Browser-Based Phishing

The Rise of Browser-Based Phishing Attacks and Expectations for 2024

The digital landscape of 2024 continues to be fraught with cybersecurity challenges, notably the surge in browser-based phishing attacks. A recent report1 highlights a startling 198% increase in such attacks, emphasizing the evolution of phishing threats into more sophisticated and evasive forms.

2023: A Year of Alarming Growth

Last year witnessed an unprecedented spike in browser-based phishing attacks, with 30% exhibiting advanced, evasive techniques. This surge is not just about quantity; the nature of these attacks has become increasingly sophisticated, leveraging tactics like smishing, adversary-in-the-middle (AiTM) frameworks, and multi-factor authentication (MFA) bypass strategies.

What Makes Modern Phishing Attacks Different?

The traditional concept of phishing has undergone a dramatic transformation. Modern phishing attempts are dynamic, adept at evading standard security measures, and increasingly automated using GenAI tools. These attacks are no longer limited to emails but have expanded to cloud-sharing platforms and web applications.

The 2024 Outlook

Looking ahead to the rest of 2024, we can expect these trends to continue, if not intensify. The report’s findings suggest:

Increased Volume and Sophistication: Phishing attacks will likely grow in frequency and complexity.

Evasive Techniques: Attackers will continue to innovate, making detection and prevention more challenging.

Expanding Targets: Small and medium enterprises, previously less targeted, may see a rise in phishing attempts.

Preparing for the Threat

The escalation of browser-based phishing attacks necessitates a proactive approach to cybersecurity. Enterprises need to reassess their security strategies, focusing on advanced detection mechanisms and user education. Emphasizing browser security and adopting comprehensive solutions capable of identifying and mitigating sophisticated attacks will be crucial.


The state of browser security in 2024 is a testament to the ever-evolving nature of cyber threats. With phishing attacks becoming more sophisticated and evasive, staying ahead of these threats requires constant vigilance, updated security practices, and a thorough understanding of the evolving digital threat landscape.


Browser Based Security

Conceal’s Year in Review: Innovations, Challenges, and Successes

As we bid farewell to another eventful year, it’s time to reflect on the milestones, challenges, and triumphs that have shaped Conceal over the past twelve months. This year has been a testament to our commitment to advancing cybersecurity and protecting our clients from ever-evolving digital threats. 

Milestones Achieved

Expanding Our Product Range

Launch of New Features: This year saw the introduction of a series of groundbreaking features and products at Conceal. Notably, we achieved extensions for Firefox and Microsoft Edge, significantly broadening our browser security coverage. We also saw the launch of advanced tech alliances and integrations, enhancing user security and experience. Some of our most notable and impactful highlights include coverage for the Firefox browser, an innovative end-user information panel, a device-based installation process, and MSI installer package support.

SherpaAI Engine: We proudly upgraded to the SherpaAI engine, a leap forward in real-time web page analysis. This engine is designed to understand patterns in behavior, structure, and content, elevating ConcealBrowse’s analytic capabilities. 

Upgrades to Existing Features: This year, in additional to releasing our SherpaAI engine, we enhanced the end-user experience with upgraded dashboard elements, search by device labels, and notable integrations into platforms like Connectwise, Datto, Splunk, Devo, and SentinelOne.

Growth and Expansion

New Partnerships: This year marked the forging of significant partnerships, contributing immensely to Conceal growth. Each partnership brought unique strengths to our platform. These partnerships include Thousand Guards, MorugaIT, Grove, Kompingo, Hyprfire, Brigantia, NobleTec, Binary Defense, SentryMark, White Rock Cybersecurity, CyberForce Security and Next Generation Security.  

Expansion into New Markets: Our venture into new markets has been a resounding success, particularly in the MSP sector. We’ve seen a 450% quarter-over-quarter growth from CYQ2 to Q3, with similar trends projected for CYQ4. Key expansions included entering the Japanese market with SentryMark, significant growth in the UK/EU through partnerships with NGS, Kompingo, and Brigantia, and establishing our presence in New Zealand.

Conceal Community Initiatives: The launch of a free NFR Community for MSPs and offering 5 Free licenses for Enterprises has proven to be a successful strategy, continually attracting more users.

Overcoming Challenges

Navigating the Cybersecurity Landscape

This year, the cybersecurity world has been fraught with challenges, particularly the rise in ransomware and credential theft. Conceal has proactively adapted to these threats, ensuring robust protection for our clients.

Internal Growth and Development

Our internal structure saw significant changes, especially with the transition of BDRs to ISRs. This internal development has been pivotal in managing our rapid growth, particularly in the MSP sector.

Success Stories

Empowering Users and Organizations with ConcealBrowse

As Conceal celebrates a year of significant achievements and advancements in cybersecurity, we’re proud to share some remarkable success stories that highlight our impact:

Enhancing User Security Despite Training Limitations: A key testament to ConcealBrowse’s effectiveness comes from an appreciative user: “I like that ConcealBrowse is an antidote to the failure of people to follow their Security Awareness Training. They click on email links and search result links despite any training. Especially, I like that ConcealBrowse adds a critical layer of protection against the growing threat of ransomware.” This feedback underscores our solution’s ability to compensate for human error and provide a robust defense against emerging cyber threats.

Collaborative Success with VAR Partnerships: Our collaboration with Value-Added Resellers (VARs) has been particularly fruitful. One Account Executive/Marketing Events Coordinator shares, “The team at Conceal is very collaborative, flexible, and adaptable, fitting our customers’ needs across various verticals. They’ve gone out of their way for account mapping and solution overviews, leading to co-selling opportunities.” This partnership has been pivotal in scaling our solutions to businesses of all sizes, proving the adaptability and effectiveness of ConcealBrowse.

Transformative Impact on Toyota Tanzania: At Toyota Tanzania, IT Manager Abdulaziz Raudha hails ConcealBrowse as a game-changer: “Conceal’s Zero Trust approach and AI-driven technology offered a game-changing paradigm in cybersecurity… You can relax at home knowing you are secure.” The implementation of our solutions has significantly strengthened their cybersecurity posture, showcasing the power of AI in contemporary digital defense.

City of St. Peters – A Model for Municipal Cybersecurity: The City of St. Peters’ integration of ConcealBrowse into their IT infrastructure demonstrates our solution’s versatility and effectiveness in public sector environments. An IT administrator from the city lauds the product: “ConcealBrowse’s innovative approach to cybersecurity… has significantly enhanced our network security while maintaining user-friendliness and minimal administrative overhead.” This case exemplifies our commitment to providing solutions that are both powerful and user-friendly.

Awards and Recognitions

This year, Conceal was honored with several awards, including being a finalist in the CISO Choice Awards for Endpoint and Email Security, winning the Black Unicorn Awards, and being named MSP Today Product of the Year. Additionally, we received accolades for the Best New Solution and Most Innovative Solution at the ChannelPro SMB Forum. 

Looking Ahead: The Future of Conceal

Upcoming Innovations

Looking forward, we are excited about further innovations, including greater API support, mobile device protection, support for Safari, enhanced site isolation information, and a user feedback system. We are also focusing on expanding our Inside Sales team in Augusta, GA, and the UK.

Commitment to Excellence

Our unwavering commitment to excellence remains at the forefront of our endeavors. We continue to innovate and lead in the fight against cyber threats, ensuring the best possible solutions for our clients.

As we reflect on this year, our gratitude extends to our customers, partners, and employees whose support has been invaluable. Conceal remains dedicated to its mission, continually striving for excellence in cybersecurity. Here’s to a year of challenges turned into opportunities and milestones that pave the way for a safer digital future.

Navigating the Cyber Seas with Conceal’s AI Engine: A Deep Dive into AI-Powered Browser Security

Following our exploration of the vital role of Artificial Intelligence (AI) in browser security strategies, it’s time to delve into a specific, cutting-edge solution: ConcealBrowse’s AI engine. In a world where cyber threats are increasing and becoming more sophisticated, ConcealBrowse stands as a beacon of innovation, demonstrating how AI integration in browser security is beneficial and essential.

SherpaAI: The Vanguard of AI-Driven Browser Security

ConcealBrowse exemplifies the practical application of AI in combating cyber threats. It’s not just a tool; it’s an intelligent ally in the continuous battle against cybercriminals.

The Rising Tide of Cyber Threats

In an era where digital threats are rampant, ConcealBrowse provides an answer to the increasing complexity and frequency of these threats. Traditional security systems, often reactive and rule-based, fall short against the dynamic nature of modern cyber threats. ConcealBrowse’s AI-driven approach is not just reactive but proactive, identifying and mitigating risks before they become crises.

Predictive Risk Mitigation

ConcealBrowse excels in predictive risk mitigation. By analyzing vast amounts of data, it identifies potential threats and behavioral anomalies, often alerting users before they even encounter the risk. This preemptive approach is crucial in a digital landscape where new threats emerge rapidly. 

Dynamic Threat Response

ConcealBrowse responds dynamically to threats, offering real-time protection. Its ability to analyze website behaviors and scripts instantaneously allows it to flag and isolate malicious activity effectively, ensuring users are protected at every moment of their online journey.

Enhanced Accuracy and Efficiency

One of ConcealBrowse’s standout features is its enhanced accuracy in threat detection, significantly reducing false positives. This precision strengthens security and enhances the user experience by minimizing disruptions and unnecessary isolations.

Real-World Applications: ConcealBrowse in Action

ConcealBrowse isn’t a theoretical solution; it’s a practical one. Imagine browsing online and unknowingly encountering a phishing link. With ConcealBrowse, this threat is identified and neutralized before you infect your system. Or, consider downloading a file that might be harmful. ConcealBrowse isolates and analyzes it in a secure environment, ensuring safety without hindering your workflow.

AI as a Necessity, Not a Luxury

The integration of AI into browser security, exemplified by ConcealBrowse, has transitioned from a luxury to a necessity. In the complex cyber landscape of today, the fusion of AI with traditional security measures is critical to staying ahead of threats. 

Charting the Course with ConcealBrowse

As we navigate the challenging seas of cyber threats, ConcealBrowse stands as a crucial component of any robust cybersecurity strategy. It’s time for organizations and individuals to embrace ConcealBrowse as a tool and an essential ally in the ongoing battle against cyber threats. The future of browser security is here, and it’s powered by AI.

Embracing the Future: The Crucial Role of Artificial Intelligence in Browser Security Strategies

We all have heard that traditional security measures are no longer sufficient in the ever-evolving landscape of cyber threats. Unfortunately, it’s often difficult to find a straightforward answer to how we address this.  As cybercriminals become more sophisticated, leveraging advanced technologies to bypass conventional defenses, it’s imperative for organizations and individuals to stay a step ahead. One of the most promising solutions to address this reality is Artificial Intelligence (AI) being a part of every aspect of an organization’s cybersecurity program. In browser security, the use of AI is not just beneficial but essential.  

The Rising Tide of Cyber Threats

While bringing unparalleled convenience and connectivity, the digital age has also opened the floodgates to a range of cyber threats on the internet. From basic phishing scams to advanced persistent threats, the risks associated with online browsing are increasing in complexity and frequency. The traditional, rule-based security systems are struggling to keep up, often reacting to threats rather than proactively preventing them.

The AI Advantage in Browser Security

With its ability to learn and adapt, AI presents a game-changing solution in the realm of browser security. Unlike static security measures, AI-driven systems continuously evolve, learning from new threats and adapting their defenses accordingly. This proactive approach to security is crucial in a landscape where threats are constantly emerging and evolving.

  1. Predictive Risk Mitigation

AI systems can analyze vast amounts of data to identify potential threats before they materialize. By understanding patterns and anomalies in browsing behavior, AI can predict and mitigate risks, often before the user is even aware of them.

  1. Dynamic Threat Response

AI-driven browser security can respond dynamically to emerging threats. It can analyze the behavior of websites and scripts in real-time, detecting and preventing malicious activity instantly, ensuring real-time protection.

  1. Enhanced Accuracy and Efficiency

AI enhances the accuracy of threat detection with fewer false positives. This bolsters security and improves user experience by reducing unnecessary disruptions or isolations.  

Real-World Applications: AI in Action

Imagine a scenario where your browser, protected by AI, identifies a phishing attempt before you click on a suspicious link, or a system that automatically isolates a potentially harmful download, analyzing it in a secure environment before it can do any harm. These are not futuristic fantasies but real applications of AI in browser security that are available today.

AI as a Necessity, Not a Luxury

Incorporating AI into browser security strategies is no longer a luxury but a necessity. As we navigate the complex cyber landscape, the fusion of AI with traditional security measures will be vital to staying ahead of threats. It’s time for organizations and individuals to embrace AI as a critical component of their cybersecurity arsenal.

ConcealBrowse Analysis: Mitigating Emerging Cyber Threats in the Tech Industry

A forward-thinking technology company recognizing the evolving nature of cyber threats, strategically integrated ConcealBrowse into its cybersecurity framework. This move proved its worth when ConcealBrowse successfully isolated a high-risk domain, mograppido[.]com, that posed a significant threat to the company’s network.

ConcealBrowse in Action: Identifying and Isolating a Deceptive Threat

The vigilance of ConcealBrowse was demonstrated when it identified and isolated the domain mograppido[.]com on one of the company’s endpoints. This domain was flagged due to its associations with phishing, malware, and a DNS server known for malicious activities.

Indicators of Compromise (IOCs) Identified:

DOMAIN: mograppido[.]com

Associated with phishing and malware activities

Linked to a DNS server known for malicious activities

In-Depth Analysis: Understanding the Threat

Our analysis revealed that mograppido[.]com utilized basic social engineering techniques. It tricked users into enabling browser alerts, which could then be exploited to deliver spam advertising or links to other malicious sites or malware. This subtle tactic underscores the need for sophisticated cybersecurity measures capable of detecting and neutralizing such deceptive threats.

How Does Isolation Work?

ConcealBrowse’s isolation mechanism played a critical role in mitigating this threat. When a high-risk domain is detected, ConcealBrowse opens the site in a secure, isolated session. This approach ensures that any harmful content or actions are confined, safeguarding the user’s device and the wider network.

The Impact: Safeguarding the Technology Company

The intervention of ConcealBrowse in isolating mograppido[.]com was invaluable. It not only protected the company’s endpoints from potential compromise but also provided crucial insights into the tactics employed by cybercriminals, enhancing the company’s overall cybersecurity posture.


This case study illustrates the critical role of advanced cybersecurity tools like ConcealBrowse in protecting against sophisticated cyber threats. Its ability to detect, analyze, and isolate threats based on advanced metrics such as proximity is crucial for modern businesses, especially in the technology sector, where digital threats constantly evolve. ConcealBrowse is a pillar of strength in the cyber defense arsenal, enabling companies to navigate the digital domain confidently and securely.


ConcealBrowse Analysis: Thwarting Advanced Cyber Threats in the Chemical Industry

Facing an ever-increasing cyber threat landscape, an integrated chemical and equipment company recognized the need for enhanced cybersecurity measures and strategically invested in ConcealBrowse. This decision proved crucial when ConcealBrowse identified a sophisticated threat that other security systems failed to detect.

ConcealBrowse in Action: Detecting and Analyzing a Complex Threat

ConcealBrowse’s advanced capabilities came to the forefront when it detected a locally-hosted HTML file named “Salary-Review copy[.]htm.” This file, designed to mimic a legitimate Microsoft login page for credential harvesting, was unique in its approach, bypassing typical email-based phishing methods.

Indicators of Compromise (IOCs) Identified: 

DOMAIN: ziralanded[.]xyz

IPV4: 45.93.139[.]225

SHA256 Hash: 2ae1cdc5d32960d2a985a0e3a9437428d760c680d5a6a3c1ce23f1b5470c5f1a

Deep Dive: Analysis

Our analysis revealed the file’s deceptive nature, utilizing local and internet-based resources. Crucially, it accessed ziralanded[.]xyz, likely controlled by attackers and hosted on infrastructure not immediately recognizable as malicious. This sophistication in avoiding detection underscores the evolving threat landscape.

Isolation at Work

Upon detecting the file, ConcealBrowse’s isolation mechanism was activated. This feature opens potential threats in a remote, isolated session, ensuring any harmful actions are contained and the user’s actual device remains secure.

The Valuable Outcomes

This incident highlighted ConcealBrowse’s critical role in the company’s cybersecurity framework. By detecting and analyzing a sophisticated threat, ConcealBrowse not only protected the company’s network but also provided valuable insights into the tactics used by modern cyber attackers.


This case study underscores the importance of advanced cybersecurity solutions like ConcealBrowse in the modern digital landscape. Its ability to adapt and respond to new types of threats, including those that bypass traditional security measures, is invaluable. As the threat landscape evolves, ConcealBrowse continues to be an essential tool for organizations seeking to protect their digital assets and maintain robust cybersecurity defenses.


ConcealBrowse Analysis: The Hidden Risks of Shared Hosting


In the intricate cybersecurity landscape, where threats evolve daily, tools like ConcealBrowse provide a much-needed safety net. A recent threat analysis for a hedge fund highlighted how ConcealBrowse’s smart decision engine leverages its “proximity” metric to identify potential threats, even when not directly implicated as malicious.

Decoding the Proximity Alert

In this instance, the URL in question was malaproject[.]com. At first glance, there seemed to be no direct evidence pointing to it being harmful. However, ConcealBrowse’s decision engine isolated the URL based on its proximity principle.

The Shared Hosting Concern

Further analysis revealed that malaproject[.]com was mapped to the IP address 192.232.223[.]30, registered with UnifiedLayer—a shared hosting service. Over the past two years, 22 URLs associated with the same IP address were flagged as malicious on various cyber threat intelligence feeds.

This discovery underscores a prevalent concern: websites hosted on shared services face increased risks. Shared hosting platforms might be cost-effective and resourceful for many, but they also become a hotbed for threats, as one compromised site can cast a shadow on others sharing the same IP.

ConcealBrowse: A Shield against Hidden Dangers

With shared hosting being a common choice for many online ventures, the risks associated with “bad neighbors” become more palpable. If a site on shared hosting is compromised, its neighboring sites become risky by association, given their proximity to the malicious infrastructure.

That’s where ConcealBrowse comes in. By detecting the elevated risk due to such associations, it ensures the site is isolated, preventing potential threats from causing harm. The “more work, less risk” mantra of ConcealBrowse captures its essence—it continually identifies and mitigates hidden dangers, allowing businesses to operate without disruption.


Shared hosting may be a double-edged sword, offering benefits but with hidden cybersecurity challenges. Tools like ConcealBrowse emphasize the importance of staying one step ahead, protecting organizations from not just direct threats but also from risks arising from their online environment. In an age of complex cyber threats, it’s no longer just about direct attacks but also about understanding the landscape and associations that might indirectly expose one to vulnerabilities. ConcealBrowse’s technology stands as a testament to the evolving nature of digital protection in today’s world.



The “Non-Subscribe” Attack: How ConcealBrowse Shields the Human Layer

The Deceptive Face of “Unsubscribe” 

It’s no longer a surprise that the cyber threat landscape is continuously evolving, and cybercriminals are relentlessly innovating ways to infiltrate and exploit unsuspecting users. The most recent deceptive method brought to our attention is the “Non-Subscribe” attack by our partner mSOC. This ploy deceives users by providing an “Unsubscribe” button in spam emails, drawing them into a trap under the facade of halting unwanted communications. 

Understanding the “Non-Subscribe” Attack

The Deceptive Email: Users receive a spam email, often with a subject line that’s attention-grabbing or concerning. While the topic of the email might seem irrelevant, the purpose isn’t the content itself, but the “Unsubscribe” button embedded within.

The Trap: Clicking on “Unsubscribe” redirects users to a web page. This page may be eerily identical or closely resemble a legitimate-looking platform, as seen in the shared screenshot. Unsuspecting users, believing they are on a genuine page, enter their email address to unsubscribe.


Figure 1: The Suspicious Unsubscribe Redirect


The Motive: Contrary to what one might think, these users never subscribed to the emails in the first place. By entering their email address, they inadvertently validate their email address for cybercriminals. Moreover, the “Unsubscribe” button isn’t just for email harvesting – it has been leveraged for other mischievous activities as well.


In the case of this attack, an examination from mSOC of the Proofpoint log entry marked “SPAM” affirms the malicious nature of such emails. The payload URL embedded within these emails further underscores the need for caution.


 Figure 2: Conceal’s Analysis of the Site in Question

ConcealBrowse: Your Protection Against Deceptive Tactics

Now, while technical solutions to detect and prevent such threats are paramount, it’s equally crucial to shield the human layer – the end-users. This is where ConcealBrowse steps in.

Real-time Alerts: If a user accidentally clicks on a deceptive link, ConcealBrowse offers real-time alerts, warning them about the potential threat while proactively isolating it in an environment clear of the organization’s network.

Layered Security: By integrating machine learning algorithms into the AI-powered detection and prevention engine, ConcealBrowse identifies and blocks malicious sites and payloads, protecting users even if they mistakenly land on risky sites.

Human-Centric Design: Recognizing that humans are the most vulnerable link in the security chain, ConcealBrowse has been designed keeping the user in mind. Its intuitive interface, combined with its potent backend security, ensures that users feel protected without feeling overwhelmed.

Final Thoughts

In the ongoing battle against cyber threats, it’s not enough to have just technical solutions in place. Protecting the human layer, the most targeted and vulnerable layer, is of utmost importance. The “Non-Subscribe” attack is just a glimpse into the deceptive methods employed by cybercriminals. With ConcealBrowse, you’re not just relying on technology to keep threats at bay; you’re empowering every individual to be a formidable line of defense against these ever-evolving threats.

Introducing ConcealBrowse for Firefox Users!

As we continue to expand our solution here at Conceal to best fit our customer needs, we are pleased to announce that ConcealBrowse is now available for Firefox! In our pursuit to make the internet a safer place, we’ve extended our protective umbrella to one more browser – Firefox.

You might already be familiar with our powerful detection and prevention capabilities that function seamlessly with Chromium-based browsers like Chrome, Microsoft Edge, and Brave. Now, all these robust features, powered by the advanced SherpaAI engine, are at the disposal of Firefox users, too!

How to Get ConcealBrowse on Firefox

Installing ConcealBrowse on Firefox is a breeze.  We have a simple three step process that can get your browser running securely in no time at all.  The installation process of our browser extension is seamless and requires little user interaction. 


Can I choose the browsers I want to support with ConcealBrowse?

Absolutely! You can tailor your installation to your needs. Instructions on how to do this are available here.


Can I deploy Firefox using an RMM or MDM solution?

Yes, our ConcealBrowse installation can be integrated into your RMM or MDM solution for a hassle-free deployment.


Is the extension available in the Firefox store?

No, the extension is signed by Firefox but we’ve opted to host it independently.


What about Mac users? Can they install Firefox?



Your Feedback Matters

We’re always striving to better our offerings. And who better to guide us than you? As we continue to work on extending our solution, let us know what else you would like to see!

Happy (and safe) browsing to all Firefox users!

ConcealBrowse: A Communications Company’s First Line of Defense

Investing in the Future: ConcealBrowse and the Communications Giant

In an era where every click could lead to a potential security breach, a prominent communications company took a proactive approach. Recognizing the ever-growing spectrum of cyber threats, the company invested in ConcealBrowse. This cybersecurity solution would soon prove its worth in an unexpected way.

The Threat Unearthed: Proximity and IOCs

ConcealBrowse stumbled upon a domain which was flagged on one of the company’s endpoints. But why was this particular domain flagged?

The answer lies in the analysis. Even though there were no direct signs pointing towards the domain being malicious, it was found in proximity to other known malevolent infrastructures. A deeper dive showed that this site shared ad tracking IDs with several malicious sites. Furthermore, there were instances where malware had referred to this site.

The Power of Proximity in Analysis

But what does proximity really mean in the cybersecurity world? Conceal’s Proximity metric provides an answer. It gauges the risk posed by a website linked to infrastructures that have been associated with malicious activities. In this instance, given that the IP address associated with the suspicious domain had been used for a significant number of malicious sites, its proximity risk was deemed high.

Isolation: The Knight in Shining Armor

This is where ConcealBrowse’s brilliance truly shone. Instead of blocking access to the domain, the tool took a user-centric approach. It isolated the site, permitting users to view it within a secure, contained environment. Any potential threat on the website would not have a direct pathway to the user’s device, ensuring safety without hampering user experience.

The Verdict: Safeguarding While Ensuring Access

The isolation of the suspicious domain stands as a testament to the efficiency and effectiveness of ConcealBrowse. This incident highlighted how the communications company could continue to give its users access to potentially risky domains without compromising on security.

In conclusion, the decision to invest in ConcealBrowse offered the communications company not just a robust line of defense against cyber threats but also the ability to navigate the digital world with confidence and ease. As the cyber realm continues to evolve, having such proactive tools becomes not just beneficial, but essential.