ArrowArrow

Cymulate’s Web Gateway vector helps you to test your HTTP/HTTPS outbound exposure to malicious or compromised websites.

Unsecure web browsing is frequently abused by hackers to exploit security weaknesses and compromise corporate environments. The World Wide Web is filled with malicious websites, and new ones are uploaded every day. Furthermore, legitimate websites developed in an unsecure manner are also being compromised and used to spread malware and other attacks. About 12% of recorded cyberattacks use a significant number of malware and malicious scripts that are delivered while browsing to infected websites or via browser add-ons.

In addition, malicious scripts–using Flash, Java and Microsoft Silverlight plug-ins on webpages–make up a quarter of malware attacks. The Cerber and Bad Rabbit attacks started off by a malicious hacker compromising a legitimate website to spread their malware. In the case of Cerber, it was found that the U.S. National Wildfire Coordinating Group’s (NWCG) website was hosting a JavaScript downloader that was used to deliver the Cerber ransomware. It used a zip archive that contained a JavaScript file with an obfuscated PowerShell. The PowerShell downloaded the Cerber executable, disguised as a GIF file. This attack was removed from the website within less than a day after infecting thousands of victims who browsed to NWCG’s legitimate website.

Despite pervasive use of proxies, web filters, and all sorts of secure browsing solutions, browsing to malicious and compromised websites is a very common risk due to malicious online advertisements, fraudulent links, exploit kits and more. Since the majority of web malware infections takes place during legitimate browsing of infected mainstream websites or via browser add-ons, assessing the outbound exposure to malicious websites is crucial.

Cymulate’s Web Gateway cyber attack simulation vector is designed to evaluate your organization’s outbound exposure to malicious or compromised websites and current capabilities to analyze any inbound traffic. Using common HTTP/HTTPS protocols, it enables you to verify your organization’s exposure to an extensive and continuously growing database of malicious and compromised websites.

Immediate, actionable simulation results enable IT and security teams to identify security gaps, prioritize remediation and take corrective measures to reduce your organization’s attack surface.

Learn More about Other Attack Vectors

Full Kill-Chain APT

LEARN MORE >

Email Gateway

LEARN MORE >

Web Application Firewall

LEARN MORE >

Phishing Awareness

LEARN MORE >

Endpoint Security

LEARN MORE >

Lateral Movement

LEARN MORE >

Data Exfiltraiton

LEARN MORE >

Immediate Threats Intelligence

LEARN MORE >

See how simple it is

FREE TRIAL