[{"data":1,"prerenderedAt":5164},["ShallowReactive",2],{"application-flags":3,"navbar":7,"always-visible-banner":95,"navbar-about-highlight":155,"navbar-resource-highlight":211,"use-case-page":256,"blog/the-saas-attack-matrix-one-year-on":1276},[4],{"name":5,"enabled":6},"maintenanceMode",false,[8,59,76],{"createdDate":9,"id":10,"name":11,"modelId":12,"published":13,"stageModifiedSincePublish":6,"query":14,"data":15,"variations":50,"lastUpdated":51,"firstPublished":52,"testRatio":33,"createdBy":53,"lastUpdatedBy":53,"folders":54,"meta":55,"rev":58},1742213002749,"efff2a27faf4408e9f908eba4b5542fe","inductive-automation","1c6207a5f24948ab82d4a0b17f251193","published",[],{"testimonial":16,"description":43,"type":19,"link":44,"title":47,"testimonialLink":48,"image":49},{"@type":17,"id":18,"model":19,"value":20},"@builder.io/core:Reference","f028f2b685bb47cd8bf9e82a26dd5a79","testimonial",{"query":21,"folders":22,"createdDate":23,"id":18,"name":24,"modelId":25,"published":13,"data":26,"variations":30,"lastUpdated":31,"firstPublished":32,"testRatio":33,"createdBy":34,"lastUpdatedBy":34,"meta":35,"rev":42},[],[],1735823466309,"We found Push to be more accurate when compared to competitors and the browser agent offered features that others couldn’t match.","42035571a56940ac98bff4544aa79aa5",{"author":27,"jobTitle":28,"quote":24,"image":29},"Jason Waits","\u003Cp>CISO at Inductive Automation\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Ff04c0c0689ce4a89ac0f0708d78c0a07",{},1735910703862,1735823501152,1,"ST0tXQM8slWpFrmioqKHmENB2qe2",{"kind":36,"lastPreviewUrl":37,"breakpoints":38,"hasAutosaves":41},"data","",{"small":39,"medium":40},640,768,true,"3v32gocrrqz","Join the industry's top security minds as they break down the browser attack landscape.",{"url":45,"text":46},"https://pushsecurity.com/webinar/state-of-browser-security","Save Your Spot","State of Browser Attacks Series","/customer-stories/inductive-automation","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fe94fca10aa7b46ac8052b7ea22de54cd",{},1776257019270,1742221533648,"CydmZnOWU1XuAaLhEDCoYNM4Z8W2",[],{"breakpoints":56,"kind":36,"lastPreviewUrl":37,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},320,"motto9r9yg",{"createdDate":60,"id":61,"name":62,"modelId":12,"published":13,"query":63,"data":64,"variations":69,"lastUpdated":70,"firstPublished":71,"testRatio":33,"createdBy":53,"lastUpdatedBy":72,"folders":73,"meta":74,"rev":58},1742208588866,"1c7a4e423bf54ac1a328bb4063459ef2","Banner",[],{"type":65,"url":66,"text":67,"link":68},"web-banner","https://pushsecurity.com/resources/browser-attacks-report","Get our latest report analyzing browser attack techniques in 2026",{},{},1774258294825,1742208637545,"jKjF9r5jcvXU8tzZEfFQm31Iyvr2",[],{"kind":36,"lastPreviewUrl":37,"breakpoints":75,"hasAutosaves":41},{"xsmall":57,"small":39,"medium":40},{"createdDate":77,"id":78,"name":79,"modelId":12,"published":13,"stageModifiedSincePublish":6,"query":80,"data":81,"variations":89,"lastUpdated":90,"firstPublished":91,"testRatio":33,"createdBy":53,"lastUpdatedBy":53,"folders":92,"meta":93,"rev":58},1742208469288,"6763051b201f44a0838c6400c580ca67","Resource highlight",[],{"image":82,"type":83,"description":84,"link":85,"title":88},"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F7b4a5ebf81d64e8c9d7fc35f6c96c4a9","resource","Learn about the latest techniques being used in the wild.",{"url":86,"text":87},"/resources/browser-attacks-report","Download now","Report: 2026 Browser Attack Techniques",{},1776255866789,1742208570400,[],{"kind":36,"lastPreviewUrl":37,"breakpoints":94,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},{"createdDate":96,"id":97,"name":98,"modelId":99,"published":13,"query":100,"data":101,"variations":145,"lastUpdated":146,"firstPublished":147,"testRatio":33,"createdBy":34,"lastUpdatedBy":148,"folders":149,"meta":150,"rev":154},1774965361051,"fd266d0172cc47429be7ad10f48c99ad","always visible banner","0678d178ec8b41efb8a23c09dba7874d",[],{"ctaText":102,"text":103,"url":37,"blocks":104,"state":141},"ewrererw","testrfesssssssssss",[105,129],{"@type":106,"@version":107,"id":108,"component":109,"responsiveStyles":119},"@builder.io/sdk:Element",2,"builder-ca12c06a52de41d7b8743da53118cd38",{"name":110,"tag":110,"options":111,"isRSC":118},"TopBannerContent",{"text":112,"ctaText":46,"url":45,"mainText":113,"cta":116},"New Webinar Series: Join John Hammond, Troy Hunt, and Matt Johansen for the State of Browser Attacks",{"content":114,"fontSize":115},"\u003Cp>New Webinar Series: Join John Hammond, Troy Hunt, and Matt Johansen for the State of Browser Attacks\u003C/p>","text-base",{"content":117,"fontSize":115,"url":45},"\u003Cp>\u003Cstrong style=\"font-weight:700;\">Save Your Spot\u003C/strong>\u003C/p>\n",null,{"large":120},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"marginTop":126,"marginBottom":126,"fontSize":127,"fontWeight":128},"flex","column","relative","0","border-box",".56rem","1.125rem","700",{"id":130,"@type":106,"tagName":131,"properties":132,"responsiveStyles":136},"builder-pixel-08zrjigffq5t","img",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},"https://cdn.builder.io/api/v1/pixel?apiKey=f3a1111ff5be48cdbb123cd9f5795a05","true","presentation",{"large":137},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},"block","hidden","none",{"deviceSize":142,"location":143},"large",{"path":37,"query":144},{},{},1775137295127,1774968080803,"ax7YYfD0OCeqT1Vxxv1G4FUbqVr1",[],{"breakpoints":151,"hasLinks":6,"kind":152,"lastPreviewUrl":153,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},"component","https://pushsecurity.com/?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CeditProjects%2CmodifyMcpServers%2CmodifyWorkflowIntegrations%2CmodifyProjectSettings%2CconnectCodeRepository%2CcreateProjects%2CindexDesignSystems%2CsendPullRequests%2CmergePullRequests&builder.user.role.name=Developer&builder.user.role.id=developer&builder.cachebust=true&builder.preview=always-visible-banner&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.always-visible-banner=fd266d0172cc47429be7ad10f48c99ad&builder.overrides.fd266d0172cc47429be7ad10f48c99ad=fd266d0172cc47429be7ad10f48c99ad&builder.options.locale=Default","2lvuonnywj",[156,180],{"createdDate":157,"id":158,"name":159,"modelId":160,"published":13,"stageModifiedSincePublish":6,"query":161,"data":162,"variations":173,"lastUpdated":174,"firstPublished":175,"testRatio":33,"createdBy":53,"lastUpdatedBy":53,"folders":176,"meta":177,"rev":179},1776247359804,"9136a8f18b3b4a6ba29b8653a99372b1","testimonial-inductive-automation","20d9eaa352304613b3d1a794b400703d",[],{"link":163,"type":19,"testimonialLink":48,"testimonial":164},{},{"@type":17,"id":18,"model":19,"value":165},{"query":166,"folders":167,"createdDate":23,"id":18,"name":24,"modelId":25,"published":13,"data":168,"variations":169,"lastUpdated":31,"firstPublished":32,"testRatio":33,"createdBy":34,"lastUpdatedBy":34,"meta":170,"rev":172},[],[],{"author":27,"jobTitle":28,"quote":24,"image":29},{},{"kind":36,"lastPreviewUrl":37,"breakpoints":171,"hasAutosaves":41},{"small":39,"medium":40},"7t755zfvte3",{},1776247404986,1776247404973,[],{"breakpoints":178,"kind":36,"lastPreviewUrl":37,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},"4moh0qpywtr",{"createdDate":181,"id":182,"name":88,"modelId":160,"published":13,"meta":183,"stageModifiedSincePublish":6,"query":185,"data":186,"variations":207,"lastUpdated":208,"firstPublished":209,"testRatio":33,"createdBy":53,"lastUpdatedBy":53,"folders":210,"rev":179},1776255761419,"05a9322735fc427db12e2740e4302300",{"breakpoints":184,"kind":36,"lastPreviewUrl":37,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},[],{"testimonial":187,"link":206,"type":83,"title":88,"description":84,"image":82},{"@type":17,"id":188,"model":19,"value":189},"192acbb1f9ca4cac918c0ec435a8bae3",{"query":190,"folders":191,"createdDate":192,"id":188,"name":193,"modelId":25,"published":13,"data":194,"variations":200,"lastUpdated":201,"firstPublished":202,"testRatio":33,"createdBy":34,"lastUpdatedBy":53,"meta":203,"rev":205},[],[],1728981467463,"Push does for identity what CrowdStrike did for the endpoint",{"video":195,"jobTitle":196,"author":197,"qoute":37,"quote":198,"image":199},"https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F8b30e8ca50064058bbaef0f3c6164575%2Fcompressed?apiKey=f3a1111ff5be48cdbb123cd9f5795a05&token=8b30e8ca50064058bbaef0f3c6164575&alt=media&optimized=true","\u003Cp>Deputy CISO at Microsoft\u003C/p>\u003Cp>Former LinkedIn, Slack, Palantir\u003C/p>","Geoff Belknap","Push does for identity what CrowdStrike did for the endpoint.","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F748f0ad0a5064a00a13f4721fcc8dea1",{},1742902158597,1728981782923,{"kind":36,"lastPreviewUrl":37,"breakpoints":204,"hasAutosaves":41},{"small":39,"medium":40},"6s8ic0w0ao6",{"text":87,"url":86},{},1776255810913,1776255810900,[],[212,235],{"createdDate":213,"id":214,"name":88,"modelId":215,"published":13,"meta":216,"stageModifiedSincePublish":6,"query":218,"data":219,"variations":230,"lastUpdated":231,"firstPublished":232,"testRatio":33,"createdBy":53,"lastUpdatedBy":53,"folders":233,"rev":234},1776256900280,"1f429607996e4e5fae8fe3f9b9610e55","4829faa81e7c4ee8bd2d000e160e8d3c",{"breakpoints":217,"kind":36,"lastPreviewUrl":37,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},[],{"testimonial":220,"link":229,"type":83,"title":88,"description":84,"image":82},{"@type":17,"id":188,"model":19,"value":221},{"query":222,"folders":223,"createdDate":192,"id":188,"name":193,"modelId":25,"published":13,"data":224,"variations":225,"lastUpdated":201,"firstPublished":202,"testRatio":33,"createdBy":34,"lastUpdatedBy":53,"meta":226,"rev":228},[],[],{"video":195,"jobTitle":196,"author":197,"qoute":37,"quote":198,"image":199},{},{"kind":36,"lastPreviewUrl":37,"breakpoints":227,"hasAutosaves":41},{"small":39,"medium":40},"r77qqueuo3j",{"text":87,"url":86},{},1776256937553,1776256937540,[],"q0jkez80wkg",{"createdDate":236,"id":237,"name":11,"modelId":215,"published":13,"stageModifiedSincePublish":6,"query":238,"data":239,"variations":250,"lastUpdated":251,"firstPublished":252,"testRatio":33,"createdBy":53,"lastUpdatedBy":53,"folders":253,"meta":254,"rev":234},1776256949234,"ce043785b71b4ece98eac811ecf4ba10",[],{"link":240,"type":19,"testimonial":241,"testimonialLink":48},{},{"@type":17,"id":18,"model":19,"value":242},{"query":243,"folders":244,"createdDate":23,"id":18,"name":24,"modelId":25,"published":13,"data":245,"variations":246,"lastUpdated":31,"firstPublished":32,"testRatio":33,"createdBy":34,"lastUpdatedBy":34,"meta":247,"rev":249},[],[],{"author":27,"jobTitle":28,"quote":24,"image":29},{},{"kind":36,"lastPreviewUrl":37,"breakpoints":248,"hasAutosaves":41},{"small":39,"medium":40},"mnaneamy308",{},1776256974140,1776256974130,[],{"breakpoints":255,"kind":36,"lastPreviewUrl":37,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},[257,441,560,679,797,917,1037,1157],{"createdDate":258,"id":259,"name":260,"modelId":261,"published":13,"stageModifiedSincePublish":6,"query":262,"data":268,"variations":429,"lastUpdated":430,"firstPublished":431,"testRatio":33,"screenshot":432,"createdBy":34,"lastUpdatedBy":433,"folders":434,"meta":435,"rev":440},1744829487099,"387451215c314dd5bd654668cdc1a197","Zero-day phishing","cca4143377554c5a9163cc203a8ed2ba",[263],{"@type":264,"property":265,"operator":266,"value":267},"@builder.io/core:Query","urlPath","is","/uc/zero-day-phishing-protection",{"inputs":269,"customFonts":270,"seoTitle":318,"title":318,"tsCode":37,"seoDescription":319,"fontAwesomeIcon":320,"jsCode":37,"blocks":321,"url":267,"state":426},[],[271],{"family":272,"kind":273,"version":274,"lastModified":275,"files":276,"category":295,"menu":296,"subsets":297,"variants":300},"DM Sans","webfonts#webfont","v14","2023-07-13",{"100":277,"200":278,"300":279,"500":280,"600":281,"700":282,"800":283,"900":284,"800italic":285,"900italic":286,"700italic":287,"100italic":288,"italic":289,"regular":290,"200italic":291,"500italic":292,"300italic":293,"600italic":294},"https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAop1hTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAIpxhTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwA_JxhTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAkJxhTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAfJthTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwARZthTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAIpthTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAC5thTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat8JCm3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat8gCm3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat9uCm3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat-JDG3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat-JDW3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAopxhTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat8JDW3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat-7DW3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat_XDW3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat9XCm3zRmYJpso5.ttf","sans-serif","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAopxRT23z.ttf",[298,299],"latin","latin-ext",[301,302,303,304,305,306,128,307,308,309,310,311,312,313,314,315,316,317],"100","200","300","regular","500","600","800","900","100italic","200italic","300italic","italic","500italic","600italic","700italic","800italic","900italic","Zero-day phishing protection","Detect phishing TTPs directly in the browser and stop credential theft.","faFishingRod",[322,421],{"@type":106,"@version":107,"tagName":323,"id":324,"children":325},"div","builder-76c6b8d1499346c7bc1fd56ae4e93638",[326,343,351,358,370,385,396,407,413],{"@type":106,"@version":107,"layerName":327,"id":328,"component":329,"responsiveStyles":340},"UseCaseHero","builder-5228fe062bef4a40a91e43f1112832fa",{"name":327,"options":330,"isRSC":118},{"title":318,"description":331,"points":332,"video":339},"\u003Cp>Push detects phishing as it happens. Autonomous agents hunt for new phishing techniques, identify kit signatures, and deploy detections within minutes of a new attack being analyzed. From cloned login pages to AiTM credential harvesting, Push sees what traditional filters miss and stops threats before they escalate.\u003C/p>",[333,335,337],{"item":334},"Detect phishing that bypasses traditional filters, including AiTM, SSO password theft, and fake login pages",{"item":336},"Stop never-before-seen attacks with AI-native behavioral and on-page analysis inside the browser",{"item":338},"Investigate faster with unified browser, user, and page context","https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F40433ceeb4f94b43a82e039a0f4fd411%2Fcompressed?apiKey=f3a1111ff5be48cdbb123cd9f5795a05&token=40433ceeb4f94b43a82e039a0f4fd411&alt=media&optimized=true",{"large":341},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":342},"transparent",{"@type":106,"@version":107,"id":344,"component":345,"responsiveStyles":348},"builder-96634044407e491299e291ed64669e39",{"name":346,"options":347,"isRSC":118},"TrustedBy",{"AllPartners":41,"backgroundTransparent":6},{"large":349},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":350},"#000",{"@type":106,"@version":107,"id":352,"component":353,"responsiveStyles":356},"builder-2c3768f930534557bb8978e32b6a6a0f",{"name":354,"options":355,"isRSC":118},"Diagonal",{"darkMode":41},{"large":357},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"layerName":359,"id":360,"component":361,"responsiveStyles":368},"TextImageBlockVertical","builder-7c3c1c2840424db2ad2ccbfaf382dd64",{"name":359,"tag":359,"options":362,"isRSC":118},{"darkMode":6,"maxWidth":363,"maxTextWidth":364,"title":365,"description":366,"animatedTitle":37,"image":367,"reverse":6,"descriptionPaddingHorizontal":118},1200,800,"\u003Ch2>Why stop at the inbox?\u003C/h2>","\u003Cp>Phishing attacks have evolved. Whether attackers lure users with QR codes, instant messages, or OAuth consent screens, the outcome is the same: it plays out in the browser. Push gives you real-time detection for in-browser threats, stopping phishing and consent-based attacks before they lead to compromise\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F7fdcac241f0e4a049166d7076858adeb",{"large":369},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":371,"component":372,"responsiveStyles":380},"builder-41c978b3669749cf947e622b4e79e4d7",{"name":373,"options":374,"isRSC":118},"TextImageBlockHorizontal",{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":376,"title":377,"description":378,"reverse":41,"image":379},600,100,"\u003Cp>Detect phishing at the edge\u003C/p>","\u003Cp>Push uses industry-first telemetry to detect phishing based on behavior, not static indicators. Autonomous agents analyze how phishing pages behave and how users interact with them, uncovering fake logins, credential theft, and phishing kits the moment they load in the browser.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F9df3d180c97b4e61af142af2ccd68721",{"large":381},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"fontFamily":382,"paddingTop":383,"marginTop":384},"DM Sans, sans-serif","20px","0px",{"@type":106,"@version":107,"id":386,"component":387,"responsiveStyles":393},"builder-d2a7bc941feb43cdb898bc116b203cf9",{"name":373,"options":388,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":389,"title":390,"description":391,"reverse":6,"image":392},120,"\u003Ch2>Go beyond blocklists and IOCs\u003C/h2>","\u003Cp>Push goes beyond URLs and easy-to-change indicators. It reads the full phishing playbook like script behavior, session hijacks, DOM changes, user inputs, then connects the dots in real time. This gives your team a complete picture of how the phishing attempt worked, not just an alert.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fabfd58db169b433e96d3f1261797156e",{"large":394},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":395},"36px",{"@type":106,"@version":107,"layerName":373,"id":397,"component":398,"responsiveStyles":404},"builder-42c32198083f4880acb37c5cb76934da",{"name":373,"options":399,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":400,"title":401,"description":402,"reverse":41,"image":403},140,"\u003Ch2>Enhance your phishing response\u003C/h2>","\u003Cp>When phishing enters your environment, speed matters. Push gives you instant access to the telemetry that counts like session data, user behavior, and page activity, so you can investigate fast, trigger in-browser prompts, or forward alerts to your SIEM or SOAR for response. All in real time, right from the browser.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fbb195aec46904056b85e8688629e558e",{"large":405},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":406},"47px",{"@type":106,"@version":107,"id":408,"component":409,"responsiveStyles":411},"builder-9a95b9cbc4854421a92ef7b90f6c7adb",{"name":354,"options":410,"isRSC":118},{"darkMode":6},{"large":412},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":414,"component":415,"responsiveStyles":419},"builder-0afa17a9f25c4661a90f314d5578aa18",{"name":416,"tag":416,"options":417,"isRSC":118},"LatestResources",{"sectionHeading":37,"customClass":418},"bg-black",{"large":420},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":422,"@type":106,"tagName":131,"properties":423,"responsiveStyles":424},"builder-pixel-21yj6h3p4wh",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":425},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":427},{"path":37,"query":428},{},{},1776275046831,1745499158657,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fff60c30a8442489c8ed7e0af9599d14f","kYgMv6WsbvfmlOUYqR2SFwGzw6e2",[],{"lastPreviewUrl":436,"winningTest":118,"breakpoints":437,"kind":438,"hasLinks":6,"originalContentId":439,"hasAutosaves":6},"https://pushsecurity.com/uc/zero-day-phishing-protection?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CcreateProjects%2CsendPullRequests&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=387451215c314dd5bd654668cdc1a197&builder.overrides.387451215c314dd5bd654668cdc1a197=387451215c314dd5bd654668cdc1a197&builder.overrides.use-case-page:/uc/zero-day-phishing-protection=387451215c314dd5bd654668cdc1a197&builder.options.locale=Default",{"xsmall":57,"small":39,"medium":40},"page","2daa5670b8504fc7ba4700633e8bd921","atvz4dp24b7",{"createdDate":442,"id":443,"name":444,"modelId":261,"published":13,"stageModifiedSincePublish":6,"query":445,"data":448,"variations":552,"lastUpdated":553,"firstPublished":554,"testRatio":33,"screenshot":555,"createdBy":34,"lastUpdatedBy":433,"folders":556,"meta":557,"rev":440},1756833377777,"54f8256648f54d439303734b1e69221b","Browser extension security",[446],{"@type":264,"property":265,"operator":266,"value":447},"/uc/browser-extension-security",{"seoDescription":449,"jsCode":37,"fontAwesomeIcon":450,"tsCode":37,"title":444,"seoTitle":444,"customFonts":451,"inputs":456,"blocks":457,"url":447,"state":549},"Shine a light on risky browser extensions.","faPuzzlePiece",[452],{"kind":273,"family":272,"version":274,"files":453,"category":295,"lastModified":275,"subsets":454,"variants":455,"menu":296},{"100":277,"200":278,"300":279,"500":280,"600":281,"700":282,"800":283,"900":284,"100italic":288,"italic":289,"regular":290,"900italic":286,"800italic":285,"700italic":287,"200italic":291,"300italic":293,"500italic":292,"600italic":294},[298,299],[301,302,303,304,305,306,128,307,308,309,310,311,312,313,314,315,316,317],[],[458,544],{"@type":106,"@version":107,"tagName":323,"id":459,"meta":460,"children":461},"builder-71d0648c1d2f4ede8d0d0b5b28b7b94c",{"previousId":324},[462,478,485,492,501,511,521,531,538],{"@type":106,"@version":107,"id":463,"meta":464,"component":465,"responsiveStyles":476},"builder-ff325b4b8fad4edea53f38865947e854",{"previousId":328},{"name":327,"options":466,"isRSC":118},{"title":444,"description":467,"points":468,"video":475},"\u003Cp>Browser extensions introduce new code, new permissions, and new potential for risk. Many include AI features, and most go completely unnoticed. Push gives you full visibility into every extension used across your workforce, across major browsers, so you can uncover shadow IT, assess risky permissions, and block unsafe tools before they lead to compromise.\u003C/p>",[469,471,473],{"item":470},"Discover every browser extension in use",{"item":472},"Spot risky or unsanctioned behavior",{"item":474},"Make informed decisions on extension policy","https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fc538aad95d7f403aa3c3551af72f67c0?alt=media&token=1411fa6d-2eac-4e6c-94bf-ea117da12d67&apiKey=f3a1111ff5be48cdbb123cd9f5795a05",{"large":477},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":342},{"@type":106,"@version":107,"id":479,"meta":480,"component":481,"responsiveStyles":483},"builder-fb89d128c64e47cf9cbb11d90fc24523",{"previousId":344},{"name":346,"options":482,"isRSC":118},{"AllPartners":41,"backgroundTransparent":6},{"large":484},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":350},{"@type":106,"@version":107,"id":486,"meta":487,"component":488,"responsiveStyles":490},"builder-54388d35126c4d0096eeebaf8c4448cd",{"previousId":352},{"name":354,"options":489,"isRSC":118},{"darkMode":41},{"large":491},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"layerName":359,"id":493,"component":494,"responsiveStyles":499},"builder-3c8fa6785dd6466abf52a2470d66d85a",{"name":359,"tag":359,"options":495,"isRSC":118},{"darkMode":6,"maxWidth":363,"maxTextWidth":364,"title":496,"description":497,"image":498,"reverse":6},"\u003Ch2>Take control of browser extensions\u003C/h2>","\u003Cp>Attackers are increasingly using malicious browser extensions to gain access to data processed and stored in the browser. And the problem is, most security teams have no visibility into what extensions are being used. Push changes that. With browser-native telemetry, the Push extension continuously inventories browser extensions across your environment, flags the risky ones, and gives you intelligence to act.&nbsp;\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F0a004f16a6874f4c8fdf14344acc9fec",{"large":500},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":502,"meta":503,"component":504,"responsiveStyles":509},"builder-93738f98109a4009affb349afd7bb182",{"previousId":371},{"name":373,"options":505,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":376,"title":506,"description":507,"reverse":41,"image":508},"\u003Ch2>Discover every extension in use\u003C/h2>","\u003Cp>Push gives you structured, searchable data about every extension in your environment, so you’re not just seeing what’s there, but also understanding how it got there, what it can do, and who it affects. It’s the kind of granular insight that’s nearly impossible to get from traditional tools, and it lays the groundwork for better policy decisions and faster investigations.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F0e5727ca99474f14b1b7916bf6bbb782",{"large":510},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"fontFamily":382,"paddingTop":383,"marginTop":384},{"@type":106,"@version":107,"id":512,"meta":513,"component":514,"responsiveStyles":519},"builder-83393acb12ee4fdd840839185b51edb4",{"previousId":386},{"name":373,"options":515,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":389,"title":516,"description":517,"reverse":6,"image":518},"\u003Ch2>Spot risky or malicious extensions\u003C/h2>","\u003Cp>Push highlights extensions with dangerous permissions, broad access, or poor reputations. This includes AI extensions that request access far beyond what their stated purpose requires. You can quickly detect sideloaded, manually installed, or development-mode extensions that bypass normal controls. And because Push shows you who’s using them and where, you can respond precisely and effectively.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fa104d58c8da34fbb8901f738fb21453b",{"large":520},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":395},{"@type":106,"@version":107,"layerName":373,"id":522,"meta":523,"component":524,"responsiveStyles":529},"builder-da98e3de949646d89c53a0d1c2784664",{"previousId":397},{"name":373,"options":525,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":400,"title":526,"description":527,"reverse":41,"image":528},"\u003Ch2>Accelerate security reviews\u003C/h2>","\u003Cp>Most teams have extension policies, they just don’t have the data to enforce them. Push reveals how each extension entered your environment, whether it was installed manually, sideloaded, or deployed in dev mode. You’ll see which users are running what, and where, so you can surface violations, investigate quickly, and respond with confidence.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F229f355be6f243b180f410d237a75bb3",{"large":530},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":406},{"@type":106,"@version":107,"id":532,"meta":533,"component":534,"responsiveStyles":536},"builder-1a689287d1a1418997d57db578a71105",{"previousId":408},{"name":354,"options":535,"isRSC":118},{"darkMode":6},{"large":537},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":539,"component":540,"responsiveStyles":542},"builder-feb4e75029f84c10b6498ef1f8f79128",{"name":416,"tag":416,"options":541,"isRSC":118},{"sectionHeading":37,"customClass":418},{"large":543},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":545,"@type":106,"tagName":131,"properties":546,"responsiveStyles":547},"builder-pixel-0edn39avfcei",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":548},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":550},{"path":37,"query":551},{},{},1776275365038,1757000441666,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F8d496cf111644ee5afcc046b72d1ca5a",[],{"kind":438,"winningTest":118,"breakpoints":558,"lastPreviewUrl":559,"hasLinks":6,"originalContentId":259,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},"https://pushsecurity.com/uc/browser-extension-security?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CcreateProjects%2CsendPullRequests&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=54f8256648f54d439303734b1e69221b&builder.overrides.54f8256648f54d439303734b1e69221b=54f8256648f54d439303734b1e69221b&builder.overrides.use-case-page:/uc/browser-extension-security=54f8256648f54d439303734b1e69221b&builder.options.locale=Default",{"createdDate":561,"id":562,"name":563,"modelId":261,"published":13,"query":564,"data":567,"variations":670,"lastUpdated":671,"firstPublished":672,"testRatio":33,"screenshot":673,"createdBy":34,"lastUpdatedBy":674,"folders":675,"meta":676,"rev":440},1744923509705,"94bebb7bb99d48629ad157e80cf4d81d","Account takeover detection",[565],{"@type":264,"property":265,"operator":266,"value":566},"/uc/account-takeover-detection",{"title":563,"customFonts":568,"jsCode":37,"seoTitle":563,"seoDescription":573,"fontAwesomeIcon":574,"tsCode":37,"blocks":575,"url":566,"state":667},[569],{"kind":273,"category":295,"variants":570,"menu":296,"files":571,"family":272,"subsets":572,"version":274,"lastModified":275},[301,302,303,304,305,306,128,307,308,309,310,311,312,313,314,315,316,317],{"100":277,"200":278,"300":279,"500":280,"600":281,"700":282,"800":283,"900":284,"300italic":293,"500italic":292,"800italic":285,"700italic":287,"italic":289,"900italic":286,"600italic":294,"200italic":291,"regular":290,"100italic":288},[298,299],"Stop ATO with stolen credential and compromised token detection.","faUserSecret",[576,662],{"@type":106,"@version":107,"tagName":323,"id":577,"meta":578,"children":579},"builder-e7913a774cae44c5a23d6081c5c30a52",{"previousId":324},[580,596,603,610,619,629,639,649,656],{"@type":106,"@version":107,"id":581,"meta":582,"component":583,"responsiveStyles":594},"builder-f1f1ab1601bc4c0f8c2a8aafd173675d",{"previousId":328},{"name":327,"options":584,"isRSC":118},{"title":563,"description":585,"points":586,"video":593},"\u003Cp>Attackers don’t need to phish, they just need a password that works. Push monitors for signs of credential-based attacks in real time, directly in the browser, catching account takeover attempts before the damage spreads. From ghost logins to credential stuffing, Push cuts off the paths attackers use to quietly slip in the back door.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>",[587,589,591],{"item":588},"Identify credential-based ATO as it unfolds",{"item":590},"Surface hijacked sessions and token misuse",{"item":592},"Strengthen authentication where your IdP can’t","https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fb4dd9db24bc9495b8a686b1b4d492016%2Fcompressed?apiKey=f3a1111ff5be48cdbb123cd9f5795a05&token=b4dd9db24bc9495b8a686b1b4d492016&alt=media&optimized=true",{"large":595},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":342},{"@type":106,"@version":107,"id":597,"meta":598,"component":599,"responsiveStyles":601},"builder-0bc0d1c78ece4994993c3a6427a4d533",{"previousId":344},{"name":346,"options":600,"isRSC":118},{"AllPartners":41,"backgroundTransparent":6},{"large":602},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":350},{"@type":106,"@version":107,"id":604,"meta":605,"component":606,"responsiveStyles":608},"builder-e45de8f3768c4f16938dbf78e4e87524",{"previousId":352},{"name":354,"options":607,"isRSC":118},{"darkMode":41},{"large":609},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":611,"component":612,"responsiveStyles":617},"builder-c98e8bfd341146c1b67c02d5698ff093",{"name":359,"tag":359,"options":613,"isRSC":118},{"darkMode":6,"maxWidth":363,"maxTextWidth":364,"title":614,"description":615,"image":616,"reverse":6},"\u003Ch2>Assume less. See more.\u003C/h2>","\u003Cp>Most account takeovers don’t start with a breach, they start with a login. Whether it’s a reused password, a local account, or an outdated login flow, Push shows you how accounts are actually accessed day to day, not just how policies say they should be. That means no more blind spots around ghost logins, bypassed SSO, or stale access paths that quietly persist.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F18630ad2746d4eb7b7fcc0428b11a8f0",{"large":618},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":620,"meta":621,"component":622,"responsiveStyles":627},"builder-55c1fc38ddc04fd1a0d6a8e2fb819e00",{"previousId":371},{"name":373,"options":623,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":376,"title":624,"description":625,"reverse":41,"image":626},"\u003Ch2>Catch stolen credential use in real time\u003C/h2>","\u003Cp>Push monitors login activity directly in the browser to detect signs of credential-based attacks like leaked password use or suspicious login flows. By analyzing attacker TTPs instead of relying on known indicators, Push spots credential stuffing and account takeover attempts the moment they begin, not after they’ve succeeded.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F52b0123cac2c4dfdb1dc0af6adf9d603",{"large":628},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"fontFamily":382,"paddingTop":384,"marginTop":384},{"@type":106,"@version":107,"id":630,"meta":631,"component":632,"responsiveStyles":637},"builder-dfb31737b30948c6b95323655d571a50",{"previousId":386},{"name":373,"options":633,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":389,"title":634,"description":635,"reverse":6,"image":636},"\u003Ch2>Detect session hijacks and stealth access\u003C/h2>","\u003Cp>Attackers don’t always need a login screen, they often sidestep it entirely using stolen session tokens. Push detects when valid sessions are reused in unexpected ways, identifying hijacked sessions and stealth access attempts that traditional tools miss. Because we monitor directly in the browser, you see what’s happening inside active sessions in real time.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F94a6859a99e04d309ffe5841f3dbdf5c",{"large":638},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":395},{"@type":106,"@version":107,"layerName":373,"id":640,"meta":641,"component":642,"responsiveStyles":647},"builder-f7585b90eb974d03a7dc7eae5b58d227",{"previousId":397},{"name":373,"options":643,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":400,"title":644,"description":645,"reverse":41,"image":646},"\u003Ch2>Harden accounts before they’re compromised\u003C/h2>","\u003Cp>Push goes beyond alerts. It identifies apps that still allow local logins, even when SSO is configured, so you can remove weak access paths. Push also flags users without MFA, reused work credentials, or weak passwords, and prompts users in-browser to fix risky behaviors before they’re exploited.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F01c1b638f1b6497093a4f2b8ceddb5bb",{"large":648},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":406},{"@type":106,"@version":107,"id":650,"meta":651,"component":652,"responsiveStyles":654},"builder-ad81d1e3afec49a791214194eae09bdc",{"previousId":408},{"name":354,"options":653,"isRSC":118},{"darkMode":6},{"large":655},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":657,"component":658,"responsiveStyles":660},"builder-8dac1aa4b9d148628d92252bd8eff822",{"name":416,"tag":416,"options":659,"isRSC":118},{"sectionHeading":37,"customClass":418},{"large":661},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":663,"@type":106,"tagName":131,"properties":664,"responsiveStyles":665},"builder-pixel-s5u3wmvz7jq",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":666},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":668},{"path":37,"query":669},{},{},1770892814499,1745499162732,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F58b660fa94aa4b30b0faeb9b663ae41a","SfUPqW5tkibIPby49keNFMdHFTr1",[],{"lastPreviewUrl":677,"hasLinks":6,"originalContentId":259,"breakpoints":678,"winningTest":118,"kind":438,"hasAutosaves":41},"https://pushsecurity.com/uc/account-takeover-detection?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CeditProjects%2CmodifyMcpServers%2CmodifyWorkflowIntegrations%2CmodifyProjectSettings%2CconnectCodeRepository%2CcreateProjects%2CindexDesignSystems%2CsendPullRequests&builder.user.role.name=Developer&builder.user.role.id=developer&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=94bebb7bb99d48629ad157e80cf4d81d&builder.overrides.94bebb7bb99d48629ad157e80cf4d81d=94bebb7bb99d48629ad157e80cf4d81d&builder.overrides.use-case-page:/uc/account-takeover-detection=94bebb7bb99d48629ad157e80cf4d81d&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"xsmall":57,"small":39,"medium":40},{"createdDate":680,"id":681,"name":682,"modelId":261,"published":13,"query":683,"data":686,"variations":789,"lastUpdated":790,"firstPublished":791,"testRatio":33,"screenshot":792,"createdBy":34,"lastUpdatedBy":674,"folders":793,"meta":794,"rev":440},1745009370904,"23eb48fb56d3451cab77cb6ed140ee6d","Attack path hardening",[684],{"@type":264,"property":265,"operator":266,"value":685},"/uc/attack-path-hardening",{"tsCode":37,"seoDescription":687,"jsCode":37,"customFonts":688,"fontAwesomeIcon":693,"seoTitle":682,"title":682,"blocks":694,"url":685,"state":786},"Harden access paths with visibility,  detection, and guardrails.",[689],{"kind":273,"files":690,"version":274,"lastModified":275,"subsets":691,"menu":296,"category":295,"variants":692,"family":272},{"100":277,"200":278,"300":279,"500":280,"600":281,"700":282,"800":283,"900":284,"regular":290,"italic":289,"800italic":285,"500italic":292,"600italic":294,"200italic":291,"900italic":286,"700italic":287,"100italic":288,"300italic":293},[298,299],[301,302,303,304,305,306,128,307,308,309,310,311,312,313,314,315,316,317],"faRadar",[695,781],{"@type":106,"@version":107,"tagName":323,"id":696,"meta":697,"children":698},"builder-1d8553eddcaa44d7bba9e2f4ca13af2a",{"previousId":577},[699,715,722,729,738,748,758,768,775],{"@type":106,"@version":107,"id":700,"meta":701,"component":702,"responsiveStyles":713},"builder-84fe3d7c85a743cf8cef649aa974f1ef",{"previousId":581},{"name":327,"options":703,"isRSC":118},{"title":682,"description":704,"points":705,"video":712},"\u003Cp>Push continuously monitors your environment for exposed login paths, weak credentials, and missing protections like MFA. It detects the gaps attackers exploit and helps you close them before they’re used.\u003C/p>",[706,708,710],{"item":707},"Find weak spots like reused passwords, local logins, and missing MFA",{"item":709},"Monitor how users actually log in across apps, flows, and tools",{"item":711},"Enforce secure access with in-browser guardrails","https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fdbdcf52892034f1bbddded77f753a343%2Fcompressed?apiKey=f3a1111ff5be48cdbb123cd9f5795a05&token=dbdcf52892034f1bbddded77f753a343&alt=media&optimized=true",{"large":714},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":342},{"@type":106,"@version":107,"id":716,"meta":717,"component":718,"responsiveStyles":720},"builder-b3f66f5b08054cc78a06fecfc3ae2337",{"previousId":597},{"name":346,"options":719,"isRSC":118},{"AllPartners":41,"backgroundTransparent":6},{"large":721},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":350},{"@type":106,"@version":107,"id":723,"meta":724,"component":725,"responsiveStyles":727},"builder-4c73418b84be49ed85e6e13d2625c5a0",{"previousId":604},{"name":354,"options":726,"isRSC":118},{"darkMode":41},{"large":728},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":730,"component":731,"responsiveStyles":736},"builder-dec0246085e1485c803f7152b1922a81",{"name":359,"tag":359,"options":732,"isRSC":118},{"darkMode":6,"maxWidth":363,"maxTextWidth":364,"title":733,"description":734,"image":735,"reverse":6},"\u003Ch2>Find the gaps that lead to compromise\u003C/h2>","\u003Cp>Misconfigurations don’t show up in your config files, they show up in how users actually access apps. Push monitors real login behavior in the browser, surfacing risky patterns like local login access, duplicate accounts, or missing protections that leave doors wide open.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F309a59bba8d247a19476bb369397460e",{"large":737},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":739,"meta":740,"component":741,"responsiveStyles":746},"builder-ebf049a645604a249550996a88f8f3b6",{"previousId":620},{"name":373,"options":742,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":376,"title":743,"description":744,"reverse":41,"image":745},"\u003Ch2>See real login behavior\u003C/h2>","\u003Cp>Push watches authentication flows as they happen, giving you a live view of how users log in, which methods they choose, and where protections like MFA are missing. Plus, uncover every app and account in use, even shadow IT you didn’t know existed, without relying on stale config files or IdP assumptions. \u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fb51f6b0357cc451b87a7a5016d984e5e",{"large":747},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"fontFamily":382,"paddingTop":383,"marginTop":384},{"@type":106,"@version":107,"id":749,"meta":750,"component":751,"responsiveStyles":756},"builder-431d175c59004669b0b2776b07d71737",{"previousId":630},{"name":373,"options":752,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":389,"title":753,"description":754,"reverse":6,"image":755},"\u003Ch2>Find and fix posture drift\u003C/h2>","\u003Cp>Security posture isn’t static. Push continuously monitors for issues like missing MFA or legacy login methods. When something falls out of policy, you know immediately with custom notifications so you can act before it turns into risk.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F324e39127dfc41e592b1183dfb39892d",{"large":757},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":395},{"@type":106,"@version":107,"layerName":373,"id":759,"meta":760,"component":761,"responsiveStyles":766},"builder-3dffdcbe0a484e2ca4c03f019b6d40ee",{"previousId":640},{"name":373,"options":762,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":400,"title":763,"description":764,"reverse":41,"image":765},"\u003Ch2>Guide users with in-browser guardrails\u003C/h2>","\u003Cp>Push doesn’t just surface problems, it helps you fix them. When users sign in without MFA, reuse a password, or use insecure credentials, Push prompts them directly in the browser to secure their access. It’s faster, more effective, and actually gets results.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fee8b75d13e45488aba55434a8b49ebb0",{"large":767},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":406},{"@type":106,"@version":107,"id":769,"meta":770,"component":771,"responsiveStyles":773},"builder-976bc222cd7647ff905f1e01cfedc453",{"previousId":650},{"name":354,"options":772,"isRSC":118},{"darkMode":6},{"large":774},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":776,"component":777,"responsiveStyles":779},"builder-8c47ec2fd0f74382bb3e6c870555632c",{"name":416,"tag":416,"options":778,"isRSC":118},{"sectionHeading":37,"customClass":418},{"large":780},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":782,"@type":106,"tagName":131,"properties":783,"responsiveStyles":784},"builder-pixel-7akm7dayau8",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":785},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":787},{"path":37,"query":788},{},{},1770892844854,1745499166112,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F6ca12bf728a045f1a31d40c0beb3bfe5",[],{"kind":438,"lastPreviewUrl":795,"breakpoints":796,"hasLinks":6,"originalContentId":562,"winningTest":118,"hasAutosaves":6},"https://pushsecurity.com/uc/attack-path-hardening?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CeditProjects%2CmodifyMcpServers%2CmodifyWorkflowIntegrations%2CmodifyProjectSettings%2CconnectCodeRepository%2CcreateProjects%2CindexDesignSystems%2CsendPullRequests&builder.user.role.name=Developer&builder.user.role.id=developer&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=23eb48fb56d3451cab77cb6ed140ee6d&builder.overrides.23eb48fb56d3451cab77cb6ed140ee6d=23eb48fb56d3451cab77cb6ed140ee6d&builder.overrides.use-case-page:/uc/attack-path-hardening=23eb48fb56d3451cab77cb6ed140ee6d&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"xsmall":57,"small":39,"medium":40},{"createdDate":798,"id":799,"name":800,"modelId":261,"published":13,"query":801,"data":804,"variations":909,"lastUpdated":910,"firstPublished":911,"testRatio":33,"screenshot":912,"createdBy":34,"lastUpdatedBy":674,"folders":913,"meta":914,"rev":440},1761675020232,"ea4f309d2ffe46c5aa97ebf0fda4e2e3","ClickFix Protection",[802],{"@type":264,"property":265,"operator":266,"value":803},"/uc/clickfix-protection",{"seoDescription":805,"fontAwesomeIcon":806,"customFonts":807,"seoTitle":812,"jsCode":37,"tsCode":37,"title":812,"blocks":813,"url":803,"state":906},"Block attacks that trick users into running malicious code.","faLaptopCode",[808],{"files":809,"subsets":810,"menu":296,"version":274,"kind":273,"family":272,"lastModified":275,"variants":811,"category":295},{"100":277,"200":278,"300":279,"500":280,"600":281,"700":282,"800":283,"900":284,"200italic":291,"800italic":285,"700italic":287,"600italic":294,"100italic":288,"italic":289,"regular":290,"300italic":293,"500italic":292,"900italic":286},[298,299],[301,302,303,304,305,306,128,307,308,309,310,311,312,313,314,315,316,317],"ClickFix protection",[814,901],{"@type":106,"@version":107,"tagName":323,"id":815,"meta":816,"children":817},"builder-d7eefdde0f2a4b2b9de3dcb2978fd6cb",{"previousId":696},[818,834,841,848,858,868,878,888,895],{"@type":106,"@version":107,"id":819,"meta":820,"component":821,"responsiveStyles":832},"builder-56e2c54bcce040a4af8b92ae03706c12",{"previousId":700},{"name":327,"options":822,"isRSC":118},{"title":812,"description":823,"points":824,"image":831},"\u003Cp>ClickFix attacks are one of the fastest-growing threats, tricking users into copying malicious code from a webpage and running it locally. This technique bypasses traditional EDR, email gateways, and network filters, leading directly to ransomware and data theft. Push stops this attack at the source, in the browser, by detecting and blocking the malicious behavior before the user can ever paste the code.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>",[825,827,829],{"item":826},"Detect ClickFix, FileFix, and fake CAPTCHA in the browser",{"item":828},"Block malicious copy-and-paste actions before code is executed",{"item":830},"See full telemetry into which users were targeted and what they saw","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F7b74af62889847ebb3927364485b0546",{"large":833},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":342},{"@type":106,"@version":107,"id":835,"meta":836,"component":837,"responsiveStyles":839},"builder-05f9614d4e3e4dc88b3ee8658f54e10e",{"previousId":716},{"name":346,"options":838,"isRSC":118},{"AllPartners":41,"backgroundTransparent":6},{"large":840},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":350},{"@type":106,"@version":107,"id":842,"meta":843,"component":844,"responsiveStyles":846},"builder-c4fb5179366243c1b6c32d368675cf47",{"previousId":723},{"name":354,"options":845,"isRSC":118},{"darkMode":41},{"large":847},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":849,"meta":850,"component":851,"responsiveStyles":856},"builder-261af50705fd445d8cca4a6ba20d5391",{"previousId":730},{"name":359,"tag":359,"options":852,"isRSC":118},{"darkMode":6,"maxWidth":363,"maxTextWidth":364,"title":853,"description":854,"reverse":6,"image":855},"\u003Ch2>Stop ClickFix-style attacks before they become a breach\u003C/h2>","\u003Cp>Traditional security tools are blind to malicious copy and paste attacks because the attack exploits a gap between the browser and the endpoint. EDR only sees the payload after it runs, and network tools see only part of the picture.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F98b2f7e08dec4eafaf8e24937605b8cf",{"large":857},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":859,"meta":860,"component":861,"responsiveStyles":866},"builder-7d21b8aab8064c40b1e5dd23c4749309",{"previousId":739},{"name":373,"options":862,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":376,"title":863,"description":864,"reverse":41,"image":865},"\u003Ch2>Discover lures at the source\u003C/h2>","\u003Cp>Push inspects page behavior to identify ClickFix attacks as they happen. By inspecting the page, its structure, and how the user interacts with it, Push can detect and block these in-browser threats in real time. This deep, TTP-based inspection spots the trap even on novel pages that are built to bypass traditional web filters and blocklists.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F665bf47e01544c75bf9ddafd3917927b",{"large":867},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"fontFamily":382,"paddingTop":383,"marginTop":384},{"@type":106,"@version":107,"id":869,"meta":870,"component":871,"responsiveStyles":876},"builder-fb91943adf6149259ed9e1e6566c9afe",{"previousId":749},{"name":373,"options":872,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":389,"title":873,"description":874,"reverse":6,"image":875},"\u003Ch2>Block the malicious action\u003C/h2>","\u003Cp>When Push detects a malicious script, it intercepts the user's action and blocks the code from being copied to the clipboard. The user is protected, the attack is stopped, and no malicious code ever reaches the endpoint. Unlike broad DLP tools, this action is surgical, targeting only malicious behavior without disrupting normal work.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F5ee68f81f1ac416685cbfe91298cf827",{"large":877},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":395},{"@type":106,"@version":107,"layerName":373,"id":879,"meta":880,"component":881,"responsiveStyles":886},"builder-bfac95fada864e5a8259b955b5b5f98b",{"previousId":759},{"name":373,"options":882,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":400,"title":883,"description":884,"reverse":41,"image":885},"\u003Ch2>Accelerate ClickFix investigations\u003C/h2>","\u003Cp>When an attack happens, knowing what the user saw or did is critical. Push provides rich browser session data for rapid investigation and containment. Security teams get detailed telemetry on which users were targeted, what lure they were served, and when the block occurred. This enables defenders to reconstruct what happened and respond quickly, even when other tools miss the activity entirely.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F6cdf2a8aeddc4e9a9023cbf974e40239",{"large":887},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":406},{"@type":106,"@version":107,"id":889,"meta":890,"component":891,"responsiveStyles":893},"builder-136892e831684a6987f87d3be67c33d1",{"previousId":769},{"name":354,"options":892,"isRSC":118},{"darkMode":6},{"large":894},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":896,"component":897,"responsiveStyles":899},"builder-dec26b739f2f42beb5a73cfc6c675b60",{"name":416,"tag":416,"options":898,"isRSC":118},{"sectionHeading":37,"customClass":418},{"large":900},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":902,"@type":106,"tagName":131,"properties":903,"responsiveStyles":904},"builder-pixel-zzjpxxgrc2l",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":905},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":907},{"path":37,"query":908},{},{},1770892881888,1761847585203,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F375467b8bef34ed1a8a1cc5b8b67d75f",[],{"lastPreviewUrl":915,"originalContentId":681,"winningTest":118,"hasLinks":6,"kind":438,"breakpoints":916,"hasAutosaves":6},"https://pushsecurity.com/uc/clickfix-protection?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CeditProjects%2CmodifyMcpServers%2CmodifyWorkflowIntegrations%2CmodifyProjectSettings%2CconnectCodeRepository%2CcreateProjects%2CindexDesignSystems%2CsendPullRequests&builder.user.role.name=Developer&builder.user.role.id=developer&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=ea4f309d2ffe46c5aa97ebf0fda4e2e3&builder.overrides.ea4f309d2ffe46c5aa97ebf0fda4e2e3=ea4f309d2ffe46c5aa97ebf0fda4e2e3&builder.overrides.use-case-page:/uc/clickfix-protection=ea4f309d2ffe46c5aa97ebf0fda4e2e3&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"xsmall":57,"small":39,"medium":40},{"createdDate":918,"id":919,"name":920,"modelId":261,"published":13,"query":921,"data":924,"variations":1029,"lastUpdated":1030,"firstPublished":1031,"testRatio":33,"screenshot":1032,"createdBy":34,"lastUpdatedBy":674,"folders":1033,"meta":1034,"rev":440},1745009743870,"a9d5556e77f84a37b5bd52310a7110c1","Incident response",[922],{"@type":264,"property":265,"operator":266,"value":923},"/uc/incident-response",{"seoDescription":925,"customFonts":926,"title":920,"jsCode":37,"fontAwesomeIcon":931,"seoTitle":932,"tsCode":37,"blocks":933,"url":923,"state":1026},"Investigate and respond faster with unique browser telemetry.",[927],{"kind":273,"subsets":928,"menu":296,"variants":929,"category":295,"family":272,"version":274,"lastModified":275,"files":930},[298,299],[301,302,303,304,305,306,128,307,308,309,310,311,312,313,314,315,316,317],{"100":277,"200":278,"300":279,"500":280,"600":281,"700":282,"800":283,"900":284,"900italic":286,"600italic":294,"200italic":291,"300italic":293,"100italic":288,"700italic":287,"800italic":285,"regular":290,"italic":289,"500italic":292},"faSatelliteDish","Browser based incident response",[934,1021],{"@type":106,"@version":107,"tagName":323,"id":935,"meta":936,"children":937},"builder-653c4aed737b4def88dc4cd2d695660a",{"previousId":696},[938,955,962,969,978,988,998,1008,1015],{"@type":106,"@version":107,"id":939,"meta":940,"component":941,"responsiveStyles":953},"builder-18190bd36518467d9154d27d7e945b9b",{"previousId":700},{"name":327,"options":942,"isRSC":118},{"title":943,"description":944,"points":945,"video":952},"Browser-based incident response","\u003Cp>Push gives you real-time visibility into what actually happened during a breach, right in the browser where the attack played out. From credential theft to session hijacking, Push captures high-fidelity telemetry so you can investigate quickly, contain confidently, and shut it down before it spreads.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>",[946,948,950],{"item":947},"Reconstruct what happened with real browser session context",{"item":949},"Investigate faster with real-world session context",{"item":951},"Trigger response actions automatically through your SIEM or SOAR","https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fd00e39d3b6e346c296261d875cf55652%2Fcompressed?apiKey=f3a1111ff5be48cdbb123cd9f5795a05&token=d00e39d3b6e346c296261d875cf55652&alt=media&optimized=true",{"large":954},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":342},{"@type":106,"@version":107,"id":956,"meta":957,"component":958,"responsiveStyles":960},"builder-8a0a8ea63f5d48dd8a6726f2d49cf0ca",{"previousId":716},{"name":346,"options":959,"isRSC":118},{"AllPartners":41,"backgroundTransparent":6},{"large":961},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":350},{"@type":106,"@version":107,"id":963,"meta":964,"component":965,"responsiveStyles":967},"builder-2df65c3f54334df2b26e7cb744886cdc",{"previousId":723},{"name":354,"options":966,"isRSC":118},{"darkMode":41},{"large":968},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":970,"component":971,"responsiveStyles":976},"builder-2c32c869efc2423ab69ef06b150e9f97",{"name":359,"tag":359,"options":972,"isRSC":118},{"darkMode":6,"maxWidth":363,"maxTextWidth":364,"title":973,"description":974,"image":975,"reverse":6},"\u003Ch2>See attacks unfold, not just their aftermath\u003C/h2>","\u003Cp>Attacks happen in the browser, not in logs. Push captures what traditional tools miss: what users clicked, what loaded, what was entered, and how attackers moved. That gives you real-world evidence, not just assumptions, when every second matters.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F36fc719bd1de4a38b916f4d25c81a26d",{"large":977},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":979,"meta":980,"component":981,"responsiveStyles":986},"builder-370e53c6016e432db01e9193a2ce90f6",{"previousId":739},{"name":373,"options":982,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":376,"title":983,"description":984,"reverse":41,"image":985},"\u003Ch2>Investigate faster with high-fidelity data\u003C/h2>","\u003Cp>Reconstructing an incident shouldn’t feel like guesswork. Push records detailed telemetry from inside the browser: page loads, credential inputs, DOM changes, session activity, user behavior. It’s structured, exportable, and ready to plug into your investigation workflows, so you can move fast without digging through proxy logs or relying on user reports.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fa6adda040e684e67a8d68a55c5ce5f6d",{"large":987},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"fontFamily":382,"paddingTop":384,"marginTop":384},{"@type":106,"@version":107,"id":989,"meta":990,"component":991,"responsiveStyles":996},"builder-a7f3767a8d184bd08fb24520bf210e95",{"previousId":749},{"name":373,"options":992,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":389,"title":993,"description":994,"reverse":6,"image":995},"\u003Ch2>Contain and respond in real time\u003C/h2>","\u003Cp>When something looks off, Push doesn’t just alert you, it gives you options. Guide users with in-browser prompts. Terminate sessions. Trigger SOAR workflows. Enrich SIEM alerts. Push gives you the context and control to stop spread before it starts.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fb3dedeed5aba4847a2c2d22e10d0ec12",{"large":997},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":395},{"@type":106,"@version":107,"layerName":373,"id":999,"meta":1000,"component":1001,"responsiveStyles":1006},"builder-b92036ee0ece4b32acdbdcc7c377366b",{"previousId":759},{"name":373,"options":1002,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":400,"title":1003,"description":1004,"reverse":41,"image":1005},"\u003Ch2>Prevent the next one\u003C/h2>","\u003Cp>Push helps you respond fast, but it also helps you fix what went wrong. It surfaces misconfigurations and risky behaviors that made the attack possible in the first place, then guides users in-browser to remediate. One tool. Full loop. No loose ends.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fc1ecc2d5d3814b62b072fac01827ff96",{"large":1007},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":406},{"@type":106,"@version":107,"id":1009,"meta":1010,"component":1011,"responsiveStyles":1013},"builder-5e8ae39655274de89da32ab573a2525a",{"previousId":769},{"name":354,"options":1012,"isRSC":118},{"darkMode":6},{"large":1014},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":1016,"component":1017,"responsiveStyles":1019},"builder-dfd6850cfb4741d2b8a0c16c2780f00a",{"name":416,"tag":416,"options":1018,"isRSC":118},{"sectionHeading":37,"customClass":418},{"large":1020},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":1022,"@type":106,"tagName":131,"properties":1023,"responsiveStyles":1024},"builder-pixel-z197gdgcmu",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":1025},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":1027},{"path":37,"query":1028},{},{},1770892908052,1745427419274,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fb07017bfd318431690a5bb35bda35b99",[],{"kind":438,"breakpoints":1035,"originalContentId":681,"winningTest":118,"lastPreviewUrl":1036,"hasLinks":6,"hasAutosaves":6},{"xsmall":57,"small":39,"medium":40},"https://pushsecurity.com/uc/incident-response?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CeditProjects%2CmodifyMcpServers%2CmodifyWorkflowIntegrations%2CmodifyProjectSettings%2CconnectCodeRepository%2CcreateProjects%2CindexDesignSystems%2CsendPullRequests&builder.user.role.name=Developer&builder.user.role.id=developer&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=a9d5556e77f84a37b5bd52310a7110c1&builder.overrides.a9d5556e77f84a37b5bd52310a7110c1=a9d5556e77f84a37b5bd52310a7110c1&builder.overrides.use-case-page:/uc/incident-response=a9d5556e77f84a37b5bd52310a7110c1&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"createdDate":1038,"id":1039,"name":1040,"modelId":261,"published":13,"query":1041,"data":1044,"variations":1149,"lastUpdated":1150,"firstPublished":1151,"testRatio":33,"screenshot":1152,"createdBy":34,"lastUpdatedBy":674,"folders":1153,"meta":1154,"rev":440},1746122471259,"5f118e24433d46ceb79f5099987156d7","Shadow SaaS",[1042],{"@type":264,"property":265,"operator":266,"value":1043},"/uc/shadow-saas",{"seoTitle":1045,"seoDescription":1046,"customFonts":1047,"fontAwesomeIcon":1052,"title":1053,"jsCode":37,"tsCode":37,"blocks":1054,"url":1043,"state":1146},"Find and secure shadow SaaS","See and control shadow SaaS in the browser.",[1048],{"kind":273,"variants":1049,"files":1050,"family":272,"version":274,"subsets":1051,"lastModified":275,"category":295,"menu":296},[301,302,303,304,305,306,128,307,308,309,310,311,312,313,314,315,316,317],{"100":277,"200":278,"300":279,"500":280,"600":281,"700":282,"800":283,"900":284,"300italic":293,"500italic":292,"regular":290,"900italic":286,"italic":289,"100italic":288,"200italic":291,"600italic":294,"700italic":287,"800italic":285},[298,299],"faShieldCheck","Secure shadow SaaS",[1055,1141],{"@type":106,"@version":107,"tagName":323,"id":1056,"meta":1057,"children":1058},"builder-04da805c4cd34652a2db452fcda52e1d",{"previousId":935},[1059,1075,1082,1089,1098,1108,1118,1128,1135],{"@type":106,"@version":107,"id":1060,"meta":1061,"component":1062,"responsiveStyles":1073},"builder-830d414faeaf41439142f9157e8288c8",{"previousId":939},{"name":327,"options":1063,"isRSC":118},{"title":1045,"description":1064,"points":1065,"video":1072},"\u003Cp>SaaS sprawl is one of today’s fastest-growing security blind spots because most tools monitor around the edges. Push sees it at the source, in the browser, revealing every app users access, flagging risky tools, and helping you shut down exposure before it leads to a breach. No guesswork. No nasty surprises. Just real-time visibility and control.\u003C/p>",[1066,1068,1070],{"item":1067},"Discover every SaaS app users access, managed or not",{"item":1069},"Spot accounts with weak security postures like missing MFA, unmanaged access, and no SSO",{"item":1071},"Control usage with in-browser prompts, blocks, and security guardrails","https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F3e4eece318d04d6586e691d59d0741cf%2Fcompressed?apiKey=f3a1111ff5be48cdbb123cd9f5795a05&token=3e4eece318d04d6586e691d59d0741cf&alt=media&optimized=true",{"large":1074},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":342},{"@type":106,"@version":107,"id":1076,"meta":1077,"component":1078,"responsiveStyles":1080},"builder-cd7833f966cb4c7e8adf0d6c979414a6",{"previousId":956},{"name":346,"options":1079,"isRSC":118},{"AllPartners":41,"backgroundTransparent":6},{"large":1081},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":350},{"@type":106,"@version":107,"id":1083,"meta":1084,"component":1085,"responsiveStyles":1087},"builder-49d720b45430454e8b08c526f267c19f",{"previousId":963},{"name":354,"options":1086,"isRSC":118},{"darkMode":41},{"large":1088},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":1090,"component":1091,"responsiveStyles":1096},"builder-3dde0bf6c8544e5e9ab41b18a9d68034",{"name":359,"tag":359,"options":1092,"isRSC":118},{"darkMode":6,"maxWidth":363,"maxTextWidth":364,"title":1093,"description":1094,"image":1095,"reverse":6},"\u003Ch2>Use your browser to curb Saas Sprawl\u003C/h2>","\u003Cp>Shadow SaaS isn’t hiding in your network, it’s in your browser. From AI tools to unsanctioned file-sharing sites, security risks live in the apps your users sign into every day. Push maps your organization's true SaaS footprint in real time, exposing apps and accounts with unmanaged access, poor authentication, or no security oversight.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fb6811a214c7949b6bbe0b9a3bca62efd",{"large":1097},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":1099,"meta":1100,"component":1101,"responsiveStyles":1106},"builder-e2420451ccdc4f088d0a4904cff45935",{"previousId":979},{"name":373,"options":1102,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":376,"title":1103,"description":1104,"reverse":41,"image":1105},"\u003Ch2>Discover hidden SaaS usage\u003C/h2>","\u003Cp>Push captures live browser telemetry across every tab and session. Whether a user signs into a sanctioned app with a personal account or tries a new AI plugin, you’ll see it in real time, with no integrations or manual tagging.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fe16e301f9af94665b95d98232a863d8a",{"large":1107},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"fontFamily":382,"paddingTop":384,"marginTop":384},{"@type":106,"@version":107,"id":1109,"meta":1110,"component":1111,"responsiveStyles":1116},"builder-b36de7fce7994beea9e58d94662e7166",{"previousId":989},{"name":373,"options":1112,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":389,"title":1113,"description":1114,"reverse":6,"image":1115},"\u003Ch2>Spot risky access and unsafe usage\u003C/h2>","\u003Cp>Discovery is just the beginning. Push flags apps with risky traits, no MFA, no SSO, known vulnerabilities, or broad access scopes. You’ll know which tools introduce real risk, and which users are exposed so you can act with precision.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F6585f3c242da4d70ae3cb7d02f481bef",{"large":1117},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":395},{"@type":106,"@version":107,"layerName":373,"id":1119,"meta":1120,"component":1121,"responsiveStyles":1126},"builder-dc366b5134684fe7a508edf8913103ea",{"previousId":999},{"name":373,"options":1122,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":400,"title":1123,"description":1124,"reverse":41,"image":1125},"\u003Ch2>Close gaps before they grow\u003C/h2>","\u003Cp>Push turns insight into action. When risky SaaS use is detected, guide users to enable MFA, block high-risk apps, or apply in-browser guardrails automatically. All without deploying new infrastructure or managing dozens of integrations.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fe6d60b6d91414819bc6258a318f00557",{"large":1127},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":406},{"@type":106,"@version":107,"id":1129,"meta":1130,"component":1131,"responsiveStyles":1133},"builder-8708f6f0d8da4b3f9e17bf16cda70219",{"previousId":1009},{"name":354,"options":1132,"isRSC":118},{"darkMode":6},{"large":1134},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":1136,"component":1137,"responsiveStyles":1139},"builder-8ff4b38d60534cf28cb523ab0f754875",{"name":416,"tag":416,"options":1138,"isRSC":118},{"sectionHeading":37,"customClass":418},{"large":1140},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":1142,"@type":106,"tagName":131,"properties":1143,"responsiveStyles":1144},"builder-pixel-d1ul2kmxbed",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":1145},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":1147},{"path":37,"query":1148},{},{},1770892936802,1746714967208,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F01bfb2304521412fbd2e1a1180904d40",[],{"originalContentId":919,"winningTest":118,"lastPreviewUrl":1155,"breakpoints":1156,"kind":438,"hasLinks":6,"hasAutosaves":6},"https://pushsecurity.com/uc/shadow-saas?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CeditProjects%2CmodifyMcpServers%2CmodifyWorkflowIntegrations%2CmodifyProjectSettings%2CconnectCodeRepository%2CcreateProjects%2CindexDesignSystems%2CsendPullRequests&builder.user.role.name=Developer&builder.user.role.id=developer&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=5f118e24433d46ceb79f5099987156d7&builder.overrides.5f118e24433d46ceb79f5099987156d7=5f118e24433d46ceb79f5099987156d7&builder.overrides.use-case-page:/uc/shadow-saas=5f118e24433d46ceb79f5099987156d7&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"xsmall":57,"small":39,"medium":40},{"createdDate":1158,"id":1159,"name":1160,"modelId":261,"published":13,"query":1161,"data":1164,"variations":1268,"lastUpdated":1269,"firstPublished":1270,"testRatio":33,"screenshot":1271,"createdBy":34,"lastUpdatedBy":674,"folders":1272,"meta":1273,"rev":440},1764707470172,"b62629ce2f3741158d961cd10fe74b31","Shadow AI",[1162],{"@type":264,"property":265,"operator":266,"value":1163},"/uc/shadow-ai",{"fontAwesomeIcon":1165,"seoTitle":1166,"jsCode":37,"customFonts":1167,"title":1172,"tsCode":37,"seoDescription":1173,"blocks":1174,"url":1163,"state":1265},"faBrainCircuit","Secure AI native and AI enhanced apps. ",[1168],{"variants":1169,"category":295,"files":1170,"subsets":1171,"family":272,"kind":273,"menu":296,"lastModified":275,"version":274},[301,302,303,304,305,306,128,307,308,309,310,311,312,313,314,315,316,317],{"100":277,"200":278,"300":279,"500":280,"600":281,"700":282,"800":283,"900":284,"800italic":285,"regular":290,"700italic":287,"200italic":291,"italic":289,"500italic":292,"600italic":294,"300italic":293,"100italic":288,"900italic":286},[298,299],"Secure shadow AI","See and control shadow AI apps in the browser.",[1175,1260],{"@type":106,"@version":107,"tagName":323,"id":1176,"meta":1177,"children":1178},"builder-a6e5717a2c914d5695058e4ee201a05d",{"previousId":1056},[1179,1195,1202,1209,1219,1228,1237,1247,1254],{"@type":106,"@version":107,"id":1180,"meta":1181,"component":1182,"responsiveStyles":1193},"builder-3e0ed678683f4a0eb7aa00253cf263b2",{"previousId":1060},{"name":327,"options":1183,"isRSC":118},{"title":1172,"description":1184,"points":1185,"image":1192},"\u003Cp>Your employees are adopting AI faster than you can track it. From native features in corporate apps to unapproved shadow tools, it’s all happening in the browser. Push detects every AI interaction in real time, letting you categorize apps and enforce acceptable use policies in the browser.\u003C/p>",[1186,1188,1190],{"item":1187},"Map every AI tool used across your workforce",{"item":1189},"Review and classify apps by sensitivity, purpose, and policy status",{"item":1191},"Enforce AI usage rules directly in the browser","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F33cf153d920f4e389f3650253577cff7",{"large":1194},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":342},{"@type":106,"@version":107,"id":1196,"meta":1197,"component":1198,"responsiveStyles":1200},"builder-76968f8471d14893b8189d75b08fb426",{"previousId":1076},{"name":346,"options":1199,"isRSC":118},{"AllPartners":41,"backgroundTransparent":6},{"large":1201},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"backgroundColor":350},{"@type":106,"@version":107,"id":1203,"meta":1204,"component":1205,"responsiveStyles":1207},"builder-b55b9d4bc5a649d8839ce7f6c2043d95",{"previousId":1083},{"name":354,"options":1206,"isRSC":118},{"darkMode":41},{"large":1208},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":1210,"meta":1211,"component":1212,"responsiveStyles":1217},"builder-c3f38ef4d75d4989a29b5903175ed8a1",{"previousId":1090},{"name":359,"tag":359,"options":1213,"isRSC":118},{"darkMode":6,"maxWidth":363,"maxTextWidth":364,"title":1214,"description":1215,"image":1216,"reverse":6},"\u003Ch2>Use your browser to govern AI \u003C/h2>","\u003Cp>The AI footprint inside your company is bigger than you think. From text generators to meeting assistants and design copilots, employees test, adopt, and connect new tools constantly. Push shows you those tools and which users are accessing them, without relying on network scans or API integrations.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F30b43bda6f1644c19478fb1efa20050c",{"large":1218},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":1220,"meta":1221,"component":1222,"responsiveStyles":1226},"builder-90ee9cb9afc44e7f885523715bf51a53",{"previousId":1099},{"name":373,"options":1223,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":376,"title":1224,"description":1225,"reverse":41,"image":1115},"\u003Ch2>Discover every AI tool users touch\u003C/h2>","\u003Cp>Push captures live telemetry from the browser, identifying every AI-native and AI-enhanced application users access. You’ll know which corporate identities are connected, how data flows, and what new AI apps appear across your environment. \u003C/p>",{"large":1227},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"fontFamily":382,"paddingTop":384,"marginTop":384},{"@type":106,"@version":107,"id":1229,"meta":1230,"component":1231,"responsiveStyles":1235},"builder-9e44539fa53c4d8e87406036c921fc46",{"previousId":1109},{"name":373,"options":1232,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":389,"title":1233,"description":1234,"reverse":6,"image":1125},"\u003Ch2>Classify and manage AI risk\u003C/h2>","\u003Cp>For apps you choose to allow, Push lets you apply custom in-browser banners. You can bulk-select categories of AI tools and require users to read and acknowledge your acceptable use policy before they proceed. This creates an auditable trail and moves policy from an easy to forget document to an active, in-workflow control.\u003C/p>",{"large":1236},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":395},{"@type":106,"@version":107,"layerName":373,"id":1238,"meta":1239,"component":1240,"responsiveStyles":1245},"builder-44c1a891926f4bdeaaa37e90721fe6ac",{"previousId":1119},{"name":373,"options":1241,"isRSC":118},{"darkMode":6,"maxWidth":363,"imageMaxWidth":375,"textPaddingTop":400,"title":1242,"description":1243,"reverse":41,"image":1244},"\u003Ch2>Enforce your AI policy in the browser\u003C/h2>","\u003Cp>When an AI tool is deemed non-compliant or too risky, Push blocks it at the source. The block happens directly in the browser, preventing the user from accessing the site or submitting data. This gives you an immediate, powerful lever to stop data exfiltration and enforce a hard line on unacceptable risk.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fa359ac1805af4e15a8a7f84632b9bb55",{"large":1246},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125,"paddingTop":406},{"@type":106,"@version":107,"id":1248,"meta":1249,"component":1250,"responsiveStyles":1252},"builder-dcc906f9cbe54dc68b3c672668e7a38f",{"previousId":1129},{"name":354,"options":1251,"isRSC":118},{"darkMode":6},{"large":1253},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"@type":106,"@version":107,"id":1255,"component":1256,"responsiveStyles":1258},"builder-d2d64780c31b4349bc75805b23a07e38",{"name":416,"tag":416,"options":1257,"isRSC":118},{"sectionHeading":37,"customClass":418},{"large":1259},{"display":121,"flexDirection":122,"position":123,"flexShrink":124,"boxSizing":125},{"id":1261,"@type":106,"tagName":131,"properties":1262,"responsiveStyles":1263},"builder-pixel-wxx9tk70r9p",{"src":133,"aria-hidden":134,"alt":37,"role":135,"width":124,"height":124},{"large":1264},{"height":124,"width":124,"display":138,"opacity":124,"overflow":139,"pointerEvents":140},{"deviceSize":142,"location":1266},{"path":37,"query":1267},{},{},1770892957225,1764950077593,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fe558b8b069884037a8e6904f7ecc029c",[],{"winningTest":118,"breakpoints":1274,"originalContentId":1039,"kind":438,"lastPreviewUrl":1275,"hasLinks":6,"hasAutosaves":41},{"xsmall":57,"small":39,"medium":40},"https://pushsecurity.com/uc/shadow-ai?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CeditProjects%2CmodifyMcpServers%2CmodifyWorkflowIntegrations%2CmodifyProjectSettings%2CconnectCodeRepository%2CcreateProjects%2CindexDesignSystems%2CsendPullRequests&builder.user.role.name=Developer&builder.user.role.id=developer&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=b62629ce2f3741158d961cd10fe74b31&builder.overrides.b62629ce2f3741158d961cd10fe74b31=b62629ce2f3741158d961cd10fe74b31&builder.overrides.use-case-page:/uc/shadow-ai=b62629ce2f3741158d961cd10fe74b31&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"_path":1277,"_dir":1278,"_draft":6,"_partial":6,"_locale":37,"sys":1279,"ogImage":118,"summary":1282,"title":1296,"subtitle":118,"metaTitle":1297,"synopsis":1298,"hashTags":118,"publishedDate":1299,"slug":1300,"tagsCollection":1301,"content":1311,"relatedBlogPostsCollection":2418,"authorsCollection":5155,"_id":5159,"_type":5160,"_source":5161,"_file":5162,"_stem":5163,"_extension":5160},"/blog/the-saas-attack-matrix-one-year-on","blog",{"id":1280,"publishedAt":1281},"1LxqUNZpD2VynzSqbv719Z","2024-08-28T14:24:56.222Z",{"json":1283},{"data":1284,"content":1285,"nodeType":1295},{},[1286],{"data":1287,"content":1288,"nodeType":1294},{},[1289],{"data":1290,"marks":1291,"value":1292,"nodeType":1293},{},[],"It’s been almost exactly a year since we released the SaaS attack matrix – our open source repository of SaaS-native attack techniques. So, it’s a good time to look at what’s changed, and which techniques we’ve seen rise to prominence in the wild.","text","paragraph","document","The SaaS attack matrix: A year in review","Reflecting on a year of SaaS identity attacks","It’s been almost exactly a year since we released our open source repository of SaaS-native attack techniques. Let's reflect on what’s changed. ","2024-08-27T00:00:00.000Z","the-saas-attack-matrix-one-year-on",{"items":1302},[1303,1307],{"sys":1304,"name":1306},{"id":1305},"6A5RXS31ZQx3PwryGb1IMy","Browser-based attacks",{"sys":1308,"name":1310},{"id":1309},"4ksQNCFeBf8H4QIORqpRLw","Detection & response",{"json":1312,"links":2406},{"data":1313,"content":1314,"nodeType":1295},{},[1315,1337,1344,1351,1358,1365,1369,1377,1472,1479,1487,1494,1511,1531,1538,1541,1548,1555,1562,1579,1603,1610,1617,1650,1683,1690,1708,1715,1722,1729,1737,1744,1777,1784,1801,1834,1841,1860,1867,1874,1892,1899,1906,1909,1916,1923,1930,1933,1940,1947,1954,1973,2110,2117,2120,2127,2134,2238,2245,2252,2255,2262,2269,2322,2329,2336,2339,2346,2353,2372,2391,2400],{"data":1316,"content":1317,"nodeType":1294},{},[1318,1322,1333],{"data":1319,"marks":1320,"value":1321,"nodeType":1293},{},[],"When we created the ",{"data":1323,"content":1325,"nodeType":1332},{"uri":1324},"https://github.com/pushsecurity/saas-attacks",[1326],{"data":1327,"marks":1328,"value":1331,"nodeType":1293},{},[1329],{"type":1330},"underline","SaaS attack matrix","hyperlink",{"data":1334,"marks":1335,"value":1336,"nodeType":1293},{},[],", we made a conscious break away from the endpoint-focused techniques captured in industry resources like the MITRE ATT&CK Framework. ",{"data":1338,"content":1339,"nodeType":1294},{},[1340],{"data":1341,"marks":1342,"value":1343,"nodeType":1293},{},[],"At the time, we were anticipating a shift that was yet to fully materialize. But, a lot can change (and has changed) in the space of a year. We’ve seen the impact of SaaS account takeover attacks laid bare. Snowflake, billed one of the biggest breaches in history, is a telling example that we’ll no doubt look back on as a watershed moment. ",{"data":1345,"content":1346,"nodeType":1294},{},[1347],{"data":1348,"marks":1349,"value":1350,"nodeType":1293},{},[],"It isn’t an exaggeration or marketing fluff to say that identity attacks are the #1 threat facing organizations today. SaaS apps, and the identities that are used to access them, are clearly the weakest link – and therefore the lowest-hanging fruit for attackers to reach for. ",{"data":1352,"content":1353,"nodeType":1294},{},[1354],{"data":1355,"marks":1356,"value":1357,"nodeType":1293},{},[],"This makes resources like the SaaS attack matrix more relevant than ever – both for red teams seeking to emulate the latest offensive techniques, and blue teams trying to defend against them. Understanding these techniques is essential for building effective defenses, and identifying where new platforms and controls are required to do so. ",{"data":1359,"content":1360,"nodeType":1294},{},[1361],{"data":1362,"marks":1363,"value":1364,"nodeType":1293},{},[],"Let’s take a look at what we’ve learned so far.",{"data":1366,"content":1367,"nodeType":1368},{},[],"hr",{"data":1370,"content":1371,"nodeType":1376},{},[1372],{"data":1373,"marks":1374,"value":1375,"nodeType":1293},{},[],"Hot right now: Initial access techniques","heading-1",{"data":1378,"content":1379,"nodeType":1294},{},[1380,1384,1393,1397,1406,1409,1418,1421,1430,1434,1443,1447,1456,1460,1468],{"data":1381,"marks":1382,"value":1383,"nodeType":1293},{},[],"The majority of techniques we've seen rise to prominence in 2023/4 sit predominantly in the initial access phase. Since the matrix first launched, we’ve added more techniques to initial access than any other category, including ",{"data":1385,"content":1387,"nodeType":1332},{"uri":1386},"https://github.com/pushsecurity/saas-attacks/blob/main/techniques/ghost_logins/description.md",[1388],{"data":1389,"marks":1390,"value":1392,"nodeType":1293},{},[1391],{"type":1330},"ghost logins",{"data":1394,"marks":1395,"value":1396,"nodeType":1293},{},[],", ",{"data":1398,"content":1400,"nodeType":1332},{"uri":1399},"https://github.com/pushsecurity/saas-attacks/blob/main/techniques/aitm_phishing/description.md",[1401],{"data":1402,"marks":1403,"value":1405,"nodeType":1293},{},[1404],{"type":1330},"AitM phishing",{"data":1407,"marks":1408,"value":1396,"nodeType":1293},{},[],{"data":1410,"content":1412,"nodeType":1332},{"uri":1411},"https://github.com/pushsecurity/saas-attacks/blob/main/techniques/session_cookie_theft/description.md",[1413],{"data":1414,"marks":1415,"value":1417,"nodeType":1293},{},[1416],{"type":1330},"session cookie theft",{"data":1419,"marks":1420,"value":1396,"nodeType":1293},{},[],{"data":1422,"content":1424,"nodeType":1332},{"uri":1423},"https://github.com/pushsecurity/saas-attacks/blob/main/techniques/mfa_downgrade/description.md",[1425],{"data":1426,"marks":1427,"value":1429,"nodeType":1293},{},[1428],{"type":1330},"MFA downgrade attacks",{"data":1431,"marks":1432,"value":1433,"nodeType":1293},{},[],", and ",{"data":1435,"content":1437,"nodeType":1332},{"uri":1436},"https://github.com/pushsecurity/saas-attacks/blob/main/techniques/guest_access_abuse/description.md",[1438],{"data":1439,"marks":1440,"value":1442,"nodeType":1293},{},[1441],{"type":1330},"guest access abuse,",{"data":1444,"marks":1445,"value":1446,"nodeType":1293},{},[]," all of which are methods of account takeover – complementing the classics like ",{"data":1448,"content":1450,"nodeType":1332},{"uri":1449},"https://github.com/pushsecurity/saas-attacks/blob/main/techniques/credential_stuffing/description.md",[1451],{"data":1452,"marks":1453,"value":1455,"nodeType":1293},{},[1454],{"type":1330},"credential stuffing",{"data":1457,"marks":1458,"value":1459,"nodeType":1293},{},[]," and ",{"data":1461,"content":1463,"nodeType":1332},{"uri":1462},"https://github.com/pushsecurity/saas-attacks/blob/main/techniques/email_phishing/description.md",[1464],{"data":1465,"marks":1466,"value":1467,"nodeType":1293},{},[],"email phishing",{"data":1469,"marks":1470,"value":1471,"nodeType":1293},{},[],".",{"data":1473,"content":1474,"nodeType":1294},{},[1475],{"data":1476,"marks":1477,"value":1478,"nodeType":1293},{},[],"We’ll spend a bit of time delving into these techniques in the next section, but let’s first consider what this tells us about SaaS attacks. ",{"data":1480,"content":1481,"nodeType":1486},{},[1482],{"data":1483,"marks":1484,"value":1485,"nodeType":1293},{},[],"Identity attacks are the leading cause of SaaS breaches","heading-2",{"data":1488,"content":1489,"nodeType":1294},{},[1490],{"data":1491,"marks":1492,"value":1493,"nodeType":1293},{},[],"The initial identity attack designed to achieve account takeover is the most important part of the SaaS attack chain. The fact that attackers are focused on finding new ways of compromising identities illustrates the value, but also the fragility of the identity controls that most organizations are relying on (which may also be one of the reasons attackers are fixated on it). Whether we’re talking about anti-phishing protections, conditional access policies, or MFA – attackers are continually finding new ways of getting around them.",{"data":1495,"content":1496,"nodeType":1294},{},[1497,1501,1507],{"data":1498,"marks":1499,"value":1500,"nodeType":1293},{},[],"And, if all an attacker really needs to do to cause harm is log into an app and abuse its legitimate features and functions, there really is no margin for error – you need to successfully stop the initial identity attack ",{"data":1502,"marks":1503,"value":1506,"nodeType":1293},{},[1504],{"type":1505},"bold","every time",{"data":1508,"marks":1509,"value":1510,"nodeType":1293},{},[],". ",{"data":1512,"content":1513,"nodeType":1294},{},[1514,1518,1527],{"data":1515,"marks":1516,"value":1517,"nodeType":1293},{},[],"You can’t rely on your endpoint and network controls to catch them later like you used to. Equally, it’s unlikely that your CASB or DLP solution can stop a legitimate app using legitimate features like ",{"data":1519,"content":1521,"nodeType":1332},{"uri":1520},"https://github.com/pushsecurity/saas-attacks/blob/main/techniques/shadow_workflows/description.md",[1522],{"data":1523,"marks":1524,"value":1526,"nodeType":1293},{},[1525],{"type":1330},"API-based workflows",{"data":1528,"marks":1529,"value":1530,"nodeType":1293},{},[]," from sending data to attacker-controlled infrastructure. ",{"data":1532,"content":1533,"nodeType":1294},{},[1534],{"data":1535,"marks":1536,"value":1537,"nodeType":1293},{},[],"It’s a classic case of attackers only needing to win once. And right now, it’s a numbers game that they’re winning enough to keep them coming back for more. ",{"data":1539,"content":1540,"nodeType":1368},{},[],{"data":1542,"content":1543,"nodeType":1376},{},[1544],{"data":1545,"marks":1546,"value":1547,"nodeType":1293},{},[],"Most wanted: Techniques gaining notoriety in the wild",{"data":1549,"content":1550,"nodeType":1294},{},[1551],{"data":1552,"marks":1553,"value":1554,"nodeType":1293},{},[],"Let’s take a closer look at some of the techniques we’ve seen rise to prominence in 2023/4. ",{"data":1556,"content":1557,"nodeType":1486},{},[1558],{"data":1559,"marks":1560,"value":1561,"nodeType":1293},{},[],"Ghost logins",{"data":1563,"content":1564,"nodeType":1294},{},[1565,1568,1575],{"data":1566,"marks":1567,"value":37,"nodeType":1293},{},[],{"data":1569,"content":1570,"nodeType":1332},{"uri":1386},[1571],{"data":1572,"marks":1573,"value":1561,"nodeType":1293},{},[1574],{"type":1330},{"data":1576,"marks":1577,"value":1578,"nodeType":1293},{},[]," is a technique that exploits the fact that SaaS user accounts often enable multiple simultaneous logins using different sign-in methods. ",{"data":1580,"content":1581,"nodeType":1294},{},[1582,1586,1591,1594,1599],{"data":1583,"marks":1584,"value":1585,"nodeType":1293},{},[],"Ghost logins can be used for both the ",{"data":1587,"marks":1588,"value":1590,"nodeType":1293},{},[1589],{"type":1505},"initial access",{"data":1592,"marks":1593,"value":1459,"nodeType":1293},{},[],{"data":1595,"marks":1596,"value":1598,"nodeType":1293},{},[1597],{"type":1505},"persistence",{"data":1600,"marks":1601,"value":1602,"nodeType":1293},{},[]," stages of a cyber attack, doubling up as a defense evasion technique because of low login method visibility.",{"data":1604,"content":1605,"nodeType":1294},{},[1606],{"data":1607,"marks":1608,"value":1609,"nodeType":1293},{},[],"For initial access, the technique exploits the fact that local and SSO logins can exist simultaneously. Given that many apps are self-adopted by users, it’s likely that many users will default to a local username and password login at this stage. If the app is later adopted companywide and brought into SSO, the original local login will continue to exist unless explicitly disabled or deleted. ",{"data":1611,"content":1612,"nodeType":1294},{},[1613],{"data":1614,"marks":1615,"value":1616,"nodeType":1293},{},[],"Because MFA is applied at the app and IdP level independently, it is possible to end up with an SSO login that requires MFA (via the IdP login), but a local login that does not. This creates an easy target identity for attackers to look for. When combined with other identity vulnerabilities such as weak, breached, and/or reused passwords, attackers can easily automate ghost login discovery and exploitation at scale.  ",{"data":1618,"content":1619,"nodeType":1294},{},[1620,1624,1633,1637,1646],{"data":1621,"marks":1622,"value":1623,"nodeType":1293},{},[],"We saw the impact of ghost logins for initial access with ",{"data":1625,"content":1627,"nodeType":1332},{"uri":1626},"https://pushsecurity.com/blog/identity-attacks-in-the-wild/#id-snowflake-june-2024",[1628],{"data":1629,"marks":1630,"value":1632,"nodeType":1293},{},[1631],{"type":1330},"the recent ShinyHunters campaign against Snowflake customers",{"data":1634,"marks":1635,"value":1636,"nodeType":1293},{},[],". Because Snowflake accounts did not require mandatory MFA for accounts, or give admins the ability to enforce MFA by default, attackers were able to find and exploit a large number of Snowflake accounts using breached credentials from historical data breach dumps. Much of the industry response focused on ensuring SSO and MFA were deployed, but ",{"data":1638,"content":1640,"nodeType":1332},{"uri":1639},"https://pushsecurity.com/resources/video/demonstrating-ghost-logins-in-snowflake-and-how-to-remediate-them/",[1641],{"data":1642,"marks":1643,"value":1645,"nodeType":1293},{},[1644],{"type":1330},"the practicalities of gathering data and manually unsetting local passwords in Snowflake",{"data":1647,"marks":1648,"value":1649,"nodeType":1293},{},[]," meant that ghost logins were easy to overlook by organizations responding to the attacks.   ",{"data":1651,"content":1652,"nodeType":1294},{},[1653,1657,1666,1670,1679],{"data":1654,"marks":1655,"value":1656,"nodeType":1293},{},[],"Ghost logins can also be created after an attacker has established access to an app. For example, if a social login is used to access an account, an adversary may be able to configure a separate username/password login, or even (though much less commonly) connect a second social account that the adversary controls. If the account has sufficient privileges, it may also be possible to ",{"data":1658,"content":1660,"nodeType":1332},{"uri":1659},"https://pushsecurity.com/blog/samljacking-a-poisoned-tenant/",[1661],{"data":1662,"marks":1663,"value":1665,"nodeType":1293},{},[1664],{"type":1330},"set up or change the SAML login settings to inject a malicious URL",{"data":1667,"marks":1668,"value":1669,"nodeType":1293},{},[]," (for example to an attacker controlled tenant) or simply ",{"data":1671,"content":1673,"nodeType":1332},{"uri":1672},"https://github.com/pushsecurity/saas-attacks/blob/main/techniques/api_keys/description.md",[1674],{"data":1675,"marks":1676,"value":1678,"nodeType":1293},{},[1677],{"type":1330},"configure API access",{"data":1680,"marks":1681,"value":1682,"nodeType":1293},{},[]," to forgo the need to log in entirely. ",{"data":1684,"content":1685,"nodeType":1486},{},[1686],{"data":1687,"marks":1688,"value":1689,"nodeType":1293},{},[],"AitM phishing ",{"data":1691,"content":1692,"nodeType":1294},{},[1693,1696,1704],{"data":1694,"marks":1695,"value":37,"nodeType":1293},{},[],{"data":1697,"content":1698,"nodeType":1332},{"uri":1399},[1699],{"data":1700,"marks":1701,"value":1703,"nodeType":1293},{},[1702],{"type":1330},"Adversary-in-the-Middle (AitM) phishing",{"data":1705,"marks":1706,"value":1707,"nodeType":1293},{},[]," is a newer variant of phishing that uses dedicated tooling to act as a web proxy between the victim and a legitimate login portal for an application the victim has access to, principally to make it easier to defeat MFA protection (with the victim responding to the MFA request as part of the attack).",{"data":1709,"content":1710,"nodeType":1294},{},[1711],{"data":1712,"marks":1713,"value":1714,"nodeType":1293},{},[],"As it’s a proxy to the real application, the page will appear exactly as the user expects, because they are logging into the legitimate site – just taking a detour via the attacker’s device. For example, if accessing their webmail, the user will see all their real emails; if accessing their cloud file store then all their real files will be present, etc. ",{"data":1716,"content":1717,"nodeType":1294},{},[1718],{"data":1719,"marks":1720,"value":1721,"nodeType":1293},{},[],"This gives AitM an increased sense of authenticity and makes the compromise less obvious to the user. Because the attacker is sitting in the middle of this connection, they are able to observe all interactions and take control of the authenticated session. ",{"data":1723,"content":1724,"nodeType":1294},{},[1725],{"data":1726,"marks":1727,"value":1728,"nodeType":1293},{},[],"Alongside AitM phishing is Browser-in-the-Middle (BitM), really a form of sub-technique. Rather than act as a reverse web proxy, this technique tricks a target into directly controlling the attacker’s own browser remotely using desktop screen sharing and control approaches (such as VNC and RDP). ",{"data":1730,"content":1731,"nodeType":1294},{},[1732],{"data":1733,"marks":1734,"value":1736,"nodeType":1293},{},[1735],{"type":1505},"This is the virtual equivalent of an attacker handing their laptop to their victim, asking them to login to Okta for them, and then taking their laptop back afterwards.",{"data":1738,"content":1739,"nodeType":1294},{},[1740],{"data":1741,"marks":1742,"value":1743,"nodeType":1293},{},[],"A growing majority of modern phishing attacks typically leverage AitM or BitM tooling – they are now the standard choice for threat actors, offering the ability to bypass MFA without any real tradeoff. ",{"data":1745,"content":1746,"nodeType":1294},{},[1747,1751,1760,1764,1773],{"data":1748,"marks":1749,"value":1750,"nodeType":1293},{},[],"For more information you can ",{"data":1752,"content":1754,"nodeType":1332},{"uri":1753},"https://pushsecurity.com/blog/phishing-2-0-how-phishing-toolkits-are-evolving-with-aitm/",[1755],{"data":1756,"marks":1757,"value":1759,"nodeType":1293},{},[1758],{"type":1330},"read our recent blog post",{"data":1761,"marks":1762,"value":1763,"nodeType":1293},{},[]," or ",{"data":1765,"content":1767,"nodeType":1332},{"uri":1766},"https://pushsecurity.com/resources/video/phishing-detecting-evilginx-evilnovnc-muraena-and-modlishka/",[1768],{"data":1769,"marks":1770,"value":1772,"nodeType":1293},{},[1771],{"type":1330},"watch our on-demand webinar on Phishing 2.0 to see AitM and BitM tools like Evilginx and EvilnoVNC in action",{"data":1774,"marks":1775,"value":1776,"nodeType":1293},{},[],". ",{"data":1778,"content":1779,"nodeType":1486},{},[1780],{"data":1781,"marks":1782,"value":1783,"nodeType":1293},{},[],"Credential stuffing",{"data":1785,"content":1786,"nodeType":1294},{},[1787,1790,1797],{"data":1788,"marks":1789,"value":37,"nodeType":1293},{},[],{"data":1791,"content":1792,"nodeType":1332},{"uri":1449},[1793],{"data":1794,"marks":1795,"value":1783,"nodeType":1293},{},[1796],{"type":1330},{"data":1798,"marks":1799,"value":1800,"nodeType":1293},{},[]," attacks continue to pose a risk to organizations. Despite the fact that MFA has now become an expected control, accounts without MFA continue to be hacked as a result of using weak, reused, and/or previously breached credentials. ",{"data":1802,"content":1803,"nodeType":1294},{},[1804,1808,1817,1821,1830],{"data":1805,"marks":1806,"value":1807,"nodeType":1293},{},[],"Credential stuffing is being fed by an increase in the number of ",{"data":1809,"content":1811,"nodeType":1332},{"uri":1810},"https://pushsecurity.com/blog/what-the-rise-of-infostealers-says-about-identity-attacks/?utm_source=ebook&utm_medium=organic",[1812],{"data":1813,"marks":1814,"value":1816,"nodeType":1293},{},[1815],{"type":1330},"infostealer",{"data":1818,"marks":1819,"value":1820,"nodeType":1293},{},[]," attacks designed to harvest credentials to be sold on criminal marketplaces. Infostealers have been boosted by the success of the Snowflake attacks (",{"data":1822,"content":1824,"nodeType":1332},{"uri":1823},"https://pushsecurity.com/blog/identity-attacks-in-the-wild/#id-snowflake-june-2024?utm_source=ebook&utm_medium=organic",[1825],{"data":1826,"marks":1827,"value":1829,"nodeType":1293},{},[1828],{"type":1330},"where 80% of the credentials used to access accounts could be traced back to infostealer infections dating back to 2020",{"data":1831,"marks":1832,"value":1833,"nodeType":1293},{},[],"). ",{"data":1835,"content":1836,"nodeType":1486},{},[1837],{"data":1838,"marks":1839,"value":1840,"nodeType":1293},{},[],"Session cookie theft",{"data":1842,"content":1843,"nodeType":1294},{},[1844,1848,1856],{"data":1845,"marks":1846,"value":1847,"nodeType":1293},{},[],"Attackers are increasingly ",{"data":1849,"content":1850,"nodeType":1332},{"uri":1411},[1851],{"data":1852,"marks":1853,"value":1855,"nodeType":1293},{},[1854],{"type":1330},"targeting session cookies",{"data":1857,"marks":1858,"value":1859,"nodeType":1293},{},[]," to be able to hijack live user sessions as a means of getting around MFA. Although session cookies are predominantly stolen via infostealers, techniques like AitM and BitM phishing described above are also methods of stealing session cookies and hijacking sessions.",{"data":1861,"content":1862,"nodeType":1294},{},[1863],{"data":1864,"marks":1865,"value":1866,"nodeType":1293},{},[],"While the majority of infostealer data dumps result in credential stuffing attacks rather than session hijacking, as the infostealer marketplace continues to heat up, it’s likely that more instances of session cookie theft will be the cause of breaches going forward. ",{"data":1868,"content":1869,"nodeType":1486},{},[1870],{"data":1871,"marks":1872,"value":1873,"nodeType":1293},{},[],"MFA downgrade",{"data":1875,"content":1876,"nodeType":1294},{},[1877,1881,1888],{"data":1878,"marks":1879,"value":1880,"nodeType":1293},{},[],"While many organizations are waking up to the fact that it’s not enough to have any old MFA method, it’s still often overlooked that you need to actually remove or disable the phishable methods. Otherwise, in many cases they remain valid, opening affected identities up to ",{"data":1882,"content":1883,"nodeType":1332},{"uri":1423},[1884],{"data":1885,"marks":1886,"value":1873,"nodeType":1293},{},[1887],{"type":1330},{"data":1889,"marks":1890,"value":1891,"nodeType":1293},{},[]," attacks. ",{"data":1893,"content":1894,"nodeType":1294},{},[1895],{"data":1896,"marks":1897,"value":1898,"nodeType":1293},{},[],"Just because a user has a phishing-resistant factor setup (such as passkeys) and may use them by default, it does not mean they are necessarily enforced. Often, services support the use of multiple authentication options, particularly for second factors. In particular, passkeys are device-bound and so enforcing their use prevents logins from other devices and can cause recovery issues in a lost/broken device scenario. Therefore, it’s common for the default case to be that passkey authentication is optional, rather than required.",{"data":1900,"content":1901,"nodeType":1294},{},[1902],{"data":1903,"marks":1904,"value":1905,"nodeType":1293},{},[],"When used in combination with AitM phishing tools, it’s possible for attackers to modify requests/responses so as to prevent the ability of passkeys to be selected as a login option and prompting the user to use vulnerable factors, such as passwords, TOTPs and push notifications instead. Since the server-side supports other authentication options, if the user continues and enters one of these alternative factors then their authenticated session will be compromised – despite the fact they usually use phishing-resistant MFA methods like passkeys or similar.",{"data":1907,"content":1908,"nodeType":1368},{},[],{"data":1910,"content":1911,"nodeType":1376},{},[1912],{"data":1913,"marks":1914,"value":1915,"nodeType":1293},{},[],"Use case inspo: How red teamers are using the SaaS attack matrix",{"data":1917,"content":1918,"nodeType":1294},{},[1919],{"data":1920,"marks":1921,"value":1922,"nodeType":1293},{},[],"The techniques that advanced red teams are using to (ethically) hack into their clients are always a good indicator of what direction hackers in the real world are headed.  ",{"data":1924,"content":1925,"nodeType":1294},{},[1926],{"data":1927,"marks":1928,"value":1929,"nodeType":1293},{},[],"We spoke to a few of the best red teams around to see how they are using the matrix: Let’s see what they had to say. ",{"data":1931,"content":1932,"nodeType":1368},{},[],{"data":1934,"content":1935,"nodeType":1486},{},[1936],{"data":1937,"marks":1938,"value":1939,"nodeType":1293},{},[],"Rob Maslen | Managing Principal Consultant | MDSec",{"data":1941,"content":1942,"nodeType":1294},{},[1943],{"data":1944,"marks":1945,"value":1946,"nodeType":1293},{},[],"“We use the matrix throughout our engagements: When scoping and proposing projects to clients, during testing to assist our consultants in successfully utilizing novel SaaS-attack techniques, and for reporting to provide a common language across the vendors that they work with. ",{"data":1948,"content":1949,"nodeType":1294},{},[1950],{"data":1951,"marks":1952,"value":1953,"nodeType":1293},{},[],"It’s been most useful to us when performing engagements on more modern Zero Trust Environments where macOS is predominantly the Operating System of choice. The objectives tend to be either access to critical applications that reside within the cloud and require the compromise of SaaS credentials, or to gain privileged access to a SaaS application. Whilst resources like the MITRE ATT&CK Framework can help to describe the techniques that have been used against a more traditional environment, the SaaS Matrix aids with performing and describing attacks against a more modern infrastructure.  ",{"data":1955,"content":1956,"nodeType":1294},{},[1957,1961,1969],{"data":1958,"marks":1959,"value":1960,"nodeType":1293},{},[],"The technique we’ve seen most success with, across both traditional Active Directory attacks and more modern Zero Trust Environments, is ",{"data":1962,"content":1963,"nodeType":1332},{"uri":1411},[1964],{"data":1965,"marks":1966,"value":1968,"nodeType":1293},{},[1967],{"type":1330},"Session Cookie Theft",{"data":1970,"marks":1971,"value":1972,"nodeType":1293},{},[],". The protection of browser cookies (for inexplicable reasons) has had less engineering attention than it should have, opening up opportunities for lateral movement using session cookies, credentials, or API keys recovered from a host becomes a key technique. In our experience defensive tooling has yet to catch up with this threat. ",{"data":1974,"content":1975,"nodeType":1294},{},[1976,1980,1989,1992,2001,2004,2013,2016,2025,2028,2037,2040,2048,2051,2059,2062,2071,2074,2082,2086,2095,2098,2107],{"data":1977,"marks":1978,"value":1979,"nodeType":1293},{},[],"We’ve also seen success with various techniques across Kill Chain stages, including ",{"data":1981,"content":1983,"nodeType":1332},{"uri":1982},"https://github.com/pushsecurity/saas-attacks/blob/main/techniques/subdomain_tenant_discovery/description.md",[1984],{"data":1985,"marks":1986,"value":1988,"nodeType":1293},{},[1987],{"type":1330},"Subdomain tenant discovery",{"data":1990,"marks":1991,"value":1396,"nodeType":1293},{},[],{"data":1993,"content":1995,"nodeType":1332},{"uri":1994},"https://github.com/pushsecurity/saas-attacks/blob/main/techniques/dns_reconnaissance/description.md",[1996],{"data":1997,"marks":1998,"value":2000,"nodeType":1293},{},[1999],{"type":1330},"DNS reconnaissance",{"data":2002,"marks":2003,"value":1396,"nodeType":1293},{},[],{"data":2005,"content":2007,"nodeType":1332},{"uri":2006},"https://github.com/pushsecurity/saas-attacks/blob/main/techniques/username_enumeration/description.md",[2008],{"data":2009,"marks":2010,"value":2012,"nodeType":1293},{},[2011],{"type":1330},"username enumeration",{"data":2014,"marks":2015,"value":1396,"nodeType":1293},{},[],{"data":2017,"content":2019,"nodeType":1332},{"uri":2018},"https://github.com/pushsecurity/saas-attacks/blob/main/techniques/consent_phishing/description.md",[2020],{"data":2021,"marks":2022,"value":2024,"nodeType":1293},{},[2023],{"type":1330},"consent phishing",{"data":2026,"marks":2027,"value":1396,"nodeType":1293},{},[],{"data":2029,"content":2031,"nodeType":1332},{"uri":2030},"https://github.com/pushsecurity/saas-attacks/blob/main/techniques/device_code_phishing/description.md",[2032],{"data":2033,"marks":2034,"value":2036,"nodeType":1293},{},[2035],{"type":1330},"device code phishing",{"data":2038,"marks":2039,"value":1396,"nodeType":1293},{},[],{"data":2041,"content":2042,"nodeType":1332},{"uri":1436},[2043],{"data":2044,"marks":2045,"value":2047,"nodeType":1293},{},[2046],{"type":1330},"guest access abuse",{"data":2049,"marks":2050,"value":1396,"nodeType":1293},{},[],{"data":2052,"content":2053,"nodeType":1332},{"uri":1520},[2054],{"data":2055,"marks":2056,"value":2058,"nodeType":1293},{},[2057],{"type":1330},"shadow workflows",{"data":2060,"marks":2061,"value":1396,"nodeType":1293},{},[],{"data":2063,"content":2065,"nodeType":1332},{"uri":2064},"https://github.com/pushsecurity/saas-attacks/blob/main/techniques/oauth_tokens/description.md",[2066],{"data":2067,"marks":2068,"value":2070,"nodeType":1293},{},[2069],{"type":1330},"OAuth tokens",{"data":2072,"marks":2073,"value":1396,"nodeType":1293},{},[],{"data":2075,"content":2076,"nodeType":1332},{"uri":1672},[2077],{"data":2078,"marks":2079,"value":2081,"nodeType":1293},{},[2080],{"type":1330},"API keys",{"data":2083,"marks":2084,"value":2085,"nodeType":1293},{},[]," (as long as you ensure the target isn't notified – make sure you delete the notification of creation email!), ",{"data":2087,"content":2089,"nodeType":1332},{"uri":2088},"https://github.com/pushsecurity/saas-attacks/blob/main/techniques/api_secret_theft/description.md",[2090],{"data":2091,"marks":2092,"value":2094,"nodeType":1293},{},[2093],{"type":1330},"API secret theft",{"data":2096,"marks":2097,"value":1433,"nodeType":1293},{},[],{"data":2099,"content":2101,"nodeType":1332},{"uri":2100},"https://github.com/pushsecurity/saas-attacks/blob/main/techniques/link_backdooring/description.md",[2102],{"data":2103,"marks":2104,"value":2106,"nodeType":1293},{},[2105],{"type":1330},"link backdooring",{"data":2108,"marks":2109,"value":1776,"nodeType":1293},{},[],{"data":2111,"content":2112,"nodeType":1294},{},[2113],{"data":2114,"marks":2115,"value":2116,"nodeType":1293},{},[],"Embracing the modern Zero Trust architecture with its greater SaaS usage does not come without security risks, and while it does invalidate a large number of the attacks that can be performed within an AD environment, the SaaS attack matrix is a great way of illustrating how these attacks work, as well as helping red and blue teams respectively to simulate and defend against them.\" ",{"data":2118,"content":2119,"nodeType":1368},{},[],{"data":2121,"content":2122,"nodeType":1486},{},[2123],{"data":2124,"marks":2125,"value":2126,"nodeType":1293},{},[],"Tom Ellson | Head of Offensive Security | Stripe OLT",{"data":2128,"content":2129,"nodeType":1294},{},[2130],{"data":2131,"marks":2132,"value":2133,"nodeType":1293},{},[],"“We've used the SaaS attack matrix across several cloud-native engagements, for both initial access and lateral movement. My go-to techniques so far have been:",{"data":2135,"content":2136,"nodeType":2237},{},[2137,2166,2188,2210],{"data":2138,"content":2139,"nodeType":2165},{},[2140],{"data":2141,"content":2142,"nodeType":1294},{},[2143,2146,2156,2161],{"data":2144,"marks":2145,"value":37,"nodeType":1293},{},[],{"data":2147,"content":2149,"nodeType":1332},{"uri":2148},"https://github.com/pushsecurity/saas-attacks/blob/main/techniques/im_phishing/description.md",[2150],{"data":2151,"marks":2152,"value":2155,"nodeType":1293},{},[2153,2154],{"type":1330},{"type":1505},"IM phishing:",{"data":2157,"marks":2158,"value":2160,"nodeType":1293},{},[2159],{"type":1505}," ",{"data":2162,"marks":2163,"value":2164,"nodeType":1293},{},[],"Phishing via Microsoft Teams in particular has been highly successful, especially when paired with a number of abusable “features” (working as intended, clearly). ","list-item",{"data":2167,"content":2168,"nodeType":2165},{},[2169],{"data":2170,"content":2171,"nodeType":1294},{},[2172,2175,2184],{"data":2173,"marks":2174,"value":37,"nodeType":1293},{},[],{"data":2176,"content":2177,"nodeType":1332},{"uri":2030},[2178],{"data":2179,"marks":2180,"value":2183,"nodeType":1293},{},[2181,2182],{"type":1330},{"type":1505},"Device code phishing:",{"data":2185,"marks":2186,"value":2187,"nodeType":1293},{},[]," We use this for both initial access and persistence. It’s a great way of getting around MFA by tricking the victim into following the device approval process for our device, but using their device. ",{"data":2189,"content":2190,"nodeType":2165},{},[2191],{"data":2192,"content":2193,"nodeType":1294},{},[2194,2197,2206],{"data":2195,"marks":2196,"value":37,"nodeType":1293},{},[],{"data":2198,"content":2199,"nodeType":1332},{"uri":1399},[2200],{"data":2201,"marks":2202,"value":2205,"nodeType":1293},{},[2203,2204],{"type":1330},{"type":1505},"AitM phishing:",{"data":2207,"marks":2208,"value":2209,"nodeType":1293},{},[]," This is now a staple for credential harvesting. Better security controls force us to abuse other avenues to bypass conditional access policies, such as extraction of the PRT token from the end user device, thus granting us claimed access, which can be achieved using AitM and BitM techniques.",{"data":2211,"content":2212,"nodeType":2165},{},[2213],{"data":2214,"content":2215,"nodeType":1294},{},[2216,2219,2229,2233],{"data":2217,"marks":2218,"value":37,"nodeType":1293},{},[],{"data":2220,"content":2222,"nodeType":1332},{"uri":2221},"https://github.com/pushsecurity/saas-attacks/blob/main/techniques/oauth_token_enumeration/description.md",[2223],{"data":2224,"marks":2225,"value":2228,"nodeType":1293},{},[2226,2227],{"type":1330},{"type":1505},"OAuth token enumeration:",{"data":2230,"marks":2231,"value":2160,"nodeType":1293},{},[2232],{"type":1505},{"data":2234,"marks":2235,"value":2236,"nodeType":1293},{},[],"Once an account has been compromised, the Myapps portal is commonly used to validate the accessible applications and further target downstream apps to access data and functionality. ","unordered-list",{"data":2239,"content":2240,"nodeType":1294},{},[2241],{"data":2242,"marks":2243,"value":2244,"nodeType":1293},{},[],"We’re usually targeting M365 environments but have still found these attack techniques to be highly effective. In some cases, we’ve leveraged other SaaS applications such as abusing in-app phishing via GitHub to compromise development pipelines. The matrix is particularly useful as a playbook of further attacks once initial access has been established. Even just the awareness of how to pivot from SaaS to SaaS (and sometimes back to Microsoft or Google) is really eye-opening for red teams, and adds a new dimension to the security testing that our clients are used to experiencing. ",{"data":2246,"content":2247,"nodeType":1294},{},[2248],{"data":2249,"marks":2250,"value":2251,"nodeType":1293},{},[],"Because of the success of using these methods, we’ve now incorporated the SaaS attack matrix techniques into our purple teaming methodology to ensure that our clients can build awareness of their detection visibility gaps when it comes to identity attacks, and are routinely benchmarked against them.”  ",{"data":2253,"content":2254,"nodeType":1368},{},[],{"data":2256,"content":2257,"nodeType":1486},{},[2258],{"data":2259,"marks":2260,"value":2261,"nodeType":1293},{},[],"Max Corbridge | Head of Adversarial Simulation | JUMPSEC",{"data":2263,"content":2264,"nodeType":1294},{},[2265],{"data":2266,"marks":2267,"value":2268,"nodeType":1293},{},[],"“I’ve been a big fan of the matrix from day one. We use it for two main purposes – as a catalog of TTPs to apply during threat modeling exercises with cloud-native clients, and as a guide for how to apply novel TTPs to different apps and situations. The wiki descriptions, video demonstrations and references help enormously with this. ",{"data":2270,"content":2271,"nodeType":1294},{},[2272,2276,2284,2287,2294,2297,2306,2309,2318],{"data":2273,"marks":2274,"value":2275,"nodeType":1293},{},[],"We’ve mostly relied on ",{"data":2277,"content":2278,"nodeType":1332},{"uri":2148},[2279],{"data":2280,"marks":2281,"value":2283,"nodeType":1293},{},[2282],{"type":1330},"IM phishing",{"data":2285,"marks":2286,"value":1396,"nodeType":1293},{},[],{"data":2288,"content":2289,"nodeType":1332},{"uri":1399},[2290],{"data":2291,"marks":2292,"value":1405,"nodeType":1293},{},[2293],{"type":1330},{"data":2295,"marks":2296,"value":1396,"nodeType":1293},{},[],{"data":2298,"content":2300,"nodeType":1332},{"uri":2299},"https://github.com/pushsecurity/saas-attacks/blob/main/techniques/abuse_existing_oauth_integrations/description.md",[2301],{"data":2302,"marks":2303,"value":2305,"nodeType":1293},{},[2304],{"type":1330},"abusing OAuth integrations",{"data":2307,"marks":2308,"value":1433,"nodeType":1293},{},[],{"data":2310,"content":2312,"nodeType":1332},{"uri":2311},"https://github.com/pushsecurity/saas-attacks/blob/main/techniques/samljacking/description.md",[2313],{"data":2314,"marks":2315,"value":2317,"nodeType":1293},{},[2316],{"type":1330},"SAMLjacking",{"data":2319,"marks":2320,"value":2321,"nodeType":1293},{},[],". In one recent engagement, we were able to compromise a cloud identity with limited permissions in the target Azure environment. We were able to enumerate additional OAuth integrations to laterally move to a third-party IT Service Management SaaS application, which presented a much easier target to elevate privileges. We actually ended up finding a number of 0-days in the application, which we then used as a trusted platform to launch a covert spear-phishing campaign against specific high-privilege users, communicating back-and-forth as though we were a genuine support team, and hiding risky changes to cover our tracks. Ultimately we were able to pivot back into the target Azure estate, but now with administrative privileges. ",{"data":2323,"content":2324,"nodeType":1294},{},[2325],{"data":2326,"marks":2327,"value":2328,"nodeType":1293},{},[],"This really shows how third-party identities and apps are often the soft underbelly for a lot of otherwise pretty secure orgs that we work with, and we’re enjoying the challenge of finding new ways of getting to the crown jewels. ",{"data":2330,"content":2331,"nodeType":1294},{},[2332],{"data":2333,"marks":2334,"value":2335,"nodeType":1293},{},[],"In my eyes the world of cloud and SaaS-native attack techniques is under-researched for how increasingly relevant it is becoming. Many of the older TTPs and tradecraft are no longer relevant in a cloud-native world, and even when the techniques are consistent with the ways we used to target networks and endpoints, the context and how it actually works is completely different. So, resources like the SaaS attack matrix will continue to be needed for both offensive and defensive security practitioners going forwards”.",{"data":2337,"content":2338,"nodeType":1368},{},[],{"data":2340,"content":2341,"nodeType":1376},{},[2342],{"data":2343,"marks":2344,"value":2345,"nodeType":1293},{},[],"Get involved!",{"data":2347,"content":2348,"nodeType":1294},{},[2349],{"data":2350,"marks":2351,"value":2352,"nodeType":1293},{},[],"Hopefully you're now feeling inspired to get involved and start applying the SaaS attack matrix yourself. And if you’ve been using the matrix and want to share your experience with us, we’d love to hear from you. ",{"data":2354,"content":2355,"nodeType":1294},{},[2356,2360,2368],{"data":2357,"marks":2358,"value":2359,"nodeType":1293},{},[],"We hope to see your comments, discussions, or PRs on ",{"data":2361,"content":2362,"nodeType":1332},{"uri":1324},[2363],{"data":2364,"marks":2365,"value":2367,"nodeType":1293},{},[2366],{"type":1330},"GitHub",{"data":2369,"marks":2370,"value":2371,"nodeType":1293},{},[],"!",{"data":2373,"content":2374,"nodeType":1294},{},[2375,2379,2388],{"data":2376,"marks":2377,"value":2378,"nodeType":1293},{},[],"If this has piqued your interest, we’ve just released a 2024 edition of our SaaS attacks report: ",{"data":2380,"content":2382,"nodeType":1332},{"uri":2381},"https://pushsecurity.com/resources/book/saas-attacks-report/",[2383],{"data":2384,"marks":2385,"value":2387,"nodeType":1293},{},[2386],{"type":1330},"get your copy here",{"data":2389,"marks":2390,"value":1776,"nodeType":1293},{},[],{"data":2392,"content":2398,"nodeType":2399},{"target":2393},{"sys":2394},{"id":2395,"type":2396,"linkType":2397},"J11G6XCdDAYu0GQbKGCnm","Link","Entry",[],"embedded-entry-block",{"data":2401,"content":2402,"nodeType":1294},{},[2403],{"data":2404,"marks":2405,"value":37,"nodeType":1293},{},[],{"entries":2407},{"hyperlink":2408,"inline":2409,"block":2410},[],[],[2411],{"sys":2412,"__typename":2413,"type":2414,"ctaText":2415,"buttonLabel":2416,"buttonColour":2417,"buttonUrl":2381},{"id":2395},"CtaWidget","Custom","Check out the SaaS Attacks Report to learn about how identity attacks are the leading cause of SaaS breaches in 2024","Download the report","sunny orange",{"items":2419},[2420,3673,4343],{"__typename":2421,"sys":2422,"content":2424,"title":3655,"synopsis":3656,"hashTags":118,"publishedDate":3657,"slug":3658,"tagsCollection":3659,"authorsCollection":3665},"BlogPosts",{"id":2423},"489LTCEVau7lh88tLgSPX5",{"json":2425},{"nodeType":1295,"data":2426,"content":2427},{},[2428,2435,2455,2462,2468,2475,2508,2514,2520,2527,2534,2540,2547,2567,2574,2581,2587,2594,2601,2649,2668,2675,2682,2689,2695,2702,2709,2716,2723,2730,2737,2749,2755,2762,2781,2800,2807,2814,2834,2841,2859,2866,2917,2924,2942,2949,2955,2972,2991,2998,3017,3024,3030,3037,3056,3063,3070,3076,3083,3090,3097,3104,3110,3117,3124,3131,3138,3144,3151,3158,3170,3186,3193,3200,3268,3275,3282,3289,3296,3303,3310,3317,3324,3343,3350,3356,3363,3369,3376,3383,3390,3396,3403,3410,3417,3450,3457,3464,3471,3478,3485,3492,3499,3506,3554,3560,3567,3611,3617,3624,3643,3649],{"nodeType":1294,"data":2429,"content":2430},{},[2431],{"nodeType":1293,"value":2432,"marks":2433,"data":2434},"The last time “hacking” topped the attacker actions chart in a Verizon DBIR, Gamestop was being saved by Redditors, ChatGPT didn’t exist, and Will Smith was welcome at the Oscars. ",[],{},{"nodeType":1294,"data":2436,"content":2437},{},[2438,2442,2451],{"nodeType":1293,"value":2439,"marks":2440,"data":2441},"That’s right, it was back in the ",[],{},{"nodeType":1332,"data":2443,"content":2445},{"uri":2444},"https://www.verizon.com/business/resources/reports/dbir/2021/masters-guide/",[2446],{"nodeType":1293,"value":2447,"marks":2448,"data":2450},"2021 DBIR",[2449],{"type":1330},{},{"nodeType":1293,"value":2452,"marks":2453,"data":2454}," that good old-fashioned hacking was the thing hackers did the most. ",[],{},{"nodeType":1294,"data":2456,"content":2457},{},[2458],{"nodeType":1293,"value":2459,"marks":2460,"data":2461},"In every report since, stolen credentials have been the most common “select way-in” (weird term, I know). In this year’s DBIR, stolen credentials accounted for roughly half of the breaches recorded. ",[],{},{"nodeType":2399,"data":2463,"content":2467},{"target":2464},{"sys":2465},{"id":2466,"type":2396,"linkType":2397},"16WQ5Siz92HZKCjDsxWBdr",[],{"nodeType":1294,"data":2469,"content":2470},{},[2471],{"nodeType":1293,"value":2472,"marks":2473,"data":2474},"These stats, along with others like CrowdStrike’s widely cited “80% of attacks involve identity and compromised credentials,” continue to prove that “hackers don’t hack in, they log in.” ",[],{},{"nodeType":1294,"data":2476,"content":2477},{},[2478,2482,2491,2495,2504],{"nodeType":1293,"value":2479,"marks":2480,"data":2481},"In the last year, more stories behind those statistics have started to emerge with a series of high profile “no-hack” identity attacks hitting the headlines – the most recent being the ",[],{},{"nodeType":1332,"data":2483,"content":2485},{"uri":2484},"https://pushsecurity.com/resources/video/snowflake-the-tip-of-the-iceberg/",[2486],{"nodeType":1293,"value":2487,"marks":2488,"data":2490},"Snowflake incident",[2489],{"type":1330},{},{"nodeType":1293,"value":2492,"marks":2493,"data":2494},". You can read more about that breach and others in our repository of ",[],{},{"nodeType":1332,"data":2496,"content":2498},{"uri":2497},"https://pushsecurity.com/blog/identity-attacks-in-the-wild/",[2499],{"nodeType":1293,"value":2500,"marks":2501,"data":2503},"identity attacks in the wild",[2502],{"type":1330},{},{"nodeType":1293,"value":2505,"marks":2506,"data":2507}," where we take a deep dive into the techniques attackers have been using. ",[],{},{"nodeType":2399,"data":2509,"content":2513},{"target":2510},{"sys":2511},{"id":2512,"type":2396,"linkType":2397},"6QY3hnMLMJvnk6zYHYa6pf",[],{"nodeType":2399,"data":2515,"content":2519},{"target":2516},{"sys":2517},{"id":2518,"type":2396,"linkType":2397},"7oAUuhbwgEH5XnDZrm5Zk9",[],{"nodeType":1294,"data":2521,"content":2522},{},[2523],{"nodeType":1293,"value":2524,"marks":2525,"data":2526},"Why should they go to the effort of targeting hardened and well-monitored attack surfaces like networks and endpoints with 0-day exploits or EDR-evading malware, when they can instead simply take a set of stolen credentials and fire them at popular business apps to see which pop open?",[],{},{"nodeType":1294,"data":2528,"content":2529},{},[2530],{"nodeType":1293,"value":2531,"marks":2532,"data":2533},"Taking over an account is the equivalent of compromising an endpoint or getting a foothold on a web-facing server. From this point, an attacker can move laterally, escalate their privileges, and achieve their objective of deploying ransomware, stealing data or disrupting business-critical systems. ",[],{},{"nodeType":2399,"data":2535,"content":2539},{"target":2536},{"sys":2537},{"id":2538,"type":2396,"linkType":2397},"3vdbE3kqFxvhE145q2CwOy",[],{"nodeType":1294,"data":2541,"content":2542},{},[2543],{"nodeType":1293,"value":2544,"marks":2545,"data":2546},"The data shows that account takeover, whether it’s using stolen credentials or session tokens, is now the route of least resistance for attackers, and the #1 attack vector for security teams to defend against.",[],{},{"nodeType":1294,"data":2548,"content":2549},{},[2550,2554,2563],{"nodeType":1293,"value":2551,"marks":2552,"data":2553},"I’m sure you already use a number of tools to secure your workforce identities – MFA, SSO, EDR, etc., and all of them have an important role to play. That said, they also have limitations that attackers are exploiting. We’ve laid out some of the ",[],{},{"nodeType":1332,"data":2555,"content":2557},{"uri":2556},"https://pushsecurity.com/blog/5-reasons-why-push-security-shouldnt-exist/",[2558],{"nodeType":1293,"value":2559,"marks":2560,"data":2562},"typical misconceptions that can undermine an identity security strategy",[2561],{"type":1330},{},{"nodeType":1293,"value":2564,"marks":2565,"data":2566}," so you can avoid the common pitfalls and achieve defense in depth.",[],{},{"nodeType":1376,"data":2568,"content":2569},{},[2570],{"nodeType":1293,"value":2571,"marks":2572,"data":2573},"Push vs. account takeover techniques",[],{},{"nodeType":1294,"data":2575,"content":2576},{},[2577],{"nodeType":1293,"value":2578,"marks":2579,"data":2580},"In this article, we’re going to show you how to use Push to bolster your identity security strategy and prevent account takeover. More specifically, we’ll cover how Push prevents, detects, and blocks some of the common attack techniques seen in this account takeover attack chain:",[],{},{"nodeType":2399,"data":2582,"content":2586},{"target":2583},{"sys":2584},{"id":2585,"type":2396,"linkType":2397},"1FPMzCU0mBgpg1GMSz1sJH",[],{"nodeType":1294,"data":2588,"content":2589},{},[2590],{"nodeType":1293,"value":2591,"marks":2592,"data":2593},"Push uses browser data collected by our browser agent to either detect the attack techniques directly, or identify the vulnerabilities being exploited. Upon making a detection, the browser agent enforces a relevant security control to either block the attack or prevent the user from introducing a vulnerability.",[],{},{"nodeType":1294,"data":2595,"content":2596},{},[2597],{"nodeType":1293,"value":2598,"marks":2599,"data":2600},"If you’re wondering why we’ve opted to build our tool in the browser, the short answer is that being in the browser gives us:",[],{},{"nodeType":2237,"data":2602,"content":2603},{},[2604,2619,2634],{"nodeType":2165,"data":2605,"content":2606},{},[2607],{"nodeType":1294,"data":2608,"content":2609},{},[2610,2615],{"nodeType":1293,"value":2611,"marks":2612,"data":2614},"The broadest visibility",[2613],{"type":1505},{},{"nodeType":1293,"value":2616,"marks":2617,"data":2618}," across all workforce identities, including unmanaged identities outside your IdP.",[],{},{"nodeType":2165,"data":2620,"content":2621},{},[2622],{"nodeType":1294,"data":2623,"content":2624},{},[2625,2630],{"nodeType":1293,"value":2626,"marks":2627,"data":2629},"The best telemetry",[2628],{"type":1505},{},{"nodeType":1293,"value":2631,"marks":2632,"data":2633}," for detecting identity attack TTPs and tools.",[],{},{"nodeType":2165,"data":2635,"content":2636},{},[2637],{"nodeType":1294,"data":2638,"content":2639},{},[2640,2645],{"nodeType":1293,"value":2641,"marks":2642,"data":2644},"The perfect enforcement point",[2643],{"type":1505},{},{"nodeType":1293,"value":2646,"marks":2647,"data":2648}," for stopping attacker actions or risky employee actions in real time. ",[],{},{"nodeType":1294,"data":2650,"content":2651},{},[2652,2656,2665],{"nodeType":1293,"value":2653,"marks":2654,"data":2655},"If you want a more detailed technical explanation, you can read this article by Dan on ",[],{},{"nodeType":1332,"data":2657,"content":2659},{"uri":2658},"https://pushsecurity.com/blog/the-web-proxy-is-dead-long-live-the-browser-extension/",[2660],{"nodeType":1293,"value":2661,"marks":2662,"data":2664},"why browser data is a better source of telemetry for detecting identity attacks than network, IdP and app logs",[2663],{"type":1330},{},{"nodeType":1293,"value":1471,"marks":2666,"data":2667},[],{},{"nodeType":1294,"data":2669,"content":2670},{},[2671],{"nodeType":1293,"value":2672,"marks":2673,"data":2674},"Now we’ve cleared that up, let's look at some account takeover techniques.",[],{},{"nodeType":1376,"data":2676,"content":2677},{},[2678],{"nodeType":1293,"value":2679,"marks":2680,"data":2681},"Part 1: Phishing (including AitM and BitM toolkits)",[],{},{"nodeType":1294,"data":2683,"content":2684},{},[2685],{"nodeType":1293,"value":2686,"marks":2687,"data":2688},"Phishing has been around since forever and there’s a mature category of solutions that are designed to detect and prevent it. But despite solutions like security awareness training, phishing domain detection services and email filtering tools, phishing is still one of the top breach vectors. ",[],{},{"nodeType":2399,"data":2690,"content":2694},{"target":2691},{"sys":2692},{"id":2693,"type":2396,"linkType":2397},"4urh9lIuo0ePgVIJZNtP2B",[],{"nodeType":1294,"data":2696,"content":2697},{},[2698],{"nodeType":1293,"value":2699,"marks":2700,"data":2701},"We’ve all been conditioned to think about phishing as something that happens over email, but it’s actually the browser where most of the action happens, regardless of the initial delivery channel. Push’s position in the browser gives you the ideal vantage point for detecting and stopping phishing attacks.",[],{},{"nodeType":1294,"data":2703,"content":2704},{},[2705],{"nodeType":1293,"value":2706,"marks":2707,"data":2708},"The Push browser agent performs both passive observation and active interrogation in order to detect employees having their passwords harvested or visiting cloned app login pages or pages using AitM/BitM toolkits. Phishing attacks are detected in real time so Push blocks them before your employees can enter their credentials.",[],{},{"nodeType":1486,"data":2710,"content":2711},{},[2712],{"nodeType":1293,"value":2713,"marks":2714,"data":2715},"Detecting phishing through user behavior",[],{},{"nodeType":1294,"data":2717,"content":2718},{},[2719],{"nodeType":1293,"value":2720,"marks":2721,"data":2722},"Rather than trying to detect phishing websites and domains that constantly change, Push detects and blocks phishing attempts based on observing user behavior in the browser.",[],{},{"nodeType":1294,"data":2724,"content":2725},{},[2726],{"nodeType":1293,"value":2727,"marks":2728,"data":2729},"Push does this by observing all logins and generating a fingerprint (or technically a k-anonymized salted partial hash) of the user’s password. This fingerprint is then stored locally to allow Push to perform comparisons.",[],{},{"nodeType":1294,"data":2731,"content":2732},{},[2733],{"nodeType":1293,"value":2734,"marks":2735,"data":2736},"To detect potential phishing attacks, the browser agent compares the observed password fingerprint to known fingerprints for passwords that already exist in local storage.",[],{},{"nodeType":1294,"data":2738,"content":2739},{},[2740,2745],{"nodeType":1293,"value":2741,"marks":2742,"data":2744},"This means that it works even if that employee was the first person to get phished using a new attacker site: ",[2743],{"type":1505},{},{"nodeType":1293,"value":2746,"marks":2747,"data":2748},"Push still detects it and blocks it before your employee can submit their credentials. It also works regardless of the delivery vector used to get the phishing link to the intended victim.",[],{},{"nodeType":2399,"data":2750,"content":2754},{"target":2751},{"sys":2752},{"id":2753,"type":2396,"linkType":2397},"2V2My5IpdVUwh4QugqInUw",[],{"nodeType":1294,"data":2756,"content":2757},{},[2758],{"nodeType":1293,"value":2759,"marks":2760,"data":2761},"Once you’ve discovered a malicious site, you can use Push’s companion feature, URL blocking, to add the domain to a blocklist and prevent your other end-users from even visiting the site.",[],{},{"nodeType":1294,"data":2763,"content":2764},{},[2765,2769,2777],{"nodeType":1293,"value":2766,"marks":2767,"data":2768},"You can programmatically manage URL blocking as part of responding to an attempted phishing incident by using the ",[],{},{"nodeType":1332,"data":2770,"content":2772},{"uri":2771},"https://pushsecurity.redoc.ly/rest-v1/",[2773],{"nodeType":1293,"value":2774,"marks":2775,"data":2776},"Push REST API",[],{},{"nodeType":1293,"value":2778,"marks":2779,"data":2780}," to automatically add URLs to the blocklist or to sync with other threat intelligence sources of known-bad sites.",[],{},{"nodeType":1294,"data":2782,"content":2783},{},[2784,2788,2797],{"nodeType":1293,"value":2785,"marks":2786,"data":2787},"You can find out more about this control in this ",[],{},{"nodeType":1332,"data":2789,"content":2791},{"uri":2790},"https://pushsecurity.com/blog/introducing-sso-password-protection/",[2792],{"nodeType":1293,"value":2793,"marks":2794,"data":2796},"deep-dive article",[2795],{"type":1330},{},{"nodeType":1293,"value":1776,"marks":2798,"data":2799},[],{},{"nodeType":1486,"data":2801,"content":2802},{},[2803],{"nodeType":1293,"value":2804,"marks":2805,"data":2806},"Detecting cloned login pages",[],{},{"nodeType":1294,"data":2808,"content":2809},{},[2810],{"nodeType":1293,"value":2811,"marks":2812,"data":2813},"It’s now very easy for attackers to create cloned login pages that appear to be legitimate, tricking users into providing their credentials. ",[],{},{"nodeType":1294,"data":2815,"content":2816},{},[2817,2821,2830],{"nodeType":1293,"value":2818,"marks":2819,"data":2820},"There’s a number of phishing kits that allow the attacker to simply copy the HTML code from a legitimate website and duplicate it on the malicious site, creating a virtually identical interface that tricks users into entering their credentials. A final sprinkle of typosquatting techniques completes the illusion of legitimacy. The Federal Communications Commission (FCC) ",[],{},{"nodeType":1332,"data":2822,"content":2824},{"uri":2823},"https://www.nextgov.com/cybersecurity/2024/03/fcc-staff-targeted-phishing-attack-cloned-agency-login-site/394609/",[2825],{"nodeType":1293,"value":2826,"marks":2827,"data":2829},"was a recent target",[2828],{"type":1330},{},{"nodeType":1293,"value":2831,"marks":2832,"data":2833}," of this kind of attack. ",[],{},{"nodeType":1294,"data":2835,"content":2836},{},[2837],{"nodeType":1293,"value":2838,"marks":2839,"data":2840},"Push’s cloned app detection feature detects fraudulent login pages by inspecting the resources and structure of pages users log into and fingerprinting them so they can be used to detect when that action occurs on the wrong domain. ",[],{},{"nodeType":1294,"data":2842,"content":2843},{},[2844,2848,2856],{"nodeType":1293,"value":2845,"marks":2846,"data":2847},"You can ",[],{},{"nodeType":1332,"data":2849,"content":2851},{"uri":2850},"https://pushsecurity.com/blog/introducing-cloned-login-page-detection/",[2852],{"nodeType":1293,"value":2853,"marks":2854,"data":2855},"read more about this feature here",[],{},{"nodeType":1293,"value":1471,"marks":2857,"data":2858},[],{},{"nodeType":1486,"data":2860,"content":2861},{},[2862],{"nodeType":1293,"value":2863,"marks":2864,"data":2865},"Detecting AitM and BitM toolkits",[],{},{"nodeType":1294,"data":2867,"content":2868},{},[2869,2873,2881,2884,2892,2895,2903,2906,2914],{"nodeType":1293,"value":2870,"marks":2871,"data":2872},"Adversary-in-the-Middle (AitM) phishing is a technique that uses dedicated tooling to act as a proxy between the target and a legitimate login portal for an application, principally to bypass MFA. As it’s a proxy to the real application, the page will appear exactly as the user expects, making this technique difficult to spot. Popular AitM toolkits include ",[],{},{"nodeType":1332,"data":2874,"content":2876},{"uri":2875},"https://github.com/drk1wi/Modlishka",[2877],{"nodeType":1293,"value":2878,"marks":2879,"data":2880},"Modlishka",[],{},{"nodeType":1293,"value":1396,"marks":2882,"data":2883},[],{},{"nodeType":1332,"data":2885,"content":2887},{"uri":2886},"https://github.com/muraenateam/muraena",[2888],{"nodeType":1293,"value":2889,"marks":2890,"data":2891},"Muraena",[],{},{"nodeType":1293,"value":1396,"marks":2893,"data":2894},[],{},{"nodeType":1332,"data":2896,"content":2898},{"uri":2897},"https://github.com/kgretzky/evilginx2",[2899],{"nodeType":1293,"value":2900,"marks":2901,"data":2902},"Evilginx",[],{},{"nodeType":1293,"value":1459,"marks":2904,"data":2905},[],{},{"nodeType":1332,"data":2907,"content":2909},{"uri":2908},"https://www.bleepingcomputer.com/news/security/evilproxy-uses-indeedcom-open-redirect-for-microsoft-365-phishing/",[2910],{"nodeType":1293,"value":2911,"marks":2912,"data":2913},"Evilproxy",[],{},{"nodeType":1293,"value":1776,"marks":2915,"data":2916},[],{},{"nodeType":1294,"data":2918,"content":2919},{},[2920],{"nodeType":1293,"value":2921,"marks":2922,"data":2923},"Browser-in-the-Middle (BitM) toolkits are different to AitM toolkits because they don’t act as a reverse proxy. Instead, they trick their victim into directly controlling the attacker’s own browser using remote desktop screen sharing and control approaches — think of this like VNC or RDP but using the browser as a client. This is the virtual equivalent of an attacker handing their laptop to their victim, asking them to log in to an app for them, and then taking their laptop back afterwards.",[],{},{"nodeType":1294,"data":2925,"content":2926},{},[2927,2931,2939],{"nodeType":1293,"value":2928,"marks":2929,"data":2930},"We’ve conducted a lot of research into AitM and BitM toolkits recently. If you want to learn more about how they work and see a demo of them in action, ",[],{},{"nodeType":1332,"data":2932,"content":2933},{"uri":1766},[2934],{"nodeType":1293,"value":2935,"marks":2936,"data":2938},"head over here",[2937],{"type":1330},{},{"nodeType":1293,"value":1776,"marks":2940,"data":2941},[],{},{"nodeType":1294,"data":2943,"content":2944},{},[2945],{"nodeType":1293,"value":2946,"marks":2947,"data":2948},"Push gives you a preconfigured set of detections for AitM and BitM toolkits, informed by our threat detection team’s research into their behavior. This phishing tool detection feature will automatically prevent users from accessing a site that’s running one of these malicious tools, and display a custom warning message to your end-users.",[],{},{"nodeType":2399,"data":2950,"content":2954},{"target":2951},{"sys":2952},{"id":2953,"type":2396,"linkType":2397},"4ixcEsEW4EyqckOTmP5Pbb",[],{"nodeType":1294,"data":2956,"content":2957},{},[2958,2962,2968],{"nodeType":1293,"value":2959,"marks":2960,"data":2961},"Administrators can also consume phishing tool detection events via the ",[],{},{"nodeType":1332,"data":2963,"content":2964},{"uri":2771},[2965],{"nodeType":1293,"value":2774,"marks":2966,"data":2967},[],{},{"nodeType":1293,"value":2969,"marks":2970,"data":2971}," into their SIEM or use Push’s webhooks to alert when a warn or block event has occurred.",[],{},{"nodeType":1294,"data":2973,"content":2974},{},[2975,2979,2988],{"nodeType":1293,"value":2976,"marks":2977,"data":2978},"You can read a full write-up of this feature if you want to ",[],{},{"nodeType":1332,"data":2980,"content":2982},{"uri":2981},"https://pushsecurity.com/blog/introducing-aitm-phishing-toolkit-detection-powered-by-the-push-browser/",[2983],{"nodeType":1293,"value":2984,"marks":2985,"data":2987},"learn more",[2986],{"type":1330},{},{"nodeType":1293,"value":1776,"marks":2989,"data":2990},[],{},{"nodeType":1376,"data":2992,"content":2993},{},[2994],{"nodeType":1293,"value":2995,"marks":2996,"data":2997},"Part 2: Infostealer malware",[],{},{"nodeType":1294,"data":2999,"content":3000},{},[3001,3005,3013],{"nodeType":1293,"value":3002,"marks":3003,"data":3004},"The recent ",[],{},{"nodeType":1332,"data":3006,"content":3007},{"uri":1626},[3008],{"nodeType":1293,"value":3009,"marks":3010,"data":3012},"Snowflake breach",[3011],{"type":1330},{},{"nodeType":1293,"value":3014,"marks":3015,"data":3016}," highlighted how infostealer malware is becoming a serious issue for security teams. As well as being able to steal credentials for account takeover, infostealers can also be used to steal session tokens which then allow the attacker to assume an already authorized session without needing to bypass MFA.   ",[],{},{"nodeType":1294,"data":3018,"content":3019},{},[3020],{"nodeType":1293,"value":3021,"marks":3022,"data":3023},"Nearly half of the malware detected last year by Sophos targeted victims’ data specifically, and the majority of that malware was classified as infostealers. ",[],{},{"nodeType":2399,"data":3025,"content":3029},{"target":3026},{"sys":3027},{"id":3028,"type":2396,"linkType":2397},"66B5MBFIhbmky7VuLGbuM3",[],{"nodeType":1294,"data":3031,"content":3032},{},[3033],{"nodeType":1293,"value":3034,"marks":3035,"data":3036},"Infostealers are primarily being used by Initial Access Brokers to harvest credentials and session tokens that they then sell to other threat actors intent on executing more penetrating attacks (e.g. ransomware).  ",[],{},{"nodeType":1294,"data":3038,"content":3039},{},[3040,3044,3053],{"nodeType":1293,"value":3041,"marks":3042,"data":3043},"EDR is seen as the go-to solution for defending against infostealer malware. However, attackers are always looking for ways to get around security controls by obfuscating malicious behavior and evading signature-based checks. For example, ",[],{},{"nodeType":1332,"data":3045,"content":3047},{"uri":3046},"https://thehackernews.com/2024/07/microsoft-defender-flaw-exploited-to.html",[3048],{"nodeType":1293,"value":3049,"marks":3050,"data":3052},"a flaw in Microsoft Defender SmartScreen was recently exploited to deliver infostealer malware",[3051],{"type":1330},{},{"nodeType":1293,"value":1471,"marks":3054,"data":3055},[],{},{"nodeType":1294,"data":3057,"content":3058},{},[3059],{"nodeType":1293,"value":3060,"marks":3061,"data":3062},"Getting total coverage across your endpoint estate is notoriously difficult, if not totally unrealistic. Unless the malware is stopped on execution, then data will inevitably be stolen, and will continue to be taken until stopped (or it self-terminates). And once an attacker has stolen employee credentials or sessions, the credential stuffing and session hijacking attacks that come next won’t touch the endpoint. ",[],{},{"nodeType":1294,"data":3064,"content":3065},{},[3066],{"nodeType":1293,"value":3067,"marks":3068,"data":3069},"For those reasons, you can’t rely on EDR as a single line of defense against infostealers. Push gives you those extra layers of defense to stop account takeover attempts that use stolen credentials and sessions.",[],{},{"nodeType":2399,"data":3071,"content":3075},{"target":3072},{"sys":3073},{"id":3074,"type":2396,"linkType":2397},"4YB6DLIE5TvaAsAAUoJd5v",[],{"nodeType":1486,"data":3077,"content":3078},{},[3079],{"nodeType":1293,"value":3080,"marks":3081,"data":3082},"Detecting stolen sessions ",[],{},{"nodeType":1294,"data":3084,"content":3085},{},[3086],{"nodeType":1293,"value":3087,"marks":3088,"data":3089},"Push uses its browser agent to inject a unique marker into the user agent string of sessions that occur in browsers enrolled in Push. You then add the list of domains where you wish to inject the marker into sessions, such as an identity provider like Okta or Microsoft. ",[],{},{"nodeType":1294,"data":3091,"content":3092},{},[3093],{"nodeType":1293,"value":3094,"marks":3095,"data":3096},"By analyzing logs from the IdP, you can identify activity from the same session that both has the Push marker and that lacks the marker. This can only ever happen when a session is extracted from a browser and maliciously imported into a different browser.",[],{},{"nodeType":1294,"data":3098,"content":3099},{},[3100],{"nodeType":1293,"value":3101,"marks":3102,"data":3103},"This is a high-fidelity signal that a stolen session token is being used by an attacker. It’s certainly a lot cleaner than relying on IP-based or geolocation-based signals, which result in frequent false positives.",[],{},{"nodeType":2399,"data":3105,"content":3109},{"target":3106},{"sys":3107},{"id":3108,"type":2396,"linkType":2397},"1XNNkaoW64t3PPvC54KGXF",[],{"nodeType":1486,"data":3111,"content":3112},{},[3113],{"nodeType":1293,"value":3114,"marks":3115,"data":3116},"Detecting stolen credentials being sold on the dark web",[],{},{"nodeType":1294,"data":3118,"content":3119},{},[3120],{"nodeType":1293,"value":3121,"marks":3122,"data":3123},"Push integrates stolen credential threat intelligence and alerts you when your employees’ credentials are being sold on the dark web. ",[],{},{"nodeType":1294,"data":3125,"content":3126},{},[3127],{"nodeType":1293,"value":3128,"marks":3129,"data":3130},"Commercial TI feeds of stolen credentials have been available for some time. But what we’ve found is that the false-positive rate is incredibly high and the vast majority of credentials are no longer in use.",[],{},{"nodeType":1294,"data":3132,"content":3133},{},[3134],{"nodeType":1293,"value":3135,"marks":3136,"data":3137},"Push validates that leaked credentials match those that are currently being used by your employees to authenticate on any apps they are using in the browser. That means that any alerts or automated actions generated by Push are actionable true positives, cutting out a huge amount of noise and saving your security team time. ",[],{},{"nodeType":2399,"data":3139,"content":3143},{"target":3140},{"sys":3141},{"id":3142,"type":2396,"linkType":2397},"3RnPM0ioGWi3CFMLkxQanO",[],{"nodeType":1376,"data":3145,"content":3146},{},[3147],{"nodeType":1293,"value":3148,"marks":3149,"data":3150},"Part 3: Credential stuffing",[],{},{"nodeType":1294,"data":3152,"content":3153},{},[3154],{"nodeType":1293,"value":3155,"marks":3156,"data":3157},"The previous sections looked at how Push detects and stops common techniques used for stealing and acquiring credentials. We’re now going to cover how Push stops stolen credentials from being used to access and take over employee accounts. ",[],{},{"nodeType":1294,"data":3159,"content":3160},{},[3161,3166],{"nodeType":1293,"value":3162,"marks":3163,"data":3165},"Credential stuffing ",[3164],{"type":1505},{},{"nodeType":1293,"value":3167,"marks":3168,"data":3169},"is when attackers use tools that automate the process of taking a list of stolen passwords and retargeting those credentials against different apps.",[],{},{"nodeType":1294,"data":3171,"content":3172},{},[3173,3177,3182],{"nodeType":1293,"value":3174,"marks":3175,"data":3176},"Closely related to credential stuffing is ",[],{},{"nodeType":1293,"value":3178,"marks":3179,"data":3181},"password spraying",[3180],{"type":1505},{},{"nodeType":1293,"value":3183,"marks":3184,"data":3185},". Instead of using stolen credentials, an attacker uses a list of commonly used usernames and passwords to attempt to compromise accounts. ",[],{},{"nodeType":1294,"data":3187,"content":3188},{},[3189],{"nodeType":1293,"value":3190,"marks":3191,"data":3192},"Both credential stuffing and password spraying are high-volume, automated attacks, and they are an unrelenting problem for most businesses. Microsoft observes 4,000 of them every second and nearly half of all login requests Auth0 receive each day are attempts at credential stuffing. ",[],{},{"nodeType":1294,"data":3194,"content":3195},{},[3196],{"nodeType":1293,"value":3197,"marks":3198,"data":3199},"The true scale of the problem is hard to grasp, as neither app vendors nor users have effective means of monitoring for unauthorized access. Typically these breaches are only detected when:",[],{},{"nodeType":2237,"data":3201,"content":3202},{},[3203,3223,3245],{"nodeType":2165,"data":3204,"content":3205},{},[3206],{"nodeType":1294,"data":3207,"content":3208},{},[3209,3213,3220],{"nodeType":1293,"value":3210,"marks":3211,"data":3212},"The attacker leaks the data they’ve stolen, like in the ",[],{},{"nodeType":1332,"data":3214,"content":3215},{"uri":1626},[3216],{"nodeType":1293,"value":3009,"marks":3217,"data":3219},[3218],{"type":1330},{},{"nodeType":1293,"value":1776,"marks":3221,"data":3222},[],{},{"nodeType":2165,"data":3224,"content":3225},{},[3226],{"nodeType":1294,"data":3227,"content":3228},{},[3229,3233,3242],{"nodeType":1293,"value":3230,"marks":3231,"data":3232},"The attacker deploys ransomware that results in business disruption, like that suffered by ",[],{},{"nodeType":1332,"data":3234,"content":3236},{"uri":3235},"https://pushsecurity.com/blog/identity-attacks-in-the-wild/#id-mgm-resorts-september-2023",[3237],{"nodeType":1293,"value":3238,"marks":3239,"data":3241},"MGM resorts",[3240],{"type":1330},{},{"nodeType":1293,"value":1471,"marks":3243,"data":3244},[],{},{"nodeType":2165,"data":3246,"content":3247},{},[3248],{"nodeType":1294,"data":3249,"content":3250},{},[3251,3255,3264],{"nodeType":1293,"value":3252,"marks":3253,"data":3254},"The attackers use a compromised account to do something deliberately in the public eye. For example, when the SEC’s X (formerly Twitter) account was compromised and ",[],{},{"nodeType":1332,"data":3256,"content":3258},{"uri":3257},"https://incyber.org/en/article/fake-sec-tweet-triggers-bitcoin-surge/#:~:text=The%20fake%20headline%20convinced%20a,an%20unauthorized%20tweet%20was%20posted.",[3259],{"nodeType":1293,"value":3260,"marks":3261,"data":3263},"sent out a message announcing the approval of Bitcoin ETF",[3262],{"type":1330},{},{"nodeType":1293,"value":3265,"marks":3266,"data":3267},".  ",[],{},{"nodeType":1294,"data":3269,"content":3270},{},[3271],{"nodeType":1293,"value":3272,"marks":3273,"data":3274},"Push gives you a number of controls to combat attacks using stolen and guessed passwords, both to prevent them from occurring, and detect them when they do.",[],{},{"nodeType":1486,"data":3276,"content":3277},{},[3278],{"nodeType":1293,"value":3279,"marks":3280,"data":3281},"Prevent employees using credentials that have already been stolen and leaked",[],{},{"nodeType":1294,"data":3283,"content":3284},{},[3285],{"nodeType":1293,"value":3286,"marks":3287,"data":3288},"First, let's stop your employees from using any credentials that have already been stolen and are available to attackers for use in a credential-stuffing attack. ",[],{},{"nodeType":1294,"data":3290,"content":3291},{},[3292],{"nodeType":1293,"value":3293,"marks":3294,"data":3295},"Push monitors stolen credential threat intelligence and compares it to the credentials employees are currently using to access their apps. ",[],{},{"nodeType":1294,"data":3297,"content":3298},{},[3299],{"nodeType":1293,"value":3300,"marks":3301,"data":3302},"You might be wondering, “Does that mean Push sees all our employees’ passwords!?” No. Rather, we use a fingerprint of each password and it's checked locally in the users’ browser and never leaves it. ",[],{},{"nodeType":1294,"data":3304,"content":3305},{},[3306],{"nodeType":1293,"value":3307,"marks":3308,"data":3309},"When we get a match – a stolen password that could successfully be used in a credential-stuffing attack – Push alerts you.",[],{},{"nodeType":1486,"data":3311,"content":3312},{},[3313],{"nodeType":1293,"value":3314,"marks":3315,"data":3316},"Enforce MFA on all employee accounts",[],{},{"nodeType":1294,"data":3318,"content":3319},{},[3320],{"nodeType":1293,"value":3321,"marks":3322,"data":3323},"Next step is to secure the accounts most vulnerable to a credential stuffing attack – those that only use a password for single-factor authentication. ",[],{},{"nodeType":1294,"data":3325,"content":3326},{},[3327,3331,3340],{"nodeType":1293,"value":3328,"marks":3329,"data":3330},"If you’re using SSO to access apps, then it’s easy to overlook instances where local accounts (e.g. username and password logins) are missing MFA – particularly if you’re relying on an IdP solution to audit and enforce MFA. ",[],{},{"nodeType":1332,"data":3332,"content":3334},{"uri":3333},"https://pushsecurity.com/blog/ghost-logins-when-forgotten-identities-come-back-to-haunt-you/",[3335],{"nodeType":1293,"value":3336,"marks":3337,"data":3339},"You can read more about this problem in our blog post on ghost logins",[3338],{"type":1330},{},{"nodeType":1293,"value":1776,"marks":3341,"data":3342},[],{},{"nodeType":1294,"data":3344,"content":3345},{},[3346],{"nodeType":1293,"value":3347,"marks":3348,"data":3349},"Push observes every login made by your employees (both inside and outside SSO) and inspects the authentication protocols used. Accounts that are missing MFA are identified and presented to you in the Push platform.",[],{},{"nodeType":2399,"data":3351,"content":3355},{"target":3352},{"sys":3353},{"id":3354,"type":2396,"linkType":2397},"4t1PHxzadoTBjtJua6dzuJ",[],{"nodeType":1294,"data":3357,"content":3358},{},[3359],{"nodeType":1293,"value":3360,"marks":3361,"data":3362},"You can then use Push to enforce MFA on employee accounts, or present them with in-browser guidance requesting that they enable it themselves.  ",[],{},{"nodeType":2399,"data":3364,"content":3368},{"target":3365},{"sys":3366},{"id":3367,"type":2396,"linkType":2397},"3JSTEJGtLT0hfwnkpLRP4K",[],{"nodeType":1486,"data":3370,"content":3371},{},[3372],{"nodeType":1293,"value":3373,"marks":3374,"data":3375},"Prevent multiple accounts being compromised by credential stuffing due to password reuse",[],{},{"nodeType":1294,"data":3377,"content":3378},{},[3379],{"nodeType":1293,"value":3380,"marks":3381,"data":3382},"The credential stuffing tools that attackers use will target a long list of popular business apps. If a password is reused across multiple apps and is breached, the blast radius is naturally increased – the attacker will be able to hijack multiple accounts, across numerous business applications.",[],{},{"nodeType":1294,"data":3384,"content":3385},{},[3386],{"nodeType":1293,"value":3387,"marks":3388,"data":3389},"Push detects when employees are trying to use the same password across multiple apps. When this happens, you can request that they change their password.",[],{},{"nodeType":2399,"data":3391,"content":3395},{"target":3392},{"sys":3393},{"id":3394,"type":2396,"linkType":2397},"7ARHp2JPiHeKRYHwa2jwIZ",[],{"nodeType":1486,"data":3397,"content":3398},{},[3399],{"nodeType":1293,"value":3400,"marks":3401,"data":3402},"Prevent password spraying breaches",[],{},{"nodeType":1294,"data":3404,"content":3405},{},[3406],{"nodeType":1293,"value":3407,"marks":3408,"data":3409},"To stop your employees’ accounts from being breached by password spraying attacks, Push checks every password to see if it is easily guessable for attackers.",[],{},{"nodeType":1294,"data":3411,"content":3412},{},[3413],{"nodeType":1293,"value":3414,"marks":3415,"data":3416},"To determine if a password is easily guessable, the Push browser agent automatically checks the password against:",[],{},{"nodeType":2237,"data":3418,"content":3419},{},[3420,3430,3440],{"nodeType":2165,"data":3421,"content":3422},{},[3423],{"nodeType":1294,"data":3424,"content":3425},{},[3426],{"nodeType":1293,"value":3427,"marks":3428,"data":3429},"A list of top 10,000 weak base passwords.",[],{},{"nodeType":2165,"data":3431,"content":3432},{},[3433],{"nodeType":1294,"data":3434,"content":3435},{},[3436],{"nodeType":1293,"value":3437,"marks":3438,"data":3439},"Number and special character variations on these weak base passwords, for example: Password1! or January2022.",[],{},{"nodeType":2165,"data":3441,"content":3442},{},[3443],{"nodeType":1294,"data":3444,"content":3445},{},[3446],{"nodeType":1293,"value":3447,"marks":3448,"data":3449},"Variations on these weak base passwords that replace letters with numerals (1337), for example: P455w0rd.",[],{},{"nodeType":1294,"data":3451,"content":3452},{},[3453],{"nodeType":1293,"value":3454,"marks":3455,"data":3456},"You can also add your own custom word list that employees and attackers will predictably try and use. Push will then stop those words being used as part of passwords.",[],{},{"nodeType":1486,"data":3458,"content":3459},{},[3460],{"nodeType":1293,"value":3461,"marks":3462,"data":3463},"Detect unauthorized sessions  ",[],{},{"nodeType":1294,"data":3465,"content":3466},{},[3467],{"nodeType":1293,"value":3468,"marks":3469,"data":3470},"Once you have enabled all the Push controls that prevent employees from creating and using accounts that can be easily compromised by credential stuffing and password spraying attacks, the next line of defense is to detect when accounts are taken over.",[],{},{"nodeType":1294,"data":3472,"content":3473},{},[3474],{"nodeType":1293,"value":3475,"marks":3476,"data":3477},"Push uses its browser agent to inject a unique marker into the user agent string of sessions that occur in browsers enrolled in Push. You then add the list of domains that you want to have injected with the session marker. ",[],{},{"nodeType":1294,"data":3479,"content":3480},{},[3481],{"nodeType":1293,"value":3482,"marks":3483,"data":3484},"By analyzing logs from the IdP, you can identify activity from the same session that both has the Push marker and that lacks the marker. This indicates that the session is not being used by the legitimate user (your employees) in their usual work browser, and could be an attacker using their account. ",[],{},{"nodeType":1486,"data":3486,"content":3487},{},[3488],{"nodeType":1293,"value":3489,"marks":3490,"data":3491},"Reduce your identity attack surface",[],{},{"nodeType":1294,"data":3493,"content":3494},{},[3495],{"nodeType":1293,"value":3496,"marks":3497,"data":3498},"Finally, you’ll likely want to reduce your attack surface that can be targeted by credential stuffing. In other words, reduce the number of username and password accounts your employees have. ",[],{},{"nodeType":1294,"data":3500,"content":3501},{},[3502],{"nodeType":1293,"value":3503,"marks":3504,"data":3505},"There are a few ways that Push can help you do this.",[],{},{"nodeType":2237,"data":3507,"content":3508},{},[3509,3524,3539],{"nodeType":2165,"data":3510,"content":3511},{},[3512],{"nodeType":1294,"data":3513,"content":3514},{},[3515,3520],{"nodeType":1293,"value":3516,"marks":3517,"data":3519},"Block access to unapproved apps",[3518],{"type":1505},{},{"nodeType":1293,"value":3521,"marks":3522,"data":3523},". Using Push, you can create a block list of apps that you don’t want your users to create accounts and identities on.",[],{},{"nodeType":2165,"data":3525,"content":3526},{},[3527],{"nodeType":1294,"data":3528,"content":3529},{},[3530,3535],{"nodeType":1293,"value":3531,"marks":3532,"data":3534},"Use app banners to stop users from creating local accounts",[3533],{"type":1505},{},{"nodeType":1293,"value":3536,"marks":3537,"data":3538},". When an employee goes to sign up to an app, Push will present an app banner that tells them to use their SSO identity and not to create a username and password account.",[],{},{"nodeType":2165,"data":3540,"content":3541},{},[3542],{"nodeType":1294,"data":3543,"content":3544},{},[3545,3550],{"nodeType":1293,"value":3546,"marks":3547,"data":3549},"Get existing accounts and apps behind SSO",[3548],{"type":1505},{},{"nodeType":1293,"value":3551,"marks":3552,"data":3553},". Push shows you how your employees are logging in to every account on every app, including whether they’re using SAML or OIDC SSO. Armed with this data, you can get your employees to use your preferred SSO solution on the apps where it’s already available, and look into whether other popular apps being used in the business offer SSO.",[],{},{"nodeType":2399,"data":3555,"content":3559},{"target":3556},{"sys":3557},{"id":3558,"type":2396,"linkType":2397},"3y8L55hbcQaRYPCdYYb3xA",[],{"nodeType":1376,"data":3561,"content":3562},{},[3563],{"nodeType":1293,"value":3564,"marks":3565,"data":3566},"Stop account takeover at the push of a button",[],{},{"nodeType":1294,"data":3568,"content":3569},{},[3570,3574,3582,3586,3591,3594,3599,3603,3607],{"nodeType":1293,"value":3571,"marks":3572,"data":3573},"We’ve described a lot of controls in this article. The good news is that they’re all pre-configured on the the ",[],{},{"nodeType":1332,"data":3575,"content":3577},{"uri":3576},"https://pushsecurity.com/help/audience/administrators/docs/manage-security-controls/#start",[3578],{"nodeType":1293,"value":3579,"marks":3580,"data":3581},"Controls",[],{},{"nodeType":1293,"value":3583,"marks":3584,"data":3585}," page in the Push platform. When you get started with Push, you can simply turn on all the controls you want, and decide whether you want them to work in ",[],{},{"nodeType":1293,"value":3587,"marks":3588,"data":3590},"monitor",[3589],{"type":1505},{},{"nodeType":1293,"value":1396,"marks":3592,"data":3593},[],{},{"nodeType":1293,"value":3595,"marks":3596,"data":3598},"warn",[3597],{"type":1505},{},{"nodeType":1293,"value":3600,"marks":3601,"data":3602}," mode or ",[],{},{"nodeType":1293,"value":138,"marks":3604,"data":3606},[3605],{"type":1505},{},{"nodeType":1293,"value":3608,"marks":3609,"data":3610}," mode.    ",[],{},{"nodeType":2399,"data":3612,"content":3616},{"target":3613},{"sys":3614},{"id":3615,"type":2396,"linkType":2397},"6FCuO78yQMNZvkcbcALmis",[],{"nodeType":1486,"data":3618,"content":3619},{},[3620],{"nodeType":1293,"value":3621,"marks":3622,"data":3623},"See it for yourself",[],{},{"nodeType":1294,"data":3625,"content":3626},{},[3627,3631,3639],{"nodeType":1293,"value":3628,"marks":3629,"data":3630},"To learn more, ",[],{},{"nodeType":1332,"data":3632,"content":3634},{"uri":3633},"https://pushsecurity.com/demo/",[3635],{"nodeType":1293,"value":3636,"marks":3637,"data":3638},"book a demo",[],{},{"nodeType":1293,"value":3640,"marks":3641,"data":3642},". We’ll be happy to show you these features, along with how we discover all the apps your employees are using, even the ones not behind SSO.",[],{},{"nodeType":2399,"data":3644,"content":3648},{"target":3645},{"sys":3646},{"id":3647,"type":2396,"linkType":2397},"4IRtR9zicpB7lXdz2RvIlK",[],{"nodeType":1294,"data":3650,"content":3651},{},[3652],{"nodeType":1293,"value":37,"marks":3653,"data":3654},[],{},"Hackers don’t hack in, they log in: How to prevent account takeover with Push","How Push stops attackers from using identity attack tools and techniques to compromise your employee user accounts. ","2024-08-19T00:00:00.000Z","how-to-prevent-account-takeover-with-push",{"items":3660},[3661,3663],{"sys":3662,"name":1310},{"id":1309},{"sys":3664,"name":1306},{"id":1305},{"items":3666},[3667],{"fullName":3668,"firstName":3669,"jobTitle":3670,"profilePicture":3671},"Alex Henshall","Alex","Product Team",{"url":3672},"https://images.ctfassets.net/y1cdw1ablpvd/2rz3Pre3b1MexPIQ4hzPUe/0ef8a092b7e7df00fbce3f7d1ccb96d1/Alex_Henshall.jpeg",{"__typename":2421,"sys":3674,"content":3676,"title":4325,"synopsis":4326,"hashTags":118,"publishedDate":4327,"slug":4328,"tagsCollection":4329,"authorsCollection":4335},{"id":3675},"1qegIy4rMdm5XZXnIEoKpE",{"json":3677},{"nodeType":1295,"data":3678,"content":3679},{},[3680,3687,3694,3719,3725,3732,3739,3742,3749,3769,3775,3782,3824,3831,3838,3845,3852,3859,3866,3885,3893,3896,3903,3910,3917,3924,3931,3938,3945,3993,4000,4007,4014,4034,4041,4048,4055,4062,4069,4076,4083,4100,4118,4161,4168,4175,4238,4245,4248,4255,4271,4289,4296,4302,4308,4311,4318],{"nodeType":1294,"data":3681,"content":3682},{},[3683],{"nodeType":1293,"value":3684,"marks":3685,"data":3686},"The field of threat detection and security monitoring has changed significantly over the last decade. Security tools and product categories have been added and replaced, specialist disciplines established, and methodologies created. ",[],{},{"nodeType":1294,"data":3688,"content":3689},{},[3690],{"nodeType":1293,"value":3691,"marks":3692,"data":3693},"Naturally, defenders have had to mature their approach because of the changing nature of the threat facing organizations. Attackers have always looked for new ways to target their victims, and naturally, defenders have had to adapt, forcing attackers to change things up… it’s a cat and mouse game. ",[],{},{"nodeType":1294,"data":3695,"content":3696},{},[3697,3701,3710,3714],{"nodeType":1293,"value":3698,"marks":3699,"data":3700},"Blue teamers have used the concept of the ",[],{},{"nodeType":1332,"data":3702,"content":3704},{"uri":3703},"https://detect-respond.blogspot.com/2013/03/the-pyramid-of-pain.html",[3705],{"nodeType":1293,"value":3706,"marks":3707,"data":3709},"Pyramid of Pain",[3708],{"type":1330},{},{"nodeType":1293,"value":3711,"marks":3712,"data":3713}," for over a decade. The logic is simple: ",[],{},{"nodeType":1293,"value":3715,"marks":3716,"data":3718},"Focus on detecting and responding to indicators that are hard for attackers to change. ",[3717],{"type":1505},{},{"nodeType":2399,"data":3720,"content":3724},{"target":3721},{"sys":3722},{"id":3723,"type":2396,"linkType":2397},"6cG2fx3AikwptyEyXKrYCK",[],{"nodeType":1294,"data":3726,"content":3727},{},[3728],{"nodeType":1293,"value":3729,"marks":3730,"data":3731},"If an attacker only has to tweak a variable to get around your detection rule, like adding a space to change a hash value, it’s probably not a very good detection. It’s not going to remain effective for long and you’re always going to be one step behind the attacker – waiting for them to make their next move so you can react. This usually ends up meaning that attackers enjoy at least some success before they can be shut out again. ",[],{},{"nodeType":1294,"data":3733,"content":3734},{},[3735],{"nodeType":1293,"value":3736,"marks":3737,"data":3738},"The Pyramid of Pain – and the goal of implementing hard-to-bypass detections that hit attackers where it hurts – is central to our design philosophy. But before we get into how we apply this approach, and the types of controls we’ve created as a result, it’s useful to look at how IT and security have changed since the Pyramid was created more than a decade ago. ",[],{},{"nodeType":1368,"data":3740,"content":3741},{},[],{"nodeType":1376,"data":3743,"content":3744},{},[3745],{"nodeType":1293,"value":3746,"marks":3747,"data":3748},"A new era for cyber security",[],{},{"nodeType":1294,"data":3750,"content":3751},{},[3752,3756,3765],{"nodeType":1293,"value":3753,"marks":3754,"data":3755},"We’ve spoken a lot about how we’re in the midst of a new era in cybersecurity, in which identity is now the outermost digital perimeter for security teams to defend. (",[],{},{"nodeType":1332,"data":3757,"content":3759},{"uri":3758},"https://pushsecurity.com/resources/video/the-new-saas-cyber-kill-chain-so-con-2024/",[3760],{"nodeType":1293,"value":3761,"marks":3762,"data":3764},"You’ll be familiar with this if you’ve seen any of Luke’s talks on the New SaaS Cyber Kill Chain.",[3763],{"type":1330},{},{"nodeType":1293,"value":3766,"marks":3767,"data":3768},") ",[],{},{"nodeType":2399,"data":3770,"content":3774},{"target":3771},{"sys":3772},{"id":3773,"type":2396,"linkType":2397},"6nYSZAYpsbj78jKm0q75zs",[],{"nodeType":1294,"data":3776,"content":3777},{},[3778],{"nodeType":1293,"value":3779,"marks":3780,"data":3781},"This is primarily because modern working is no longer contained to a heavily centralized corporate network, and instead happens primarily in applications accessed over the internet via web browser.",[],{},{"nodeType":1294,"data":3783,"content":3784},{},[3785,3789,3797,3801,3808,3812,3820],{"nodeType":1293,"value":3786,"marks":3787,"data":3788},"In this new world, attacks don’t even have to touch the old perimeters, because all the data and functionality they could want exists on the public internet. As a result, we’re seeing more and more ",[],{},{"nodeType":1332,"data":3790,"content":3792},{"uri":3791},"https://pushsecurity.com/blog/saas-attack-techniques/",[3793],{"nodeType":1293,"value":3794,"marks":3795,"data":3796},"attacks targeting SaaS apps",[],{},{"nodeType":1293,"value":3798,"marks":3799,"data":3800},", with the entire attack chain being concluded outside customer networks, not touching any traditional endpoints or networks. The ",[],{},{"nodeType":1332,"data":3802,"content":3803},{"uri":1626},[3804],{"nodeType":1293,"value":3805,"marks":3806,"data":3807},"recent attacks on Snowflake customers",[],{},{"nodeType":1293,"value":3809,"marks":3810,"data":3811},", hailed ",[],{},{"nodeType":1332,"data":3813,"content":3815},{"uri":3814},"https://www.wired.com/story/snowflake-breach-advanced-auto-parts-lendingtree/",[3816],{"nodeType":1293,"value":3817,"marks":3818,"data":3819},"one of the biggest breaches in history",[],{},{"nodeType":1293,"value":3821,"marks":3822,"data":3823},", demonstrate this risk all too well. ",[],{},{"nodeType":1294,"data":3825,"content":3826},{},[3827],{"nodeType":1293,"value":3828,"marks":3829,"data":3830},"This creates a problem for security teams looking to detect and respond to these attacks. ",[],{},{"nodeType":1486,"data":3832,"content":3833},{},[3834],{"nodeType":1293,"value":3835,"marks":3836,"data":3837},"Attacks today are shorter and faster, but just as dangerous",[],{},{"nodeType":1294,"data":3839,"content":3840},{},[3841],{"nodeType":1293,"value":3842,"marks":3843,"data":3844},"Detecting and responding to identity attacks – phishing, credential stuffing, etc. – used to be just one possible method of initial access in quite a lengthy Kill Chain that stretched from the compromise of the user device, pivoting to internal network resources, escalating privileges, moving laterally, and finally achieving their objectives.",[],{},{"nodeType":1294,"data":3846,"content":3847},{},[3848],{"nodeType":1293,"value":3849,"marks":3850,"data":3851},"This meant that defenders could adopt an assumed compromise mentality and build layered detections, as well as proactively hunting for threats across these various stages and layers of the network. The more actions an attacker has to perform, the more opportunities for detection, and the higher the likelihood that they’ll be caught in the act before any real, lasting damage can be caused. ",[],{},{"nodeType":1294,"data":3853,"content":3854},{},[3855],{"nodeType":1293,"value":3856,"marks":3857,"data":3858},"Today, attackers have a lot of opportunities to cause significant damage for much less effort than before. For example, if the goal is to compromise an app like Snowflake and dump the data from it, the Kill Chain is way shorter than a traditional network-based attack. And all the great tools and security products you have, like EDR, don’t come into play. ",[],{},{"nodeType":1294,"data":3860,"content":3861},{},[3862],{"nodeType":1293,"value":3863,"marks":3864,"data":3865},"This means that the initial layer of anti-account takeover controls are much more important in this context. But, the historical detections in this space – email gateway security products, analyzing web pages for malicious content, and URL blocklisting – are either less relevant, or built upon easy to bypass detections toward the bottom of the Pyramid of Pain. ",[],{},{"nodeType":1294,"data":3867,"content":3868},{},[3869,3873,3881],{"nodeType":1293,"value":3870,"marks":3871,"data":3872},"As an example, ",[],{},{"nodeType":1332,"data":3874,"content":3876},{"uri":3875},"https://pushsecurity.com/blog/how-aitm-phishing-kits-evade-detection/",[3877],{"nodeType":1293,"value":3878,"marks":3879,"data":3880},"we recently published an article on all the ways that AitM phishing sites are evading detection",[],{},{"nodeType":1293,"value":3882,"marks":3883,"data":3884},". TL;DR – there are a lot, and they seem to be quite effective. But this is partly because the majority of the detections they're trying to avoid are built on shaky ground.   ",[],{},{"nodeType":1294,"data":3886,"content":3887},{},[3888],{"nodeType":1293,"value":3889,"marks":3890,"data":3892},"So what? Well, it’s clear that the controls that the industry has relied on in the past to stop identity attacks are too easy to bypass, and are no longer sufficient. ",[3891],{"type":1505},{},{"nodeType":1368,"data":3894,"content":3895},{},[],{"nodeType":1376,"data":3897,"content":3898},{},[3899],{"nodeType":1293,"value":3900,"marks":3901,"data":3902},"Building effective identity threat detection controls",[],{},{"nodeType":1294,"data":3904,"content":3905},{},[3906],{"nodeType":1293,"value":3907,"marks":3908,"data":3909},"Now we’ve covered the problem that we set out to solve, let’s look at what we’re doing differently. ",[],{},{"nodeType":1294,"data":3911,"content":3912},{},[3913],{"nodeType":1293,"value":3914,"marks":3915,"data":3916},"In order to climb the Pyramid toward the apex, you need to find ways to detect increasingly generic parts of an attack technique. So you want to avoid things like what a specific malware’s code looks like, or where it connects back to. But what the malware does, or what happens when it runs, is more generic, and therefore more interesting to us.  ",[],{},{"nodeType":1294,"data":3918,"content":3919},{},[3920],{"nodeType":1293,"value":3921,"marks":3922,"data":3923},"The shift from static code signatures and fuzzy hashes to dynamic analysis of what code does on a live system is at the heart of why EDR killed antivirus a decade ago. It proved at-scale the value of moving detections up the pyramid.",[],{},{"nodeType":1294,"data":3925,"content":3926},{},[3927],{"nodeType":1293,"value":3928,"marks":3929,"data":3930},"We’re always on the lookout for ways to move our detections up the pyramid as well. It’s easiest to explain how we’ve applied this by looking at an example. ",[],{},{"nodeType":1486,"data":3932,"content":3933},{},[3934],{"nodeType":1293,"value":3935,"marks":3936,"data":3937},"Scenario: Detecting a web-based phishing attack",[],{},{"nodeType":1294,"data":3939,"content":3940},{},[3941],{"nodeType":1293,"value":3942,"marks":3943,"data":3944},"Let’s break down the stages of a web-based phishing attack as an example. For a user to be successfully phished:",[],{},{"nodeType":2237,"data":3946,"content":3947},{},[3948,3963,3978],{"nodeType":2165,"data":3949,"content":3950},{},[3951],{"nodeType":1294,"data":3952,"content":3953},{},[3954,3959],{"nodeType":1293,"value":3955,"marks":3956,"data":3958},"Stage 1:",[3957],{"type":1505},{},{"nodeType":1293,"value":3960,"marks":3961,"data":3962}," The victim must be lured to visit a website.",[],{},{"nodeType":2165,"data":3964,"content":3965},{},[3966],{"nodeType":1294,"data":3967,"content":3968},{},[3969,3974],{"nodeType":1293,"value":3970,"marks":3971,"data":3973},"Stage 2:",[3972],{"type":1505},{},{"nodeType":1293,"value":3975,"marks":3976,"data":3977}," The website must somehow trick or convince the user that it’s legitimate and trustworthy, for example by mimicking a legitimate site.",[],{},{"nodeType":2165,"data":3979,"content":3980},{},[3981],{"nodeType":1294,"data":3982,"content":3983},{},[3984,3989],{"nodeType":1293,"value":3985,"marks":3986,"data":3988},"Stage 3:",[3987],{"type":1505},{},{"nodeType":1293,"value":3990,"marks":3991,"data":3992}," The user must enter their actual credentials into that website.",[],{},{"nodeType":1294,"data":3994,"content":3995},{},[3996],{"nodeType":1293,"value":3997,"marks":3998,"data":3999},"So, how might you go about detecting this attack? Let’s start from the bottom of the pyramid and work our way up.",[],{},{"nodeType":1486,"data":4001,"content":4002},{},[4003],{"nodeType":1293,"value":4004,"marks":4005,"data":4006},"Stage 1: Determining if a URL, IP, or domain is bad",[],{},{"nodeType":1294,"data":4008,"content":4009},{},[4010],{"nodeType":1293,"value":4011,"marks":4012,"data":4013},"You might start by looking for the lure – historically an email. You could look for links in emails, or links in attachments in an email and then check if they are bad (which is essentially what email security products do). You could look for known-bad URLs in emails, but these change for every phishing campaign. In modern attacks, every target can receive a unique email and link. Even just using a URL shortener can bypass this. It’s equivalent to a malware hash – trivial to change, and therefore not a great thing to pin your detections on. ",[],{},{"nodeType":1294,"data":4015,"content":4016},{},[4017,4021,4030],{"nodeType":1293,"value":4018,"marks":4019,"data":4020},"You could look at which IP address the user connects to, but these days it’s very simple for attackers to add a new IP to their cloud-hosted server. If a domain is flagged as known-bad, the attacker only has to register a new domain, or compromise a WordPress server on an already trusted domain. Both of these things are ",[],{},{"nodeType":1332,"data":4022,"content":4024},{"uri":4023},"https://www.bleepingcomputer.com/news/security/revolver-rabbit-gang-registers-500-000-domains-for-malware-campaigns/",[4025],{"nodeType":1293,"value":4026,"marks":4027,"data":4029},"happening on a massive scale",[4028],{"type":1330},{},{"nodeType":1293,"value":4031,"marks":4032,"data":4033}," as attackers pre-plan for the fact that their domains will be burned at some point. Attackers are more than happy to spend $10-$20 per new domain in the grand scheme of the potential proceeds of crime. ",[],{},{"nodeType":1294,"data":4035,"content":4036},{},[4037],{"nodeType":1293,"value":4038,"marks":4039,"data":4040},"But there’s a more fundamental flaw here – for defenders to know that a URL, IP, or domain name is bad, it needs to be reported first. When are things reported? Typically after being used in an attack – so unfortunately, someone always gets hurt.  ",[],{},{"nodeType":1486,"data":4042,"content":4043},{},[4044],{"nodeType":1293,"value":4045,"marks":4046,"data":4047},"Stage 2: Determining if a site is legitimate",[],{},{"nodeType":1294,"data":4049,"content":4050},{},[4051],{"nodeType":1293,"value":4052,"marks":4053,"data":4054},"So how can we detect a phishing website, on day-zero, the first time anyone runs into it? Well we can look at the second step – does the URL resemble a real website, does the HTML code for a page look similar to a legitimate login page for a known website, is it loading the same image files? This is not trivial to detect, but with the right fuzzy matches and image analysis it can be automated.",[],{},{"nodeType":1294,"data":4056,"content":4057},{},[4058],{"nodeType":1293,"value":4059,"marks":4060,"data":4061},"We’ve now moved up a level on the Pyramid – we’re detecting website artifacts. If we see a legitimate looking website on an unknown domain, it’s likely to be a malicious clone.",[],{},{"nodeType":1294,"data":4063,"content":4064},{},[4065],{"nodeType":1293,"value":4066,"marks":4067,"data":4068},"Unfortunately, the attacker’s website doesn’t need to send each visitor to the same website. It can change dynamically based on where the visitor is coming from – or even randomly, so that not all visitors are served the phishing page. This means that tools which resolve where the links in emails go to be able to analyze them (such as email security appliances) don’t necessarily see the same site the user is actually visiting – a fact that is commonly abused by attackers to bypass detection. It’s critical that detection happens on the actual web page that the victim sees.",[],{},{"nodeType":1486,"data":4070,"content":4071},{},[4072],{"nodeType":1293,"value":4073,"marks":4074,"data":4075},"Stage 3: Detecting the user entering their credentials",[],{},{"nodeType":1294,"data":4077,"content":4078},{},[4079],{"nodeType":1293,"value":4080,"marks":4081,"data":4082},"For a phishing attack to succeed, the victim must enter their actual credentials into the webpage. If you can stop the user entering their real password, there’s no attack. There’s no getting around it. ",[],{},{"nodeType":1294,"data":4084,"content":4085},{},[4086,4090,4097],{"nodeType":1293,"value":4087,"marks":4088,"data":4089},"So, this is exactly what we did: Earlier this year, we released a control which ",[],{},{"nodeType":1332,"data":4091,"content":4092},{"uri":2790},[4093],{"nodeType":1293,"value":4094,"marks":4095,"data":4096},"stops users from entering their password belonging to a particular login page anywhere else",[],{},{"nodeType":1293,"value":1471,"marks":4098,"data":4099},[],{},{"nodeType":1294,"data":4101,"content":4102},{},[4103,4107,4114],{"nodeType":1293,"value":4104,"marks":4105,"data":4106},"Seems simple, right? By focusing on this generic action, that always has to happen, you can essentially stop your users being phished altogether. This means, it doesn’t matter ",[],{},{"nodeType":1332,"data":4108,"content":4109},{"uri":3875},[4110],{"nodeType":1293,"value":4111,"marks":4112,"data":4113},"what the attacker does before that point",[],{},{"nodeType":1293,"value":4115,"marks":4116,"data":4117},":",[],{},{"nodeType":2237,"data":4119,"content":4120},{},[4121,4131,4141,4151],{"nodeType":2165,"data":4122,"content":4123},{},[4124],{"nodeType":1294,"data":4125,"content":4126},{},[4127],{"nodeType":1293,"value":4128,"marks":4129,"data":4130},"It doesn't matter if they run the site using Cloudflare Workers to block automatic analysis.",[],{},{"nodeType":2165,"data":4132,"content":4133},{},[4134],{"nodeType":1294,"data":4135,"content":4136},{},[4137],{"nodeType":1293,"value":4138,"marks":4139,"data":4140},"It doesn’t matter if they hack a WordPress blog to get a reputable domain.",[],{},{"nodeType":2165,"data":4142,"content":4143},{},[4144],{"nodeType":1294,"data":4145,"content":4146},{},[4147],{"nodeType":1293,"value":4148,"marks":4149,"data":4150},"It doesn’t matter if they use clever redirects and rotate the URLs delivered to the user.",[],{},{"nodeType":2165,"data":4152,"content":4153},{},[4154],{"nodeType":1294,"data":4155,"content":4156},{},[4157],{"nodeType":1293,"value":4158,"marks":4159,"data":4160},"It doesn’t matter if they randomize the HTML title for the web page. ",[],{},{"nodeType":1294,"data":4162,"content":4163},{},[4164],{"nodeType":1293,"value":4165,"marks":4166,"data":4167},"They can’t avoid the fact that a user is required to enter their credentials on the page for the attack to succeed. ",[],{},{"nodeType":1294,"data":4169,"content":4170},{},[4171],{"nodeType":1293,"value":4172,"marks":4173,"data":4174},"So, when you apply the Pyramid of Pain to some of the controls we’ve shipped this year, we get a clear feel for the value, from highest to lowest:",[],{},{"nodeType":2237,"data":4176,"content":4177},{},[4178,4198,4218],{"nodeType":2165,"data":4179,"content":4180},{},[4181],{"nodeType":1294,"data":4182,"content":4183},{},[4184,4188,4195],{"nodeType":1293,"value":4185,"marks":4186,"data":4187},"User Behavior: ",[],{},{"nodeType":1332,"data":4189,"content":4190},{"uri":2790},[4191],{"nodeType":1293,"value":4192,"marks":4193,"data":4194},"Detecting and blocking the user behavior of entering their password into any site that the password doesn’t belong to",[],{},{"nodeType":1293,"value":1776,"marks":4196,"data":4197},[],{},{"nodeType":2165,"data":4199,"content":4200},{},[4201],{"nodeType":1294,"data":4202,"content":4203},{},[4204,4208,4215],{"nodeType":1293,"value":4205,"marks":4206,"data":4207},"Tool Behavior: ",[],{},{"nodeType":1332,"data":4209,"content":4210},{"uri":2850},[4211],{"nodeType":1293,"value":4212,"marks":4213,"data":4214},"Detecting when a login page that you access is cloned from a legitimate page.",[],{},{"nodeType":1293,"value":37,"marks":4216,"data":4217},[],{},{"nodeType":2165,"data":4219,"content":4220},{},[4221],{"nodeType":1294,"data":4222,"content":4223},{},[4224,4228,4235],{"nodeType":1293,"value":4225,"marks":4226,"data":4227},"Tool Signature: ",[],{},{"nodeType":1332,"data":4229,"content":4230},{"uri":2981},[4231],{"nodeType":1293,"value":4232,"marks":4233,"data":4234},"Detecting and blocking access to a page with a known phishing kit signature present on the page",[],{},{"nodeType":1293,"value":1776,"marks":4236,"data":4237},[],{},{"nodeType":1294,"data":4239,"content":4240},{},[4241],{"nodeType":1293,"value":4242,"marks":4243,"data":4244},"Naturally, we want to continue focusing on the apex of the Pyramid – at TTPs and Tools – to ensure that the controls we build are as robust as possible, and can’t be bypassed by attackers. ",[],{},{"nodeType":1368,"data":4246,"content":4247},{},[],{"nodeType":1376,"data":4249,"content":4250},{},[4251],{"nodeType":1293,"value":4252,"marks":4253,"data":4254},"The power of the Push browser agent",[],{},{"nodeType":1294,"data":4256,"content":4257},{},[4258,4262,4267],{"nodeType":1293,"value":4259,"marks":4260,"data":4261},"You might ask: ",[],{},{"nodeType":1293,"value":4263,"marks":4264,"data":4266},"If it’s so simple, why hasn’t this been done yet?",[4265],{"type":1505},{},{"nodeType":1293,"value":4268,"marks":4269,"data":4270}," Well, before now, there was no good way of doing it! Teams simply didn’t have tools in the right place to be able to capture the level of data needed, or respond effectively (i.e. automatically, at the point of impact). ",[],{},{"nodeType":1294,"data":4272,"content":4273},{},[4274,4278,4285],{"nodeType":1293,"value":4275,"marks":4276,"data":4277},"This is where being in the browser comes into play. The browser is a great place to observe the behavior of a page in real time, without needing to reconstruct decrypted HTTP data post-TLS termination and try to guess what the rendered page in all its Javascript-infused glory actually does, ",[],{},{"nodeType":1332,"data":4279,"content":4280},{"uri":2658},[4281],{"nodeType":1293,"value":4282,"marks":4283,"data":4284},"as we’ve blogged about previously",[],{},{"nodeType":1293,"value":4286,"marks":4287,"data":4288},". As we’ve seen through the ability to not only detect but prevent phishing attacks, it’s also a great control enforcement point, as you’re able to intercept the user at the point of impact, and you sit as closely as possible to where their work typically happens – in the browser. ",[],{},{"nodeType":1294,"data":4290,"content":4291},{},[4292],{"nodeType":1293,"value":4293,"marks":4294,"data":4295},"To illustrate how crucial the browser is to implementing controls that sit at the apex of the Pyramid of Pain, we created a modified version designed specifically for identity attacks. ",[],{},{"nodeType":2399,"data":4297,"content":4301},{"target":4298},{"sys":4299},{"id":4300,"type":2396,"linkType":2397},"HrK2xQak6KfjInDbeSgv8",[],{"nodeType":2399,"data":4303,"content":4307},{"target":4304},{"sys":4305},{"id":4306,"type":2396,"linkType":2397},"7kLilJ8Y08smUI9ttM3BSO",[],{"nodeType":1368,"data":4309,"content":4310},{},[],{"nodeType":1376,"data":4312,"content":4313},{},[4314],{"nodeType":1293,"value":4315,"marks":4316,"data":4317},"Conclusion",[],{},{"nodeType":1294,"data":4319,"content":4320},{},[4321],{"nodeType":1293,"value":4322,"marks":4323,"data":4324},"Hopefully, this blog post has shone a light on why we do things the way we do here at Push. The goal of building generic detections that are difficult, painful, and costly for attackers to bypass is a key part of our design strategy, and we look forward to sharing many more controls with you that demonstrate this in the future.",[],{},"Our design philosophy: Detecting what matters","This is the first blog in a short series we’re putting together about the ‘why’ behind the ‘what’ at Push. This entry is focused on threat detection. ","2024-08-05T00:00:00.000Z","our-design-philosophy-detecting-what-matters",{"items":4330},[4331,4333],{"sys":4332,"name":1310},{"id":1309},{"sys":4334,"name":1306},{"id":1305},{"items":4336},[4337],{"fullName":4338,"firstName":4339,"jobTitle":4340,"profilePicture":4341},"Dan Green","Dan","Threat Research",{"url":4342},"https://images.ctfassets.net/y1cdw1ablpvd/7jik1VhFgA3kgzXBXTm2Vw/fcd8c171da644903d0827eafcfbcaad0/Dan_Headshot_2025.png",{"__typename":2421,"sys":4344,"content":4346,"title":5136,"synopsis":5137,"hashTags":118,"publishedDate":5138,"slug":5139,"tagsCollection":5140,"authorsCollection":5148},{"id":4345},"20FcoPvHu7zXkTQyv9MmK0",{"json":4347},{"nodeType":1295,"data":4348,"content":4349},{},[4350,4356,4363,4415,4422,4429,4444,4451,4458,4541,4548,4554,4561,4568,4583,4590,4597,4620,4644,4650,4670,4677,4684,4715,4722,4729,4735,4753,4760,4767,4774,4781,4787,4805,4812,4819,4826,4833,4839,4858,4865,4872,4878,4897,4904,4911,4918,4966,4973,5044,5059,5065,5072,5079,5086,5093,5111,5118],{"nodeType":2399,"data":4351,"content":4355},{"target":4352},{"sys":4353},{"id":4354,"type":2396,"linkType":2397},"7rud2H1hcTAOhxh9zHzxP6",[],{"nodeType":1294,"data":4357,"content":4358},{},[4359],{"nodeType":1293,"value":4360,"marks":4361,"data":4362},"If someone asked you where you work, you probably wouldn’t answer, “My browser.” But that would be the truth.",[],{},{"nodeType":1294,"data":4364,"content":4365},{},[4366,4370,4378,4381,4389,4392,4400,4403,4411],{"nodeType":1293,"value":4367,"marks":4368,"data":4369},"(Threat actors already know where you work, of course, and they’ve been capitalizing on the massive shift to cloud-based workforces. Just look at any of the ",[],{},{"nodeType":1332,"data":4371,"content":4373},{"uri":4372},"https://www.crowdstrike.com/global-threat-report/",[4374],{"nodeType":1293,"value":4375,"marks":4376,"data":4377},"latest",[],{},{"nodeType":1293,"value":2160,"marks":4379,"data":4380},[],{},{"nodeType":1332,"data":4382,"content":4384},{"uri":4383},"https://redcanary.com/threat-detection-report/techniques/cloud-accounts/",[4385],{"nodeType":1293,"value":4386,"marks":4387,"data":4388},"threat",[],{},{"nodeType":1293,"value":2160,"marks":4390,"data":4391},[],{},{"nodeType":1332,"data":4393,"content":4395},{"uri":4394},"https://www.verizon.com/business/resources/reports/dbir/",[4396],{"nodeType":1293,"value":4397,"marks":4398,"data":4399},"research",[],{},{"nodeType":1293,"value":2160,"marks":4401,"data":4402},[],{},{"nodeType":1332,"data":4404,"content":4406},{"uri":4405},"https://www.lab539.com/blog/6-months-tracking-aitm-campaigns",[4407],{"nodeType":1293,"value":4408,"marks":4409,"data":4410},"reports",[],{},{"nodeType":1293,"value":4412,"marks":4413,"data":4414}," on identity-based attacks to see how good a job they’ve been doing.)",[],{},{"nodeType":1294,"data":4416,"content":4417},{},[4418],{"nodeType":1293,"value":4419,"marks":4420,"data":4421},"To get visibility of your infrastructure in order to build a strong detection and response program, the equation used to look something like:",[],{},{"nodeType":1294,"data":4423,"content":4424},{},[4425],{"nodeType":1293,"value":4426,"marks":4427,"data":4428},"Network traffic + Logs + Endpoints = Profit!",[],{},{"nodeType":1294,"data":4430,"content":4431},{},[4432,4436,4441],{"nodeType":1293,"value":4433,"marks":4434,"data":4435},"But now there’s a missing piece, as identity infrastructure sprawls across IdPs, core apps, shadow SaaS and third-party integrations: ",[],{},{"nodeType":1293,"value":4437,"marks":4438,"data":4440},"Browser telemetry",[4439],{"type":1505},{},{"nodeType":1293,"value":1471,"marks":4442,"data":4443},[],{},{"nodeType":1294,"data":4445,"content":4446},{},[4447],{"nodeType":1293,"value":4448,"marks":4449,"data":4450},"As a browser agent, Push is uniquely positioned to provide telemetry you can’t easily get anywhere else. We believe that this missing piece is the key to stopping identity attacks by providing the context both for first-class detections and security controls, as well as key correlations for events you observe in traditional log sources.",[],{},{"nodeType":1294,"data":4452,"content":4453},{},[4454],{"nodeType":1293,"value":4455,"marks":4456,"data":4457},"Now we have a better way to bring Push’s data to life to solve meaningful security challenges:",[],{},{"nodeType":2237,"data":4459,"content":4460},{},[4461,4491],{"nodeType":2165,"data":4462,"content":4463},{},[4464],{"nodeType":1294,"data":4465,"content":4466},{},[4467,4472,4476,4487],{"nodeType":1293,"value":4468,"marks":4469,"data":4471},"Plug-and-play security controls",[4470],{"type":1505},{},{"nodeType":1293,"value":4473,"marks":4474,"data":4475},", accessible from the new ",[],{},{"nodeType":4477,"data":4478,"content":4482},"entry-hyperlink",{"target":4479},{"sys":4480},{"id":4481,"type":2396,"linkType":2397},"BtDLgVZRWQ3Ov4WgDQX1W",[4483],{"nodeType":1293,"value":3579,"marks":4484,"data":4486},[4485],{"type":1505},{},{"nodeType":1293,"value":4488,"marks":4489,"data":4490}," page in the Push platform",[],{},{"nodeType":2165,"data":4492,"content":4493},{},[4494],{"nodeType":1294,"data":4495,"content":4496},{},[4497,4502,4506,4513,4516,4524,4528,4537],{"nodeType":1293,"value":4498,"marks":4499,"data":4501},"Choose-your-own-adventure tooling",[4500],{"type":1505},{},{"nodeType":1293,"value":4503,"marks":4504,"data":4505},", including a ",[],{},{"nodeType":1332,"data":4507,"content":4508},{"uri":2771},[4509],{"nodeType":1293,"value":4510,"marks":4511,"data":4512},"REST API",[],{},{"nodeType":1293,"value":1396,"marks":4514,"data":4515},[],{},{"nodeType":1332,"data":4517,"content":4519},{"uri":4518},"https://pushsecurity.redoc.ly/webhooks-v1/",[4520],{"nodeType":1293,"value":4521,"marks":4522,"data":4523},"webhooks",[],{},{"nodeType":1293,"value":4525,"marks":4526,"data":4527},", and a new ",[],{},{"nodeType":1332,"data":4529,"content":4531},{"uri":4530},"/help/audience/administrators/docs/connect-to-siem-or-soar/#using-the-events-page",[4532],{"nodeType":1293,"value":4533,"marks":4534,"data":4536},"Events",[4535],{"type":1505},{},{"nodeType":1293,"value":4538,"marks":4539,"data":4540}," page to help you visualize and build custom detections and automations.",[],{},{"nodeType":1294,"data":4542,"content":4543},{},[4544],{"nodeType":1293,"value":4545,"marks":4546,"data":4547},"Let’s take a closer look.",[],{},{"nodeType":2399,"data":4549,"content":4553},{"target":4550},{"sys":4551},{"id":4552,"type":2396,"linkType":2397},"6iKFd9Qys2SSuNqKVQB7ka",[],{"nodeType":1376,"data":4555,"content":4556},{},[4557],{"nodeType":1293,"value":4558,"marks":4559,"data":4560},"Plug-and-play controls",[],{},{"nodeType":1294,"data":4562,"content":4563},{},[4564],{"nodeType":1293,"value":4565,"marks":4566,"data":4567},"Security visibility without security control is a recipe for a stress headache, so we’re big believers in providing meaningful interventions that are easy to use.",[],{},{"nodeType":1294,"data":4569,"content":4570},{},[4571,4575,4579],{"nodeType":1293,"value":4572,"marks":4573,"data":4574},"With the new ",[],{},{"nodeType":1293,"value":3579,"marks":4576,"data":4578},[4577],{"type":1505},{},{"nodeType":1293,"value":4580,"marks":4581,"data":4582}," page in the Push admin console, you can now find these preconfigured detections and interventions in one place. They cover use cases that any organization can benefit from, and take a unique browser-based approach to solving some thorny issues.",[],{},{"nodeType":1294,"data":4584,"content":4585},{},[4586],{"nodeType":1293,"value":4587,"marks":4588,"data":4589},"These controls include:",[],{},{"nodeType":1486,"data":4591,"content":4592},{},[4593],{"nodeType":1293,"value":4594,"marks":4595,"data":4596},"Phishing tool detection",[],{},{"nodeType":1294,"data":4598,"content":4599},{},[4600,4604,4609,4612,4617],{"nodeType":1293,"value":4601,"marks":4602,"data":4603},"Detect and block when employees visit webpages that use advanced phishing tools such as Evilginx or EvilNoVNC, among others. These adversary-in-the-middle (AitM) toolkits can mimic legitimate login screens, such as an Okta login page, to steal ",[],{},{"nodeType":1293,"value":4605,"marks":4606,"data":4608},"credentials",[4607],{"type":1505},{},{"nodeType":1293,"value":1459,"marks":4610,"data":4611},[],{},{"nodeType":1293,"value":4613,"marks":4614,"data":4616},"MFA codes",[4615],{"type":1505},{},{"nodeType":1293,"value":1471,"marks":4618,"data":4619},[],{},{"nodeType":1294,"data":4621,"content":4622},{},[4623,4627,4632,4635,4640],{"nodeType":1293,"value":4624,"marks":4625,"data":4626},"Push emits a webhook event when the browser agent detects attributes of these malware. You can also set Push to ",[],{},{"nodeType":1293,"value":4628,"marks":4629,"data":4631},"Warn",[4630],{"type":1505},{},{"nodeType":1293,"value":1763,"marks":4633,"data":4634},[],{},{"nodeType":1293,"value":4636,"marks":4637,"data":4639},"Block",[4638],{"type":1505},{},{"nodeType":1293,"value":4641,"marks":4642,"data":4643}," mode to display a customizable message to end-users when they encounter a phishing site.",[],{},{"nodeType":2399,"data":4645,"content":4649},{"target":4646},{"sys":4647},{"id":4648,"type":2396,"linkType":2397},"2ylIkR0JXHkFStGuCFRjlN",[],{"nodeType":1294,"data":4651,"content":4652},{},[4653,4657,4667],{"nodeType":1293,"value":4654,"marks":4655,"data":4656},"More about ",[],{},{"nodeType":4477,"data":4658,"content":4662},{"target":4659},{"sys":4660},{"id":4661,"type":2396,"linkType":2397},"7KRnTSnJAbbiho69gNyN0B",[4663],{"nodeType":1293,"value":4664,"marks":4665,"data":4666},"phishing tool detection",[],{},{"nodeType":1293,"value":37,"marks":4668,"data":4669},[],{},{"nodeType":1486,"data":4671,"content":4672},{},[4673],{"nodeType":1293,"value":4674,"marks":4675,"data":4676},"SSO password protection",[],{},{"nodeType":1294,"data":4678,"content":4679},{},[4680],{"nodeType":1293,"value":4681,"marks":4682,"data":4683},"Prevent employees from reusing their corporate SSO password on any page that doesn’t belong to the identity provider, including phishing sites. This means that even if that employee was the first person to get phished using a new attacker site, Push still detects it and blocks it.",[],{},{"nodeType":1294,"data":4685,"content":4686},{},[4687,4691,4695,4698,4702,4706,4711],{"nodeType":1293,"value":4688,"marks":4689,"data":4690},"Customize the message that end-users see in ",[],{},{"nodeType":1293,"value":4628,"marks":4692,"data":4694},[4693],{"type":1505},{},{"nodeType":1293,"value":1763,"marks":4696,"data":4697},[],{},{"nodeType":1293,"value":4636,"marks":4699,"data":4701},[4700],{"type":1505},{},{"nodeType":1293,"value":4703,"marks":4704,"data":4705}," mode, or start out in ",[],{},{"nodeType":1293,"value":4707,"marks":4708,"data":4710},"Monitor",[4709],{"type":1505},{},{"nodeType":1293,"value":4712,"marks":4713,"data":4714}," mode to catch any false positives before you enforce the control.",[],{},{"nodeType":1294,"data":4716,"content":4717},{},[4718],{"nodeType":1293,"value":4719,"marks":4720,"data":4721},"This feature supports the following identity providers: Okta, Microsoft 365, Google Workspace, JumpCloud, Duo, and Ping Identity.",[],{},{"nodeType":1294,"data":4723,"content":4724},{},[4725],{"nodeType":1293,"value":4726,"marks":4727,"data":4728},"Push will also emit a webhook event when an SSO password is used, and if an employee clicks through the warning screen.",[],{},{"nodeType":2399,"data":4730,"content":4734},{"target":4731},{"sys":4732},{"id":4733,"type":2396,"linkType":2397},"25c8M2gWYFST7yYxGEji2s",[],{"nodeType":1294,"data":4736,"content":4737},{},[4738,4741,4750],{"nodeType":1293,"value":4654,"marks":4739,"data":4740},[],{},{"nodeType":4477,"data":4742,"content":4746},{"target":4743},{"sys":4744},{"id":4745,"type":2396,"linkType":2397},"6FYHbkcRUrtznPo7RarRsz",[4747],{"nodeType":1293,"value":4674,"marks":4748,"data":4749},[],{},{"nodeType":1293,"value":37,"marks":4751,"data":4752},[],{},{"nodeType":1486,"data":4754,"content":4755},{},[4756],{"nodeType":1293,"value":4757,"marks":4758,"data":4759},"URL blocking",[],{},{"nodeType":1294,"data":4761,"content":4762},{},[4763],{"nodeType":1293,"value":4764,"marks":4765,"data":4766},"When you find malicious sites you want to block, such as when responding to a phishing incident, add them to a blocklist and prevent other employees from accessing those sites. ",[],{},{"nodeType":1294,"data":4768,"content":4769},{},[4770],{"nodeType":1293,"value":4771,"marks":4772,"data":4773},"URL blocking can be used in tandem with Push’s anti-phishing controls, so that as you discover malicious sites, you can block them from a central blocklist. This offers a kind of herd immunity where you can block other users from visiting a malicious site as soon as you have a single incident.",[],{},{"nodeType":1294,"data":4775,"content":4776},{},[4777],{"nodeType":1293,"value":4778,"marks":4779,"data":4780},"You can programmatically manage the blocklist using the Push REST API or sync to other threat intelligence sources you consume.",[],{},{"nodeType":2399,"data":4782,"content":4786},{"target":4783},{"sys":4784},{"id":4785,"type":2396,"linkType":2397},"3m00cFiUDAnddsOBOpkeiZ",[],{"nodeType":1294,"data":4788,"content":4789},{},[4790,4793,4802],{"nodeType":1293,"value":4654,"marks":4791,"data":4792},[],{},{"nodeType":4477,"data":4794,"content":4798},{"target":4795},{"sys":4796},{"id":4797,"type":2396,"linkType":2397},"P0coHgQAdRL0YTu4Rwd4z",[4799],{"nodeType":1293,"value":4757,"marks":4800,"data":4801},[],{},{"nodeType":1293,"value":37,"marks":4803,"data":4804},[],{},{"nodeType":1486,"data":4806,"content":4807},{},[4808],{"nodeType":1293,"value":4809,"marks":4810,"data":4811},"Session token theft detection",[],{},{"nodeType":1294,"data":4813,"content":4814},{},[4815],{"nodeType":1293,"value":4816,"marks":4817,"data":4818},"Inject a unique marker provided by the Push browser agent into the User Agent string of sessions that occur in browsers enrolled in Push. ",[],{},{"nodeType":1294,"data":4820,"content":4821},{},[4822],{"nodeType":1293,"value":4823,"marks":4824,"data":4825},"By analyzing logs from your IdP, you can identify activity from the same session that both has the Push marker and that lacks the marker. This can only ever happen when a session is extracted from a browser and maliciously imported into a different browser.",[],{},{"nodeType":1294,"data":4827,"content":4828},{},[4829],{"nodeType":1293,"value":4830,"marks":4831,"data":4832},"This is a high-fidelity signal that a session token has been stolen and is being used.",[],{},{"nodeType":2399,"data":4834,"content":4838},{"target":4835},{"sys":4836},{"id":4837,"type":2396,"linkType":2397},"43rk3TCqN269Vr2YWT4llP",[],{"nodeType":1294,"data":4840,"content":4841},{},[4842,4845,4855],{"nodeType":1293,"value":4654,"marks":4843,"data":4844},[],{},{"nodeType":4477,"data":4846,"content":4850},{"target":4847},{"sys":4848},{"id":4849,"type":2396,"linkType":2397},"1UMZdjyNQt4Y7NBb2wuK4L",[4851],{"nodeType":1293,"value":4852,"marks":4853,"data":4854},"session token theft detection",[],{},{"nodeType":1293,"value":37,"marks":4856,"data":4857},[],{},{"nodeType":1486,"data":4859,"content":4860},{},[4861],{"nodeType":1293,"value":4862,"marks":4863,"data":4864},"App banners",[],{},{"nodeType":1294,"data":4866,"content":4867},{},[4868],{"nodeType":1293,"value":4869,"marks":4870,"data":4871},"Add guardrails to employees’ use of SaaS apps with in-browser app banner messages you customize with your own text. You can require users to acknowledge having read a message before they can access an app, or even require them to submit a reason for using an app before they can log in.",[],{},{"nodeType":2399,"data":4873,"content":4877},{"target":4874},{"sys":4875},{"id":4876,"type":2396,"linkType":2397},"5nEKTBz6mauHI5mg8jB4ea",[],{"nodeType":1294,"data":4879,"content":4880},{},[4881,4884,4894],{"nodeType":1293,"value":4654,"marks":4882,"data":4883},[],{},{"nodeType":4477,"data":4885,"content":4889},{"target":4886},{"sys":4887},{"id":4888,"type":2396,"linkType":2397},"2ZpKnuljaUH0jzVaae4SMN",[4890],{"nodeType":1293,"value":4891,"marks":4892,"data":4893},"app banners",[],{},{"nodeType":1293,"value":37,"marks":4895,"data":4896},[],{},{"nodeType":1376,"data":4898,"content":4899},{},[4900],{"nodeType":1293,"value":4901,"marks":4902,"data":4903},"Choose your own adventure",[],{},{"nodeType":1294,"data":4905,"content":4906},{},[4907],{"nodeType":1293,"value":4908,"marks":4909,"data":4910},"Want to do something creative? We've got you covered. Push provides a wealth of raw telemetry via the Push REST API and webhook events. Use this data to build both proactive and reactive security operations workflows, or add missing context to other sources, such as your IdP, application, or endpoint logs.",[],{},{"nodeType":1294,"data":4912,"content":4913},{},[4914],{"nodeType":1293,"value":4915,"marks":4916,"data":4917},"You can use this browser telemetry to:",[],{},{"nodeType":2237,"data":4919,"content":4920},{},[4921,4936,4951],{"nodeType":2165,"data":4922,"content":4923},{},[4924],{"nodeType":1294,"data":4925,"content":4926},{},[4927,4932],{"nodeType":1293,"value":4928,"marks":4929,"data":4931},"Harden identities and reduce account compromise",[4930],{"type":1505},{},{"nodeType":1293,"value":4933,"marks":4934,"data":4935},", such as alerting you when passwords are identified in public data breaches or when employees are using an unapproved app or when an SSO app is accessed via local account.",[],{},{"nodeType":2165,"data":4937,"content":4938},{},[4939],{"nodeType":1294,"data":4940,"content":4941},{},[4942,4947],{"nodeType":1293,"value":4943,"marks":4944,"data":4946},"Monitor for suspicious activity or high-risk changes",[4945],{"type":1505},{},{"nodeType":1293,"value":4948,"marks":4949,"data":4950},", such as checking for MFA method changes, or flagging when employees reuse corporate SSO passwords or visit sites running phishing malware.",[],{},{"nodeType":2165,"data":4952,"content":4953},{},[4954],{"nodeType":1294,"data":4955,"content":4956},{},[4957,4962],{"nodeType":1293,"value":4958,"marks":4959,"data":4961},"Investigate indicators of compromise",[4960],{"type":1505},{},{"nodeType":1293,"value":4963,"marks":4964,"data":4965},", such as correlating login events with platform logs, searching for recent signups to risky apps, or identifying post-compromise lateral movement opportunities.",[],{},{"nodeType":1294,"data":4967,"content":4968},{},[4969],{"nodeType":1293,"value":4970,"marks":4971,"data":4972},"In the “make my life easier” category, you can also use Push telemetry to:",[],{},{"nodeType":2237,"data":4974,"content":4975},{},[4976,4995,5014,5029],{"nodeType":2165,"data":4977,"content":4978},{},[4979],{"nodeType":1294,"data":4980,"content":4981},{},[4982,4986,4991],{"nodeType":1293,"value":4983,"marks":4984,"data":4985},"Automate a workflow ",[],{},{"nodeType":1293,"value":4987,"marks":4988,"data":4990},"showing you all the accounts and apps used by an offboarded employee",[4989],{"type":1505},{},{"nodeType":1293,"value":4992,"marks":4993,"data":4994},", and their account login methods.",[],{},{"nodeType":2165,"data":4996,"content":4997},{},[4998],{"nodeType":1294,"data":4999,"content":5000},{},[5001,5005,5010],{"nodeType":1293,"value":5002,"marks":5003,"data":5004},"Automate a workflow to",[],{},{"nodeType":1293,"value":5006,"marks":5007,"data":5009}," revoke licenses on SaaS after a period of inactivity",[5008],{"type":1505},{},{"nodeType":1293,"value":5011,"marks":5012,"data":5013},", saving money.",[],{},{"nodeType":2165,"data":5015,"content":5016},{},[5017],{"nodeType":1294,"data":5018,"content":5019},{},[5020,5025],{"nodeType":1293,"value":5021,"marks":5022,"data":5024},"Build an approved apps list in your company wiki",[5023],{"type":1505},{},{"nodeType":1293,"value":5026,"marks":5027,"data":5028},", synced from Push’s source of truth.",[],{},{"nodeType":2165,"data":5030,"content":5031},{},[5032],{"nodeType":1294,"data":5033,"content":5034},{},[5035,5040],{"nodeType":1293,"value":5036,"marks":5037,"data":5039},"Force-reset an IdP password if Push finds a compromised password",[5038],{"type":1505},{},{"nodeType":1293,"value":5041,"marks":5042,"data":5043}," on an employee account.",[],{},{"nodeType":1294,"data":5045,"content":5046},{},[5047,5051,5055],{"nodeType":1293,"value":5048,"marks":5049,"data":5050},"To help you visualize and plan how you will use this telemetry, Push also provides an ",[],{},{"nodeType":1293,"value":4533,"marks":5052,"data":5054},[5053],{"type":1505},{},{"nodeType":1293,"value":5056,"marks":5057,"data":5058}," page in the admin console with a rolling 7-day snapshot of all the events in your environment.",[],{},{"nodeType":2399,"data":5060,"content":5064},{"target":5061},{"sys":5062},{"id":5063,"type":2396,"linkType":2397},"2a3bJ5sN8dJ0c1kQtZiag7",[],{"nodeType":1294,"data":5066,"content":5067},{},[5068],{"nodeType":1293,"value":5069,"marks":5070,"data":5071},"The Events page can help you see real-world examples, understand the attributes of each event, and gauge event volume before you ingest data into a SIEM or other platform.",[],{},{"nodeType":1376,"data":5073,"content":5074},{},[5075],{"nodeType":1293,"value":5076,"marks":5077,"data":5078},"What if you don’t have a SIEM?",[],{},{"nodeType":1294,"data":5080,"content":5081},{},[5082],{"nodeType":1293,"value":5083,"marks":5084,"data":5085},"While you’d need a SIEM for writing detections and performing log correlations, you can still get a lot of value out of Push telemetry if you don’t have one.",[],{},{"nodeType":1294,"data":5087,"content":5088},{},[5089],{"nodeType":1293,"value":5090,"marks":5091,"data":5092},"Use Push’s webhook events to send alerts directly to your Slack, Teams, or other chat platform, or build workflows that hook into your ticketing system or SOAR platform.",[],{},{"nodeType":1294,"data":5094,"content":5095},{},[5096,5100,5107],{"nodeType":1293,"value":5097,"marks":5098,"data":5099},"Review our ",[],{},{"nodeType":1332,"data":5101,"content":5102},{"uri":4518},[5103],{"nodeType":1293,"value":5104,"marks":5105,"data":5106},"webhooks documentation",[],{},{"nodeType":1293,"value":5108,"marks":5109,"data":5110}," for a list of events.",[],{},{"nodeType":1376,"data":5112,"content":5113},{},[5114],{"nodeType":1293,"value":5115,"marks":5116,"data":5117},"Find out more",[],{},{"nodeType":1294,"data":5119,"content":5120},{},[5121,5125,5132],{"nodeType":1293,"value":5122,"marks":5123,"data":5124},"If you want to see Push in action, ",[],{},{"nodeType":1332,"data":5126,"content":5128},{"uri":5127},"/demo/",[5129],{"nodeType":1293,"value":3636,"marks":5130,"data":5131},[],{},{"nodeType":1293,"value":5133,"marks":5134,"data":5135},". We’ll be happy to show you these features, along with how we discover all the apps your employees are using — even the ones not behind SSO.",[],{},"Introducing set-and-forget controls that stop real-world identity attacks","Enable detections and interventions in the browser using Push’s new security controls.","2024-07-02T00:00:00.000Z","introducing-set-and-forget-controls-that-stop-real-world-identity-attacks",{"items":5141},[5142,5146],{"sys":5143,"name":5145},{"id":5144},"5jk0kqjSdSK2L0YiistQjY","Release notes",{"sys":5147,"name":1310},{"id":1309},{"items":5149},[5150],{"fullName":5151,"firstName":5152,"jobTitle":3670,"profilePicture":5153},"Kelly Davenport","Kelly",{"url":5154},"https://images.ctfassets.net/y1cdw1ablpvd/1hi8bEuVfn5sF57LivAq6d/9a3b82426c697d765e2e450e33a18424/kelly_profile_pic.jpeg",{"items":5156},[5157],{"fullName":4338,"firstName":4339,"jobTitle":4340,"profilePicture":5158},{"url":4342},"content:blog:the-saas-attack-matrix-one-year-on.json","json","content","blog/the-saas-attack-matrix-one-year-on.json","blog/the-saas-attack-matrix-one-year-on",1776359987489]