ConcealBrowse: Successfully Isolating a Threat Beyond Edge Controls
/in Blog /by LaceyCybersecurity has become a vital component of any organization’s technological infrastructure, especially given the escalating threats in the digital sphere. Recently, a tech company made a strategic decision to invest in ConcealBrowse, which proved instrumental when a threat evaded the firm’s existing proactive edge controls.
ConcealBrowse Proximity Tool to the Rescue
A few months back, ConcealBrowse discovered a domain, degitore[.]shop, on one of the tech company’s endpoints. The domain, newly registered in late January 2023, wasn’t explicitly reported as malicious. However, ConcealBrowse’s advanced decision engine assigned risk to this domain due to notable similarities to known malicious sites. The system then took the initiative to isolate the domain, alerting the user of its potential risk and opening it in an isolated environment to prevent harm to the user’s device.
Proximity Metric and Analysis
An essential part of the ConcealBrowse tool is its unique proximity metric. This metric gauges the risk posed by a website linked to an infrastructure hosting other malicious files or websites. In this case, the suspicious degitore[.]shop domain was assigned a 33% risk score. This elevated risk score triggered ConcealBrowse’s decision engine to scrutinize further and isolate the website.
How Does Isolation Work?
The genius behind ConcealBrowse lies in its sophisticated isolation process. When the tool identifies a potential threat, it opens the website in a remote, isolated session. Consequently, any malicious file downloads are blocked, and any harmful code embedded on the site gets executed in a remote, temporary environment instead of the user’s device. The end result is a secure browsing environment that keeps the user’s device safe from potential harm.
Valuable Outcomes
The integration of ConcealBrowse into the tech company’s cybersecurity structure proved to be invaluable. By promptly isolating a potential threat, the tool effectively secured the organization’s endpoints, preventing possible damage.
Furthermore, the analysis of the domain and the attribution of a risk score based on its proximity to other malicious infrastructures provided insightful data on the potential threat landscape. This data is crucial for the organization’s continuous efforts to reinforce its cybersecurity measures against emerging threats.
Conclusion
ConcealBrowse’s isolation technology once again demonstrates the pivotal role that advanced cybersecurity tools play in contemporary digital protection. By seamlessly containing a threat that bypassed the organization’s other edge controls, ConcealBrowse re-emphasizes the importance of a multilayered security approach in combating ever-evolving cyber threats.
Brigantia Partners with Conceal
/in Press Releases /by LaceyJuly 14, 2023
Cybersecurity distributor, Brigantia, has announced a new vendor partnership with Conceal to bring ConcealBrowse to the UK and Irish markets. ConcealBrowse focuses on detecting and defending against malware by isolating risks at the browser. Brigantia’s highly selective portfolio now includes this solution.
About ConcealBrowse
ConcealBrowse is a lightweight browser extension that transforms any browser into a secure, zero-trust environment. This conversion detects malware and credential theft attacks that many other security solutions miss. ConcealBrowse users reap significant benefits such as credential theft protection, ransomware protection, signature-based protection, policy-based protection, known threat detection, and malicious link protection.
How does ConcealBrowse work?
Conceal enhances user and organisational security in four simple steps:
- Access browser – when a user opens a browser, ConcealBrowse activates to protect at the edge.
- Submit HTTP request – an HTTP request is made using a browser or an internet-facing app.
- Assess activity risk – ConcealBrowse determines whether the requested activity is dangerous.
- Isolate – ConcealBrowse’s remote browser isolation technology isolates the unknown request. The request is granted if it is deemed low risk. The request is blocked if it is determined to be malicious or violates policy.
What ConcealBrowse offers
Browser activity is essential to modern work, but it is also a significant source of risk. ConcealBrowse is a simple but effective way for remote and office-based workers to identify and contain those risks, as well as protect endpoints and networks.
Brigantia Sales Director Angus Shaw said of the new collaboration, “It was an easy decision to partner with Conceal. The solution is unparalleled in terms of edge security. Isolating malicious activities at the edge provides a competitive advantage, increasing client trust and, ultimately, lowering remediation costs.”
To learn more about Conceal, contact Brigantia.
Source: https://technologyreseller.uk/brigantia-partners-with-conceal/
ConcealBrowse: A Frontline Defense in Isolating a Threat That Outsmarted Edge Controls
/in Blog /by LaceyAs cyber threats become increasingly sophisticated, the need for advanced protective measures grows more urgent. Recognizing this, a forward-thinking state government organization recently invested in our cybersecurity solution: ConcealBrowse. This advanced tool proved crucial when a subtle threat slipped past all the organization’s other proactive controls at the edge.
The Role of ConcealBrowse in Identifying Threats
When the URL https://oneettinlive[.]com/ was detected on one of the organization’s endpoints, ConcealBrowse was on the case, swiftly isolating it for further investigation. Our analysts examined this URL, unearthing several Indicators of Compromise (IOCs) directly and indirectly related to it. These IOCs were linked to several domains, including:
- oneettinlive[.]com
- waterdumb[.]link
- watchlisten[.]fit
- sleepyreturn[.]link
- getlift[.]world
- go0lgle[.]xyz
- costperform[.]link
- profitdraw.casa
The Analysis: How ConcealBrowse Works
Our intelligence sources flagged the URL as suspicious, triggering the ConcealBrowse decision engine to isolate the website. Upon further investigation, we discovered the site employed basic social engineering to deceive users into enabling browser alerts. These alerts could then be used to distribute spam advertising or redirect users to other malicious websites or malware.
More alarmingly, our investigation revealed that the site shared an ad tracking ID with at least 11 other malicious websites, suggesting that they are all likely owned and operated by the same threat group.
The Power of Isolation
So, how does ConcealBrowse’s isolation process work? The answer lies in its pioneering approach to cyber defense. When confronted with a potentially harmful site, ConcealBrowse opens the site in a remote, isolated session. Any permissions requested by the site only apply to this isolated environment, not the user’s actual browser.
This means that even if a user is tricked into clicking “Allow” on a malicious alert, the threat remains contained within the isolated session and doesn’t affect the actual browser. Importantly, these malicious alerts won’t be displayed once the isolated session ends, keeping the user’s browsing environment secure.
Valuable Outcomes
This incident underscores the importance of our product’s innovative isolation technology. Not only did ConcealBrowse detect and contain a threat that slipped past other edge controls, but it also protected the organization’s endpoints from being compromised.
Further, our analysis provided a deeper understanding of the threat, including the tactics and strategies used by the attackers. This valuable insight allows the organization to bolster its security measures, making it better equipped to handle similar threats in the future.
Conclusion
The recent victory of ConcealBrowse over a stealthy cyber threat underlines the importance of investing in advanced cybersecurity tools. The innovative isolation technology of ConcealBrowse ensures threats are effectively contained, securing your digital environment from increasingly sophisticated cyber-attacks. Our commitment to delivering robust security solutions continues to protect and empower organizations in the face of evolving cyber threats.