodeType":1293},{},[],", accepting passwords with no MFA required. Just having visibility of your primary Identity Provider accounts (e.g. Google, Microsoft, Okta) and SSO-connected apps doesn't give you a full picture of your identity surface.",{"data":3156,"content":3157,"nodeType":1294},{},[3158],{"data":3159,"marks":3160,"value":3161,"nodeType":1293},{},[],"Logins can also be observed in the browser — in fact, it’s as close to a universal source of truth as you’re going to get about how your employees are actually logging in, which apps they’re using, and whether MFA is present, enabling security teams to find and fix vulnerable logins before they can be exploited by attackers. ",{"data":3163,"content":3164,"nodeType":1362},{},[],{"data":3166,"content":3167,"nodeType":1328},{},[3168],{"data":3169,"marks":3170,"value":3172,"nodeType":1293},{},[3171],{"type":1326},"Conclusion",{"data":3174,"content":3175,"nodeType":1294},{},[3176],{"data":3177,"marks":3178,"value":3179,"nodeType":1293},{},[],"Attacks are increasingly happening in the browser. That makes it the perfect place to detect and respond to these attacks. But right now, the browser is a blind-spot for most security teams. ",{"data":3181,"content":3182,"nodeType":1294},{},[3183],{"data":3184,"marks":3185,"value":3186,"nodeType":1293},{},[],"Push Security’s browser-based security platform provides comprehensive detection and response capabilities against the leading cause of breaches. Push blocks browser-based attacks like AiTM phishing, credential stuffing, password spraying and session hijacking using stolen session tokens. You can also use Push to find and fix vulnerabilities across the apps that your employees use, like ghost logins, SSO coverage gaps, MFA gaps, vulnerable passwords, risky OAuth integrations, and more to harden your identity attack surface.",{"data":3188,"content":3189,"nodeType":1294},{},[3190,3194,3202],{"data":3191,"marks":3192,"value":3193,"nodeType":1293},{},[],"If you want to learn more about how Push helps you to detect and stop attacks in the browser, ",{"data":3195,"content":3197,"nodeType":1418},{"uri":3196},"https://pushsecurity.com/demo?utm_source=bleeping-computer&utm_medium=sponsored-content&utm_term=article",[3198],{"data":3199,"marks":3200,"value":1888,"nodeType":1293},{},[3201],{"type":1416},{"data":3203,"marks":3204,"value":1892,"nodeType":1293},{},[],"6 browser-based attacks every security team should be prepared for","What security teams need to know about the browser-based attack techniques that are the leading cause of breaches.","2025-09-05T00:00:00.000Z","6-browser-based-attacks-every-security-team-should-be-prepared-for",{"items":3210},[3211,3213],{"sys":3212,"name":1308},{"id":1307},{"sys":3214,"name":1304},{"id":1303},{"items":3216},[3217],{"fullName":1906,"firstName":1907,"jobTitle":1908,"profilePicture":3218},{"url":1910},{"items":3220},[3221],{"fullName":1906,"firstName":1907,"jobTitle":1908,"profilePicture":3222},{"url":1910},{"json":3224,"links":3799},{"nodeType":1295,"data":3225,"content":3226},{},[3227,3234,3241,3253,3259,3266,3269,3277,3284,3290,3306,3313,3336,3343,3349,3352,3360,3393,3399,3418,3424,3444,3451,3457,3460,3468,3475,3494,3501,3521,3528,3534,3537,3545,3552,3585,3592,3599,3645,3664,3675,3682,3685,3693,3712,3719,3726,3731,3734,3742,3762,3788,3793],{"nodeType":1294,"data":3228,"content":3229},{},[3230],{"nodeType":1293,"value":3231,"marks":3232,"data":3233},"ClickFix attacks have skyrocketed in the last year. This social engineering attack has established itself as a key part of the modern attacker’s toolkit, tricking victims into running malicious code on their device.",[],{},{"nodeType":1294,"data":3235,"content":3236},{},[3237],{"nodeType":1293,"value":3238,"marks":3239,"data":3240},"As we showcased in our last webinar and at our threat briefing in London earlier this month, ClickFix is evolving fast, in terms of the web pages themselves, the delivery mechanisms by which they are sent to victims, and the nature of the payload and its execution.",[],{},{"nodeType":1294,"data":3242,"content":3243},{},[3244,3248],{"nodeType":1293,"value":3245,"marks":3246,"data":3247},"One particular example stood out to us in our research. ",[],{},{"nodeType":1293,"value":3249,"marks":3250,"data":3252},"So, is this the most advanced ClickFix you’ve seen?",[3251],{"type":1326},{},{"nodeType":1358,"data":3254,"content":3258},{"target":3255},{"sys":3256},{"id":3257,"type":1355,"linkType":1356},"ID7VKJNOZk729P5zBOBjZ",[],{"nodeType":1294,"data":3260,"content":3261},{},[3262],{"nodeType":1293,"value":3263,"marks":3264,"data":3265},"Let’s break it down further.",[],{},{"nodeType":1362,"data":3267,"content":3268},{},[],{"nodeType":1328,"data":3270,"content":3271},{},[3272],{"nodeType":1293,"value":3273,"marks":3274,"data":3276},"How ClickFix pages are evolving",[3275],{"type":1326},{},{"nodeType":1294,"data":3278,"content":3279},{},[3280],{"nodeType":1293,"value":3281,"marks":3282,"data":3283},"The CloudFlare-based lure is a great example of how ClickFix pages themselves are evolving — and becoming increasingly convincing to users. ",[],{},{"nodeType":1358,"data":3285,"content":3289},{"target":3286},{"sys":3287},{"id":3288,"type":1355,"linkType":1356},"4wJOgtofImjbsekyXMc5Ec",[],{"nodeType":1294,"data":3291,"content":3292},{},[3293,3297,3302],{"nodeType":1293,"value":3294,"marks":3295,"data":3296},"This is an incredibly slick example — ",[],{},{"nodeType":1293,"value":3298,"marks":3299,"data":3301},"it almost looks like Cloudflare shipped a new kind of bot check service. ",[3300],{"type":1326},{},{"nodeType":1293,"value":3303,"marks":3304,"data":3305},"The embedded video, countdown timer, and counter for “users verified in the last hour” all serve to increase the sense of authenticity, and put extra pressure on the victim to complete the check. ",[],{},{"nodeType":1294,"data":3307,"content":3308},{},[3309],{"nodeType":1293,"value":3310,"marks":3311,"data":3312},"There are a couple of extra things happening under the hood here, too:",[],{},{"nodeType":2244,"data":3314,"content":3315},{},[3316,3326],{"nodeType":2248,"data":3317,"content":3318},{},[3319],{"nodeType":1294,"data":3320,"content":3321},{},[3322],{"nodeType":1293,"value":3323,"marks":3324,"data":3325},"The page is adapting to the device that you’re visiting from, serving up instructions specific to the user’s Mac (increasingly common as ClickFix expands to support different Operating Systems).",[],{},{"nodeType":2248,"data":3327,"content":3328},{},[3329],{"nodeType":1294,"data":3330,"content":3331},{},[3332],{"nodeType":1293,"value":3333,"marks":3334,"data":3335},"The page is automatically copying the malicious code to the user’s clipboard via JavaScript (which we see in 9/10 cases).",[],{},{"nodeType":1294,"data":3337,"content":3338},{},[3339],{"nodeType":1293,"value":3340,"marks":3341,"data":3342},"For the past decade or more, user awareness has focused on stopping users from clicking links in suspicious emails, downloading risky files, and entering their username and password into random websites. It hasn’t focused on opening up a program and running a command — so it’s no surprise that this kind of highly convincing page is so effective at duping victims into following the instructions. ",[],{},{"nodeType":1358,"data":3344,"content":3348},{"target":3345},{"sys":3346},{"id":3347,"type":1355,"linkType":1356},"LiVIyGxdAaUXUfvKjD6ON",[],{"nodeType":1362,"data":3350,"content":3351},{},[],{"nodeType":1328,"data":3353,"content":3354},{},[3355],{"nodeType":1293,"value":3356,"marks":3357,"data":3359},"How ClickFix delivery methods are evolving",[3358],{"type":1326},{},{"nodeType":1294,"data":3361,"content":3362},{},[3363,3367,3376,3380,3389],{"nodeType":1293,"value":3364,"marks":3365,"data":3366},"There’s also the fact that this page wasn’t accessed via email. The top delivery vector for ClickFix attacks that we’ve observed is, in fact, Google Search — in the form of ",[],{},{"nodeType":1418,"data":3368,"content":3370},{"uri":3369},"https://phishing-techniques.pushsecurity.com/techniques/malvertising/",[3371],{"nodeType":1293,"value":3372,"marks":3373,"data":3375},"poisoned search results and malicious advertising (malvertising)",[3374],{"type":1416},{},{"nodeType":1293,"value":3377,"marks":3378,"data":3379},". Attackers are either taking over legitimate sites (there’s a ",[],{},{"nodeType":1418,"data":3381,"content":3383},{"uri":3382},"https://www.bleepingcomputer.com/news/security/hackers-launch-mass-attacks-exploiting-outdated-wordpress-plugins/",[3384],{"nodeType":1293,"value":3385,"marks":3386,"data":3388},"steady supply of website hosting and CMS vulnerabilities",[3387],{"type":1416},{},{"nodeType":1293,"value":3390,"marks":3391,"data":3392}," to take advantage of) or simply vibe-coding their own sites and optimizing them for various search terms. ",[],{},{"nodeType":1358,"data":3394,"content":3398},{"target":3395},{"sys":3396},{"id":3397,"type":1355,"linkType":1356},"6N9EmH6AaN6Hr4xk6ozATR",[],{"nodeType":1294,"data":3400,"content":3401},{},[3402,3406,3415],{"nodeType":1293,"value":3403,"marks":3404,"data":3405},"And because most anti-phishing controls are implemented via email, by using ",[],{},{"nodeType":1418,"data":3407,"content":3409},{"uri":3408},"https://pushsecurity.com/blog/why-attackers-are-moving-beyond-email-based-phishing?utm_source=thehackernews&utm_medium=sponsored-content&utm_term=article",[3410],{"nodeType":1293,"value":3411,"marks":3412,"data":3414},"non-email delivery vectors, an entire layer of detection opportunity is cut out",[3413],{"type":1416},{},{"nodeType":1293,"value":2802,"marks":3416,"data":3417},[],{},{"nodeType":1358,"data":3419,"content":3423},{"target":3420},{"sys":3421},{"id":3422,"type":1355,"linkType":1356},"1CWsZlLFX9TS53J1uamOG8",[],{"nodeType":1294,"data":3425,"content":3426},{},[3427,3431,3440],{"nodeType":1293,"value":3428,"marks":3429,"data":3430},"But even when they are sent via email, ClickFix pages, like other modern phishing sites, are using a range of ",[],{},{"nodeType":1418,"data":3432,"content":3434},{"uri":3433},"https://pushsecurity.com/blog/phishing-detection-evasion-launch?utm_source=thehackernews&utm_medium=sponsored-content&utm_term=article",[3435],{"nodeType":1293,"value":3436,"marks":3437,"data":3439},"detection evasion techniques",[3438],{"type":1416},{},{"nodeType":1293,"value":3441,"marks":3442,"data":3443}," that prevent them being flagged by security tools — from email scanners, to web-crawling security tools, to web proxies analyzing network traffic. Detection evasion mainly involves camouflaging and rotating domains to stay ahead of known-bad detections (i.e. blocklists), using bot protection to prevent analysis, and heavily obfuscating page content to stop detection signatures firing. ",[],{},{"nodeType":1294,"data":3445,"content":3446},{},[3447],{"nodeType":1293,"value":3448,"marks":3449,"data":3450},"Finally, because the code is copied inside the browser sandbox, typical security tools are unable to observe and flag this action as potentially malicious. This means that the last — and only — opportunity for organizations to stop ClickFix is on the endpoint, after the user has attempted to run the malicious code.",[],{},{"nodeType":1358,"data":3452,"content":3456},{"target":3453},{"sys":3454},{"id":3455,"type":1355,"linkType":1356},"3HiqpIBWWMr5FMi3IBzXcc",[],{"nodeType":1362,"data":3458,"content":3459},{},[],{"nodeType":1328,"data":3461,"content":3462},{},[3463],{"nodeType":1293,"value":3464,"marks":3465,"data":3467},"How ClickFix payloads are evolving",[3466],{"type":1326},{},{"nodeType":1294,"data":3469,"content":3470},{},[3471],{"nodeType":1293,"value":3472,"marks":3473,"data":3474},"It’s not just the ClickFix page and delivery mechanisms that are evolving — the services where code is being run, and the type of payload, are also increasingly varied. ",[],{},{"nodeType":1294,"data":3476,"content":3477},{},[3478,3482,3490],{"nodeType":1293,"value":3479,"marks":3480,"data":3481},"While the main payloads observed by Push are mshta and PowerShell, ",[],{},{"nodeType":1418,"data":3483,"content":3484},{"uri":2124},[3485],{"nodeType":1293,"value":3486,"marks":3487,"data":3489},"attackers are abusing a wide range of LOLBINS",[3488],{"type":1416},{},{"nodeType":1293,"value":3491,"marks":3492,"data":3493}," targeting different services across Operating Systems.",[],{},{"nodeType":1294,"data":3495,"content":3496},{},[3497],{"nodeType":1293,"value":3498,"marks":3499,"data":3500},"While it is possible to disable the Win+R dialog box and limit the applications that can be run from the File Explorer address bar, it is not possible to similarly restrict users from interacting with other legitimate services to run malicious commands. ",[],{},{"nodeType":1294,"data":3502,"content":3503},{},[3504,3508,3517],{"nodeType":1293,"value":3505,"marks":3506,"data":3507},"Another recent example termed ",[],{},{"nodeType":1418,"data":3509,"content":3511},{"uri":3510},"https://expel.com/blog/cache-smuggling-when-a-picture-isnt-a-thousand-words/",[3512],{"nodeType":1293,"value":3513,"marks":3514,"data":3516},"cache smuggling",[3515],{"type":1416},{},{"nodeType":1293,"value":3518,"marks":3519,"data":3520}," was also identified by security researchers. This technique combines a ClickFix approach with JavaScript that caches a malicious file posing as a JPG. This means that the ClickFix command executes locally — effectively getting an entire zip file onto the local system without the PowerShell command needing to make any web requests.",[],{},{"nodeType":1294,"data":3522,"content":3523},{},[3524],{"nodeType":1293,"value":3525,"marks":3526,"data":3527},"Finally, it’s worth considering the future of ClickFix. The current attack path straddles browser and endpoint — what if it could take place entirely in the browser and evade EDR altogether? ",[],{},{"nodeType":1358,"data":3529,"content":3533},{"target":3530},{"sys":3531},{"id":3532,"type":1355,"linkType":1356},"2rUDKawJnrmZVtxfNcSNha",[],{"nodeType":1362,"data":3535,"content":3536},{},[],{"nodeType":1328,"data":3538,"content":3539},{},[3540],{"nodeType":1293,"value":3541,"marks":3542,"data":3544},"What’s the impact of ClickFix evolution?",[3543],{"type":1326},{},{"nodeType":1294,"data":3546,"content":3547},{},[3548],{"nodeType":1293,"value":3549,"marks":3550,"data":3551},"To summarize:",[],{},{"nodeType":2244,"data":3553,"content":3554},{},[3555,3565,3575],{"nodeType":2248,"data":3556,"content":3557},{},[3558],{"nodeType":1294,"data":3559,"content":3560},{},[3561],{"nodeType":1293,"value":3562,"marks":3563,"data":3564},"ClickFix pages are becoming increasingly sophisticated, making it more likely that victims will fall for the social engineering.",[],{},{"nodeType":2248,"data":3566,"content":3567},{},[3568],{"nodeType":1294,"data":3569,"content":3570},{},[3571],{"nodeType":1293,"value":3572,"marks":3573,"data":3574},"ClickFix delivery is evading traditional monitoring controls at the email layer to reach victims. ",[],{},{"nodeType":2248,"data":3576,"content":3577},{},[3578],{"nodeType":1294,"data":3579,"content":3580},{},[3581],{"nodeType":1293,"value":3582,"marks":3583,"data":3584},"ClickFix payloads are becoming more varied and are finding new ways to evade security controls. ",[],{},{"nodeType":1294,"data":3586,"content":3587},{},[3588],{"nodeType":1293,"value":3589,"marks":3590,"data":3591},"This means that EDR-based interception of malware execution is the last — and only — real line of defense for most organizations, kicking in after the initial script has been run (typically acting as a stager for the real malware). ",[],{},{"nodeType":1294,"data":3593,"content":3594},{},[3595],{"nodeType":1293,"value":3596,"marks":3597,"data":3598},"Malware execution can and should be intercepted by EDR, but it’s not foolproof. ",[],{},{"nodeType":2244,"data":3600,"content":3601},{},[3602,3625,3635],{"nodeType":2248,"data":3603,"content":3604},{},[3605],{"nodeType":1294,"data":3606,"content":3607},{},[3608,3612,3621],{"nodeType":1293,"value":3609,"marks":3610,"data":3611},"Attackers are constantly ",[],{},{"nodeType":1418,"data":3613,"content":3615},{"uri":3614},"https://www.infostealers.com/article/logins-zip-leverages-chromium-zero-day-stealthy-infostealer-builder-promises-99-credential-theft-in-under-12-seconds/",[3616],{"nodeType":1293,"value":3617,"marks":3618,"data":3620},"developing new tools and capabilities",[3619],{"type":1416},{},{"nodeType":1293,"value":3622,"marks":3623,"data":3624}," to bypass EDR in the cat-and-mouse game between attackers and defenders.",[],{},{"nodeType":2248,"data":3626,"content":3627},{},[3628],{"nodeType":1294,"data":3629,"content":3630},{},[3631],{"nodeType":1293,"value":3632,"marks":3633,"data":3634},"Because ClickFix attacks are user initiated, context might be missing that lead to the alert being misclassified. This can mean the difference between the level of priority alert that is raised, and whether or not it is automatically blocked.",[],{},{"nodeType":2248,"data":3636,"content":3637},{},[3638],{"nodeType":1294,"data":3639,"content":3640},{},[3641],{"nodeType":1293,"value":3642,"marks":3643,"data":3644},"If you’re an organization that allows employees and contractors to use unmanaged BYOD devices, there’s a strong chance that there are gaps in your EDR coverage.",[],{},{"nodeType":1294,"data":3646,"content":3647},{},[3648,3652,3660],{"nodeType":1293,"value":3649,"marks":3650,"data":3651},"This is why attackers are doubling down. According to the ",[],{},{"nodeType":1418,"data":3653,"content":3655},{"uri":3654},"https://cdn-dynmedia-1.microsoft.com/is/content/microsoftcorp/microsoft/msc/documents/presentations/CSR/Microsoft-Digital-Defense-Report-2025.pdf#page=1",[3656],{"nodeType":1293,"value":3657,"marks":3658,"data":3659},"2025 Microsoft Digital Defense report",[],{},{"nodeType":1293,"value":3661,"marks":3662,"data":3663},", ClickFix was the most common initial access method in the last year, accounting for 47% of attacks. That's a pretty significant stat.",[],{},{"nodeType":3665,"data":3666,"content":3667},"blockquote",{},[3668],{"nodeType":1294,"data":3669,"content":3670},{},[3671],{"nodeType":1293,"value":3672,"marks":3673,"data":3674},"47% of attacks started with ClickFix in the last year, according to Microsoft.",[],{},{"nodeType":1294,"data":3676,"content":3677},{},[3678],{"nodeType":1293,"value":3679,"marks":3680,"data":3681},"Ultimately, organizations are leaving themselves relying on a single line of defense — if the attack isn’t detected and blocked by EDR, it isn’t spotted at all. ",[],{},{"nodeType":1362,"data":3683,"content":3684},{},[],{"nodeType":1328,"data":3686,"content":3687},{},[3688],{"nodeType":1293,"value":3689,"marks":3690,"data":3692},"Don’t gamble on a single point of failure ",[3691],{"type":1326},{},{"nodeType":1294,"data":3694,"content":3695},{},[3696,3700,3708],{"nodeType":1293,"value":3697,"marks":3698,"data":3699},"Push Security’s latest feature, ",[],{},{"nodeType":1418,"data":3701,"content":3703},{"uri":3702},"https://pushsecurity.com/blog/introducing-malicious-copy-paste-detection?utm_source=thehackernews&utm_medium=sponsored-content&utm_term=article",[3704],{"nodeType":1293,"value":2029,"marks":3705,"data":3707},[3706],{"type":1416},{},{"nodeType":1293,"value":3709,"marks":3710,"data":3711},", tackles ClickFix-style attacks at the earliest opportunity through browser-based detection and blocking. This is a universally effective control that works regardless of the lure delivery channel, page style and structure, or the specifics of the malware type and execution.",[],{},{"nodeType":1294,"data":3713,"content":3714},{},[3715],{"nodeType":1293,"value":3716,"marks":3717,"data":3718},"Unlike heavy-handed DLP solutions that block copy-paste altogether, Push protects your employees without disrupting their user experience or hampering productivity.",[],{},{"nodeType":1294,"data":3720,"content":3721},{},[3722],{"nodeType":1293,"value":3723,"marks":3724,"data":3725},"By adding a new layer of protection in the browser, security teams can reduce the strain on their EDR and reduce the risk of host-based controls being bypassed through misconfiguration or attacker innovation. ",[],{},{"nodeType":1358,"data":3727,"content":3730},{"target":3728},{"sys":3729},{"id":2041,"type":1355,"linkType":1356},[],{"nodeType":1362,"data":3732,"content":3733},{},[],{"nodeType":1328,"data":3735,"content":3736},{},[3737],{"nodeType":1293,"value":3738,"marks":3739,"data":3741},"Learn more",[3740],{"type":1326},{},{"nodeType":1294,"data":3743,"content":3744},{},[3745,3749,3758],{"nodeType":1293,"value":3746,"marks":3747,"data":3748},"If you want to learn more about ClickFix attacks and how they’re evolving, ",[],{},{"nodeType":1418,"data":3750,"content":3752},{"uri":3751},"https://pushsecurity.com/resources/clickfix",[3753],{"nodeType":1293,"value":3754,"marks":3755,"data":3757},"check out our latest webinar (now available on-demand!)",[3756],{"type":1416},{},{"nodeType":1293,"value":3759,"marks":3760,"data":3761}," where we dive into real-world ClickFix examples and demonstrate how ClickFix sites work under the hood. ",[],{},{"nodeType":1294,"data":3763,"content":3764},{},[3765,3768,3775,3778,3785],{"nodeType":1293,"value":1866,"marks":3766,"data":3767},[],{},{"nodeType":1418,"data":3769,"content":3770},{"uri":1869},[3771],{"nodeType":1293,"value":1875,"marks":3772,"data":3774},[3773],{"type":1416},{},{"nodeType":1293,"value":1879,"marks":3776,"data":3777},[],{},{"nodeType":1418,"data":3779,"content":3780},{"uri":1882},[3781],{"nodeType":1293,"value":1888,"marks":3782,"data":3784},[3783],{"type":1416},{},{"nodeType":1293,"value":1892,"marks":3786,"data":3787},[],{},{"nodeType":1358,"data":3789,"content":3792},{"target":3790},{"sys":3791},{"id":3347,"type":1355,"linkType":1356},[],{"nodeType":1294,"data":3794,"content":3795},{},[3796],{"nodeType":1293,"value":37,"marks":3797,"data":3798},[],{},{"entries":3800},{"hyperlink":3801,"inline":3802,"block":3803},[],[],[3804,3809,3817,3824,3848,3855,3869,3876],{"sys":3805,"__typename":3806,"title":1296,"arcadeDemoUrl":3807,"playText":3808},{"id":3257},"ArcadeDemo","https://demo.arcade.software/yQIHbuD990Dk5CjI1cvS?embed","1 mins",{"sys":3810,"__typename":3811,"title":3812,"caption":3812,"layoutMode":118,"file":3813},{"id":3288},"Image","The most advanced ClickFix page we’ve seen — complete with an embedded video showing the victim how to complete the check.",{"url":3814,"width":3815,"height":3816},"https://images.ctfassets.net/y1cdw1ablpvd/ImveC0bIdp4QxXqHyQKz9/526f7ae589f71d0c23c7c738b8d0bc90/image3.png",1999,1117,{"sys":3818,"__typename":3819,"type":3820,"ctaText":3821,"buttonLabel":3822,"buttonColour":3823,"buttonUrl":3751},{"id":3347},"CtaWidget","Custom","Check out our latest webinar for a deep dive into the evolution of ClickFix-style attacks, with real-world examples from investigations.","Watch On-demand","sunny orange",{"sys":3825,"__typename":3826,"content":3827,"name":3847,"title":118},{"id":3397},"InsightTextBlockComponent",{"json":3828},{"data":3829,"content":3830,"nodeType":1295},{},[3831],{"data":3832,"content":3833,"nodeType":1294},{},[3834,3838,3843],{"data":3835,"marks":3836,"value":3837,"nodeType":1293},{},[],"Of the ClickFix pages intercepted by Push where the delivery vector was observed, ",{"data":3839,"marks":3840,"value":3842,"nodeType":1293},{},[3841],{"type":1326},"4 in 5 were accessed via Google Search.",{"data":3844,"marks":3845,"value":3846,"nodeType":1293},{},[]," While other examples may have been stopped by controls such as email before the page could be loaded by the user, this shows a significant monitoring gap when it comes to non-email delivery vectors.","ClickFix blog insight box 2",{"sys":3849,"__typename":3811,"title":3850,"caption":3850,"layoutMode":118,"file":3851},{"id":3422},"Like other modern phishing attacks, ClickFix lures are distributed all over the internet — not just email.",{"url":3852,"width":3853,"height":3854},"https://images.ctfassets.net/y1cdw1ablpvd/4l0xLRs8Z1w3aXMbzzyFPL/9cb4721c53379da31a4019371072a7ef/image1.png",1696,986,{"sys":3856,"__typename":3826,"content":3857,"name":3868,"title":118},{"id":3455},{"json":3858},{"data":3859,"content":3860,"nodeType":1295},{},[3861],{"data":3862,"content":3863,"nodeType":1294},{},[3864],{"data":3865,"marks":3866,"value":3867,"nodeType":1293},{},[],"Although there are ways to block web pages from performing copy to clipboard via device settings or group policy, the practical reality of ClickFix means that these methods are not effective. Because ClickFix is a user gesture initiated paste event (some form of user interaction such as a button press is required on the page before loading the ClickFix lure) it cannot be blocked from the host.","ClickFix insight box 1",{"sys":3870,"__typename":3811,"title":3871,"caption":3871,"layoutMode":118,"file":3872},{"id":3532},"The current hybrid attack path sees the attacker deliver lures in the browser, to compromise the endpoint, to get access to creds and cookies stored in the browser. What if you could skip the endpoint altogether? ",{"url":3873,"width":3874,"height":3875},"https://images.ctfassets.net/y1cdw1ablpvd/7kIZUmQkiHKKX0kjZQYfia/a7957baa43f54fe407779e845240e27e/image2.png",1970,816,{"sys":3877,"__typename":3806,"title":3878,"arcadeDemoUrl":3879,"playText":3880},{"id":2041},"ClickFix Feature Release","https://demo.arcade.software/qhzGMAx2q3b6IRlHqBsB?embed","2 mins","content:blog:the-most-advanced-clickfix-yet.json","json","content","blog/the-most-advanced-clickfix-yet.json","blog/the-most-advanced-clickfix-yet",1776359982686]