Browser isolation runs all scripts in a remote, or virtual environment, but QR codes still make it through
If a device is infected with malware, it can get commands via QR codes, rendering browser isolation useless
The method works, but has its limitations
Cybersecurity researchers from Mandiant claim to have discovered a new way to get malware to communicate with its C2 servers through the browser, even when the browser is isolated in a sandbox.
There is a relatively new method of protecting web-borne cyberattacks, called “browser isolation”. It makes the victim’s browser communicate with another browser, located in a cloud environment, or a virtual machine. Whatever commands the victim inputs are relayed to the remote browser, and all they get in return is the visual rendering of the page. Code, scripts, commands, all get executed on the remote device.
+ There are no comments
Add yours