{"id":1144,"date":"2020-06-26T13:41:04","date_gmt":"2020-06-26T13:41:04","guid":{"rendered":"https:\/\/sectigostore.com\/blog\/?p=1144"},"modified":"2021-01-12T11:40:36","modified_gmt":"2021-01-12T11:40:36","slug":"a-man-in-the-browser-attack-what-it-is-how-to-prevent-it","status":"publish","type":"post","link":"https:\/\/sectigostore.com\/blog\/a-man-in-the-browser-attack-what-it-is-how-to-prevent-it\/","title":{"rendered":"A Man in the Browser Attack: What It Is &#038; How to Prevent It"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">No individuals, small companies, or big organizations are immune to&nbsp;man-in-the-browser (MitB)&nbsp;attacks&nbsp;\u2014&nbsp;Here&#8217;s what to know about what these&nbsp;cyber attacks&nbsp;are, how they work, and what you can do to prevent them&nbsp;&nbsp;<\/h2>\n\n\n\n<p>Let\u2019s imagine this scenario&nbsp;to understand the man-in-the-browser&nbsp;attack&nbsp;in layman&#8217;s&nbsp;terms:&nbsp;<\/p>\n\n\n\n<p>Bob&nbsp;finds a shirt that he likes for $20 on&nbsp;Amazon.com. He hits the&nbsp;<strong>Proceed to check out<\/strong>&nbsp;button, reviews&nbsp;the order summary,&nbsp;selects two-day shipping,&nbsp;and makes&nbsp;the payment. He&nbsp;receives&nbsp;the confirmation receipt showing details of the shirt,&nbsp;price,&nbsp;shipping address, and expected delivery date.&nbsp;But when he doesn\u2019t receive&nbsp;the shirt&nbsp;within&nbsp;a couple of days, Bob logs&nbsp;in to his Amazon account to see the shipping status.&nbsp;Much to&nbsp;his surprise, there isn\u2019t&nbsp;any record&nbsp;of&nbsp;the&nbsp;transaction!&nbsp;&nbsp;<\/p>\n\n\n\n<p>Realizing&nbsp;that&nbsp;something fishy&nbsp;is going on, he immediately checks&nbsp;his&nbsp;bank statements&nbsp;and finds&nbsp;a charge of <strong>$2,000<\/strong>&nbsp;instead of $20&nbsp;for the&nbsp;transaction&nbsp;made on the same day&nbsp;and&nbsp;from the same ecommerce site&nbsp;(Amazon)!&nbsp;Bob knows that it\u2019s unlikely&nbsp;that a well-known ecommerce site&nbsp;like Amazon would&nbsp;commit&nbsp;fraud. So, what just happened?&nbsp;It\u2019s then that Bob&nbsp;realizes that he has&nbsp;become the victim of&nbsp;a&nbsp;man-in-the-browser&nbsp;attack! &nbsp;&nbsp;<\/p>\n\n\n\n<p>In this article, we\u2019ll explore what a man-in-the-browser is, execution, and some tips to prevent them.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is&nbsp;a&nbsp;Man&nbsp;in the Browser&nbsp;Attack?&nbsp;&nbsp;<\/h2>\n\n\n\n<p>A&nbsp;man-in-the-browser (MitB)&nbsp;attack&nbsp;occurs when&nbsp;an attacker inserts a&nbsp;special type of <a href=\"https:\/\/sectigostore.com\/blog\/what-is-a-trojan-horse-in-computer-terms\/\">trojan horse<\/a>&nbsp;into&nbsp;the users\u2019 web browser&nbsp;via&nbsp;a<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Browser Extension, <\/li><li>User script, or&nbsp;<\/li><li>Browser Helper Object (BHO).&nbsp;<\/li><\/ul>\n\n\n\n<p>This&nbsp;allows an attacker to&nbsp;exploit&nbsp;the browser\u2019s&nbsp;security vulnerability. It enables hackers to read, intercept, steal, and modify the actions performed on the browser.&nbsp;&nbsp;<\/p>\n\n\n\n<p>This MitB trojan can control the browser in&nbsp;one or more of&nbsp;the following&nbsp;ways:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Adding&nbsp;new columns\/fields&nbsp;on&nbsp;the website or modifying&nbsp;the existing fields.&nbsp;<\/li><li>Modifying&nbsp;the&nbsp;transaction&nbsp;information&nbsp;entered by the users. This data can be&nbsp;a&nbsp;transaction&nbsp;amount, bank account number, physical address, etc.&nbsp;&nbsp;<\/li><li>Hijacking&nbsp;the entire&nbsp;transaction&nbsp;in&nbsp;real-time.&nbsp;<\/li><li>Changing&nbsp;the&nbsp;appearance of the website.&nbsp;<\/li><li>Modifying&nbsp;the servers&#8217; responses, such as confirmation messages and receipts.&nbsp;<\/li><li>Intercepting&nbsp;the data entered by the user on the website.&nbsp;&nbsp;<\/li><li>Removing the&nbsp;transaction&nbsp;details when the user revisits the website.&nbsp;<\/li><\/ul>\n\n\n\n<p>The user and the website&#8217;s&nbsp;server don&#8217;t have any knowledge of such modifications until&nbsp;it\u2019s&nbsp;too late. Man-in-the-browser attacks can defraud even the most vigilant users and are immune to some well-known security mechanisms like secure <a href=\"https:\/\/sectigostore.com\/ssl-certificates\">SSL\/TLS certificates<\/a> and <a href=\"https:\/\/sectigostore.com\/blog\/what-is-multi-factor-authentication-and-how-does-it-differ-from-2fa-sfa\/\">two-factor authentication<\/a>.&nbsp;<\/p>\n\n\n\n<p>Unlike the&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/sectigostore.com\/blog\/common-types-of-phishing-attacks-how-to-recognize-avoid-them\/\" target=\"_blank\">phishing attacks<\/a>&nbsp;where users are tricked into entering their credentials on a fake site, in the&nbsp;MitB attacks,&nbsp;users&nbsp;perform all the actions&nbsp;on the legitimate&nbsp;site.&nbsp;Hence, no&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/sectigostore.com\/blog\/the-difference-between-authentication-and-authorization-explained-in-detail-by-a-security-expert\/\" target=\"_blank\">authentication<\/a>&nbsp;step has been bypassed.&nbsp;MitB trojan modifies the data&nbsp;before it gets encrypted.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How&nbsp;Man-in-the-Browser&nbsp;Attacks&nbsp;Are&nbsp;Executed&nbsp;<\/h2>\n\n\n\n<p>Although&nbsp;man-in-the-browser&nbsp;attacks are conducted in various ways, the following hacking technique is the most common among all. Let\u2019s understand the entire&nbsp;man-in-the-browser&nbsp;process in 10 steps.&nbsp;&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Phase&nbsp;1: Malware Insertion&nbsp;<\/h3>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>The\u00a0trojan horse gets\u00a0inserted in the device\u2019s operating system\u00a0when the user:\u00a0\u00a0<ul><li>downloads a corrupted software,\u00a0\u00a0<\/li><li>visits any malicious site,\u00a0\u00a0<\/li><li>opens or downloads\u00a0malicious\u00a0email attachments, or\u00a0\u00a0<\/li><li>plugs\u00a0corrupted external devices such as USB drives\/CDs\u00a0on their computers\/tablets\/mobile phones.\u00a0<\/li><\/ul><\/li><li>The\u00a0trojan\u00a0<strong>automatically\u00a0installs<\/strong> a malicious extension in the web\u00a0browser\u00a0without the user&#8217;s knowledge.\u00a0\u00a0<\/li><li>Whenever the user restarts the browser, the extension gets activated.\u00a0\u00a0\u00a0<\/li><li>The malicious extension has a list of targeted\u00a0websites\u00a0which it can manipulate.\u00a0Whenever the user opens a website from the list,\u00a0the\u00a0trojan does\u00a0multiple tricks\u00a0to modify the targeted webpages. For example, changing the fields of the forms or inserting JavaScript on the buttons like\u00a0<strong>Submit, Done, Send, Transfer, Complete<\/strong>, etc. \u00a0\u00a0<\/li><\/ol>\n\n\n\n<h3 class=\"wp-block-heading\">Phase&nbsp;2:&nbsp;Transaction&nbsp;Interruption&nbsp;&nbsp;<\/h3>\n\n\n\n<ol start=\"5\"><li>The unsuspecting&nbsp;user&nbsp;logs&nbsp;in with their credentials&nbsp;(their&nbsp;user ID, email address, password, one-time password&nbsp;[OTP],&nbsp;secret pins,&nbsp;etc).&nbsp;Then, they complete the regular&nbsp;transaction&nbsp;such as transferring funds, making payments, purchasing, or filling out sensitive details such as SSN, health info, etc. &nbsp;&nbsp;<\/li><li>When&nbsp;the&nbsp;user&nbsp;clicks&nbsp;<strong>Submit<\/strong>&nbsp;or any other authorization button, the malicious script modifies the&nbsp;transaction&nbsp;details. For example, changing the&nbsp;transaction&nbsp;amount, bank numbers, physical address, product, etc. and sends the modified information to the website\u2019s server.&nbsp;(Note:&nbsp;The&nbsp;information is modified before it&nbsp;enters&nbsp;the encrypted channel facilitated by the SSL\/TLS&nbsp;certificates.)&nbsp;&nbsp;<\/li><li>The&nbsp;recipient website&nbsp;doesn\u2019t suspect anything about the modified&nbsp;transaction&nbsp;because it\u2019s&nbsp;coming directly from the user without bypassing any authentication step. Hence, the website completes the requested transaction.&nbsp;&nbsp;<\/li><\/ol>\n\n\n\n<h3 class=\"wp-block-heading\">Phase&nbsp;3: Response&nbsp;Modification&nbsp;<\/h3>\n\n\n\n<ol start=\"8\"><li>The website sends the receipt to the user. The receipt contains the&nbsp;transaction&nbsp;details.&nbsp;&nbsp;<\/li><li>The corrupted browser modifies the receipts that match the details of the users&#8217; original&nbsp;transaction.&nbsp;&nbsp;<\/li><li>At this stage, even if the&nbsp;two-factor&nbsp;authentication&nbsp;(2FA)&nbsp;is activated, the user doesn\u2019t have anything to suspect in the&nbsp;confirmation&nbsp;receipt. Hence, they provide the unique secret code or&nbsp;OTP, which they generally receive on the mobile or email to complete the transaction.&nbsp;<\/li><\/ol>\n\n\n\n<p>As you can see, both&nbsp;the&nbsp;user&nbsp;and&nbsp;the&nbsp;website&nbsp;are&nbsp;acting&nbsp;in good faith.&nbsp;The website has followed only&nbsp;the&nbsp;instructions&nbsp;that&nbsp;it received from the user.&nbsp;The user&nbsp;experiences&nbsp;a seamless&nbsp;transaction&nbsp;where the confirmation receipt reflects the same&nbsp;transaction&nbsp;details that&nbsp;they\u2019d&nbsp;expect, so they\u2019re not likely to assume that something is amiss.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Where&nbsp;MitB&nbsp;Attacks&nbsp;Are Most Commonly Used&nbsp;<\/h2>\n\n\n\n<p>In general, the&nbsp;man-in-the-browser&nbsp;attacks target websites where users perform any&nbsp;sort&nbsp;of&nbsp;transaction. For example,&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Websites belonging to the financial industry: banks, insurance,&nbsp;credit card, mortgage companies, etc.&nbsp;&nbsp;<\/li><li>Ecommerce websites&nbsp;<\/li><li>Utility services&#8217; websites that facilitate users to pay bills on their platforms. For example, electricity, gas, internet, cable, etc.&nbsp;&nbsp;&nbsp;<\/li><li>Websites offering paid membership\/ subscriptions&nbsp;<\/li><li>Websites having fundraising, donation, or charity facilities&nbsp;<\/li><li>Online wallets&nbsp;&nbsp;<\/li><li>Social media websites&nbsp;<\/li><li>Websites that facilitate tax calculations and filing&nbsp;<\/li><\/ul>\n\n\n\n<p>However, the scope is not limited to&nbsp;the&nbsp;transactions only. The&nbsp;man-in-the-browser&nbsp;attacks are also used&nbsp;to&nbsp;steal the data. Here, the perpetrator&nbsp;steals data from the&nbsp;legit website\u2019s form&nbsp;or login pages. Forms can be inquiry forms or contact forms.&nbsp;They can also add new fields such as&nbsp;social security numbers, phone numbers, bank account numbers, etc.&nbsp;in the existing forms, too.&nbsp;Needless to say,&nbsp;all&nbsp;the data filled by the user in such forms are instantly received by the hackers.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Hackers also execute&nbsp;man-in-the-browser&nbsp;attacks against the company&#8217;s internal website or project&nbsp;management websites, which employees use to store and share confidential data.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Popular Trojans Used for&nbsp;Man-in-the-Browser&nbsp;Attacks&nbsp;<\/h2>\n\n\n\n<p>These are some famous widespread trojans used for&nbsp;MitB&nbsp;attacks:&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1.&nbsp;Zeus&nbsp;&nbsp;<\/h3>\n\n\n\n<p>Zeus&nbsp;is a widely spread trojan that man-in-the-browsers use for keystroke logging (recording user\u2019s keyboard activity to monitor actions) and form grabbing (stealing login credentials from online forms).&nbsp;It gets installed on the user&#8217;s device via&nbsp;<a href=\"https:\/\/sectigostore.com\/blog\/what-is-a-phishing-email-5-examples-of-phishing-emails-and-how-to-avoid-them\/\" target=\"_blank\" rel=\"noreferrer noopener\">phishing emails<\/a>&nbsp;or malicious software downloads.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Zeus&nbsp;is considered to be&nbsp;the most dangerous&nbsp;trojan as it has successfully hacked FTP accounts of&nbsp;<a href=\"https:\/\/enterprise.comodo.com\/blog\/what-is-zeus-malware\/\" target=\"_blank\" rel=\"noreferrer noopener\">well-known websites<\/a>&nbsp;such as play.com, Amazon.com, Bank of America,&nbsp;United States Department of Transportation&nbsp;(US DOT), Cisco, NASA,&nbsp;BusinessWeek, ABC&nbsp;and&nbsp;Monster.com.&nbsp;<\/p>\n\n\n\n<p>The&nbsp;Zeus&nbsp;trojan&nbsp;is used by scam artists to steal banking credentials and make unauthorized fund transfers. It also executes technical support scams by inserting a fake pop-up&nbsp;message&nbsp;on the website the user is visiting. The pop-up warns&nbsp;a&nbsp;user&nbsp;that their system is infected with the virus and defraud them by charging for virus removal.&nbsp;&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2.&nbsp;Carberp&nbsp;&nbsp;<\/h3>\n\n\n\n<p>This trojan gets installed in&nbsp;the&nbsp;following locations:&nbsp;&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>\/ProgramFiles\\NVIDIA Corporation\\Updates&nbsp;<\/li><li>\/ProgramFiles\\NVIDIA Corporation\\Update Center&nbsp;<\/li><\/ul>\n\n\n\n<p>It can connect to some remote sites, check internet connection, download other malware from the internet, and run files.&nbsp;<\/p>\n\n\n\n<p>One of the&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/wdsi\/threats\/malware-encyclopedia-description?Name=Trojan:Win32\/Carberp.I&amp;ThreatID=2147648222\" target=\"_blank\" rel=\"noreferrer noopener\">Carberp<\/a>&nbsp;trojan&#8217;s&nbsp;most notable&nbsp;targets&nbsp;is&nbsp;<a href=\"https:\/\/www.darkreading.com\/vulnerabilities---threats\/new-version-of-carberp-trojan-targets-facebook-users\/d\/d-id\/1136946\" target=\"_blank\" rel=\"noreferrer noopener\">Facebook<\/a>. It infected some users\u2019 Firefox&nbsp;and&nbsp;Internet Explorer browsers. When users used&nbsp;one of these&nbsp;corrupt&nbsp;browser&nbsp;to open Facebook, it replaced the pages the users visited with fake ones. It asked for users\u2019 cash equivalent e-cash voucher number to defraud them. &nbsp;&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3.&nbsp;OddJob&nbsp;<\/h3>\n\n\n\n<p>This trojan&nbsp;is designed to execute&nbsp;man-in-the-browser&nbsp;attacks against the&nbsp;<a href=\"https:\/\/www.banktech.com\/new-oddjob-malware-targets-online-banking-users-\/d\/d-id\/1294523.html\" target=\"_blank\" rel=\"noreferrer noopener\">banking website<\/a>. It gets installed in Firefox or Internet&nbsp;Explorer&nbsp;and gets activated when the user opens a banking site. It keeps the banking session open even after the user has logged out&nbsp;of&nbsp;their account.&nbsp;This allows an attacker to&nbsp;steal&nbsp;the legitimate user&#8217;s real-time session ID tokens to do banking&nbsp;transactions on&nbsp;their&nbsp;behalf.&nbsp;<\/p>\n\n\n\n<p>The most dangerous thing about this&nbsp;trojan&nbsp;is that it doesn\u2019t get stored on the device\u2019s disk. Hence, the anti-malware software can\u2019t detect it. It operates directly from&nbsp;the command-and-control&nbsp;server. Every time the user opens the banking site, a new&nbsp;trojan&nbsp;gets installed and deletes itself after the&nbsp;transaction&nbsp;is complete.&nbsp;&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4.&nbsp;Tatanga&nbsp;&nbsp;<\/h3>\n\n\n\n<p>Tatanga&nbsp;is a banking trojan that is so powerful that it bypasses the mobile&#8217;s SMS authentication to complete the fraudulent financial transaction.&nbsp;Unlike the&nbsp;aforementioned&nbsp;trojans&nbsp;that affect&nbsp;only Internet Explorer or Firefox, Tatanga affects&nbsp;all&nbsp;of&nbsp;the major browsers, including&nbsp;IE, Firefox, Chrome, Opera, Safari, Maxthon, Netscape, and&nbsp;Konqueror.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Tips to Prevent&nbsp;Man-in-the-Browser&nbsp;Attacks&nbsp;<\/h2>\n\n\n\n<p>Although&nbsp;the trojans&nbsp;used for&nbsp;man-in-the-browser attacks are evolving every single day, you can prevent them by being vigilant and with the use of some technological tools. These are five&nbsp;technologies or processes&nbsp;you can&nbsp;implement&nbsp;to prevent&nbsp;MitB&nbsp;attacks:&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1.&nbsp;Out-of-Band&nbsp;Authentication&nbsp;&nbsp;<\/h3>\n\n\n\n<p>In this method, the browser is not used for&nbsp;two-factor or sometimes multi-factor authorization&nbsp;(MFA). Instead,&nbsp;a&nbsp;mobile phone\u2019s&nbsp;SMS facility or an automated phone call is used to deliver the one-time password (OTP) or the secret pin. <\/p>\n\n\n\n<p>The SMS or phone call contains all the information about the transaction along with the OPT. But the user must be vigilant and check all the information received on the SMS\/phone call before submitting the OTP to the browser. However, you can\u2019t&nbsp;rely&nbsp;on this method&nbsp;100%&nbsp;because&nbsp;trojans&nbsp;like Tatanga, Zeus and&nbsp;SpyEye&nbsp;can corrupt the mobiles and intercept all the incoming SMS&nbsp;messages, too.&nbsp;&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2.&nbsp;Manual Checking of Your Program Files&nbsp;<\/h3>\n\n\n\n<p>Some of the common man in the browser&nbsp;trojans&nbsp;have a similar storage pattern.&nbsp;Be sure to&nbsp;regularly&nbsp;check the following folders:&nbsp;<\/p>\n\n\n\n<p>Paths:&nbsp;<\/p>\n\n\n\n<p>C:\/Program File&nbsp;<\/p>\n\n\n\n<p>C:\/Program Files (x86)&nbsp;<\/p>\n\n\n\n<p>C:\/Windows\/Temp&nbsp;<\/p>\n\n\n\n<p>If you detect any unauthorized new software, scan it with anti-malware software and conduct an internet search to get more information about it. If you find anything suspicious, remove such unknown software.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3.&nbsp;Use Security Software&nbsp;&nbsp;<\/h3>\n\n\n\n<p>Antivirus software can detect and remove some of the&nbsp;man-in-the-browser&nbsp;trojans. Regularly scan your devices with the antivirus software. Some of the antiviruses also show you the security dialogue box if it finds anything suspicious getting downloaded from the internet. However, antivirus software can&#8217;t prevent all the latest trojans. There is&nbsp;some browser security software available, too.&nbsp;&nbsp;<\/p>\n\n\n\n<p>These five solutions claim to prevent MitB attacks:&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li><a rel=\"noreferrer noopener\" href=\"https:\/\/www.mimecast.com\/content\/man-in-the-browser-attack\/\" target=\"_blank\">Mimecast<\/a>:&nbsp;Detects and blocks&nbsp;MitB&nbsp;trojans distributed via emails.&nbsp;<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/www.bullguard.com\/blog\/2019\/12\/man-in-the-browser-attacks\" target=\"_blank\">BullGuard<\/a>: No plugin, extension, or BHO can get installed without the user&#8217;s notice as BullGuard alerts the user every time anything new has been added in the browser.&nbsp;<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/www.ibm.com\/products\/phishing-and-malware-protection\" target=\"_blank\">IBM Trusteer Rapport<\/a>:&nbsp;This&nbsp;endpoint protection solutions&nbsp;prevents malware and phishing attacks.&nbsp;<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/www.entrust.com\/mitb\/\" target=\"_blank\">Entrust<\/a>: It has two solutions,&nbsp;Entrust&nbsp;TransactionGuard&nbsp;and&nbsp;Entrust&nbsp;IdentityGuard, that enable multi-factor authentication like OOB to prevent man-in-the-browser attacks.&nbsp;<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/codesealer.com\/#wsf\" target=\"_blank\">CodeSealers:<\/a>&nbsp;It is a user interface (UI) protection software that provides protection against man-in-the-browser and&nbsp;MitM&nbsp;attacks.&nbsp;&nbsp;<\/li><\/ol>\n\n\n\n<h3 class=\"wp-block-heading\">4.&nbsp;Be&nbsp;Vigilant&nbsp;While&nbsp;Surfing on an&nbsp;Unknown&nbsp;Website&nbsp;&nbsp;<\/h3>\n\n\n\n<p>Be careful while downloading any software or media files such as songs, images, and videos from unknown sites. Always scan the downloaded files with a robust antivirus program.&nbsp;<\/p>\n\n\n\n<p>If you suspect any links or buttons, right-click on them and hit&nbsp;<strong>Inspect<\/strong>. You\u2019ll&nbsp;see a window with a bunch of codes&nbsp;in which you can see where exactly the link\/button is redirecting you to.&nbsp;<\/p>\n\n\n\n<p>Never click on the links or advertisements that look too good to be true. For example, advertisements like winning the big lottery, casino prices, making thousands of dollars while working from home, etc.&nbsp;&nbsp;<\/p>\n\n\n\n<p>If you\u2019re&nbsp;surfing an unknown website that asks you to update browser, software,&nbsp;or media player, never download from the link provided by those websites. If you\u2019re&nbsp;using an outdated version, go to that browser\/software&#8217;s official site and download the updated version directly from there.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5.&nbsp;Beware&nbsp;Phishing&nbsp;Emails&nbsp;&nbsp;<\/h3>\n\n\n\n<p>One of the most popular ways of distributing&nbsp;the&nbsp;man-in-the-browser&nbsp;trojan&nbsp;is via phishing emails. That&#8217;s why always check the email headers and the sender&#8217;s email address to ensure emails are sent from the official company&#8217;s domain name. For example,&nbsp;if&nbsp;you get an email&nbsp;claiming to be from Amazon,&nbsp;it must be from an email address&nbsp;that ends in&nbsp;&#8220;@amazon.com&#8221; instead of Gmail, Yahoo, or any other generic email address.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Don\u2019t&nbsp;download any attachments from emails before having them scanned through reliable antivirus software. Before clicking on a link from an email, hover over cursor on the link and check where it&nbsp;actually points&nbsp;to.&nbsp;<\/p>\n\n\n\n<p>Phishing email example:&nbsp;&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"596\" height=\"352\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/man-in-the-browser-devliery-phishing-example.png\" alt=\"An example of an email that could lead to a man in the middle attack\" class=\"wp-image-1146 addshadow\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/man-in-the-browser-devliery-phishing-example.png 596w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/man-in-the-browser-devliery-phishing-example-300x177.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/man-in-the-browser-devliery-phishing-example-560x331.png 560w\" sizes=\"auto, (max-width: 596px) 100vw, 596px\" \/><\/figure><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Detection Challenges&nbsp;Relating to&nbsp;Man&nbsp;in&nbsp;the&nbsp;Browser Attacks&nbsp;<\/h2>\n\n\n\n<p>A man in the browser attack is considered one of the most difficult <a class=\"wpil_keyword_link\" href=\"https:\/\/sectigostore.com\/blog\/10-different-types-of-cyber-attacks-how-they-work\/\" title=\"cyber attacks\">cyber attacks<\/a> to detect and prevent. So,&nbsp;let\u2019s understand&nbsp;why,&nbsp;exactly,&nbsp;it\u2019s&nbsp;earned such&nbsp;a bad&nbsp;reputation.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Detection Challenges for&nbsp;Users&nbsp;&nbsp;<\/h3>\n\n\n\n<p>In the&nbsp;regular&nbsp;phishing attacks,&nbsp;the attackers&nbsp;redirect users to a website that&nbsp;looks&nbsp;similar to&nbsp;the original site and trick users to submit their information. Here, the users still get a chance to detect the fraud as the domain name is going to be different. But in the&nbsp;man-in-the-browser&nbsp;attacks, the users are visiting the original website&nbsp;only. They don\u2019t&nbsp;have&nbsp;any reason to be suspicious and&nbsp;to&nbsp;detect the attack.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Detection Challenges for&nbsp;Website&nbsp;Servers&nbsp;&nbsp;<\/h3>\n\n\n\n<p>All&nbsp;good websites use robust technology such as enabling two-factor authentication, enforcing users to set strong passwords, limiting login attempts, enabling re-captcha, etc. They even send mobile\/email alerts to the user if there is a suspicious login attempt from a new device or geographical location. These steps help the servers to detect and prevent brute force attacks and unauthorized access to the users\u2019 account.&nbsp;&nbsp;<\/p>\n\n\n\n<p>However, in&nbsp;man in the browser&nbsp;attacks, users themselves are&nbsp;logging&nbsp;in&nbsp;with their original credentials and completing the authentication process. Hence, the server has nothing to be suspicious about, and they can&#8217;t detect the attack.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Detection Challenges for SSL\/TLS&nbsp;Certificate&nbsp;&nbsp;<\/h3>\n\n\n\n<p>In&nbsp;layman\u2019s terms, an SSL\/TLS certificate\u2019s job is to&nbsp;securely communicate&nbsp;data&nbsp;between&nbsp;the browser and&nbsp;the website\u2019s server.&nbsp;It&nbsp;uses&nbsp;public key infrastructure (PKI)&nbsp;technology, up to&nbsp;<a href=\"https:\/\/sectigostore.com\/page\/256-bit-encryption\/\">256-bits<\/a>&nbsp;AES,&nbsp;RSA or ECC algorithm to encrypt the session key and&nbsp;up to&nbsp;2048 bit strong public and private key&nbsp;to&nbsp;protect the data&nbsp;in transit.&nbsp;But the&nbsp;SSL certificate\u2019s&nbsp;protection&nbsp;is&nbsp;offered&nbsp;on the network side, while the&nbsp;man-in-the-browser&nbsp;attacks are&nbsp;executed on the application side. The&nbsp;trojan modifies the data on the browser level, even before the data&nbsp;transmits through the&nbsp;encrypted&nbsp;SSL\/TLS&nbsp;communication&nbsp;tunnel.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Consider this scenario:&nbsp;A&nbsp;food delivery person\u2019s job is to take&nbsp;food from the restaurant and safely delivers it to the stipulated address. But what if the restaurant manager hands over him a wrong food parcel or a wrong delivery address? In the same way, the SSL\/TLS can\u2019t prevent the&nbsp;man-in-the-browser&nbsp;attacks because&nbsp;the data is already modified before it is handed over to the SSL\/TLS technology\u2019s encrypted tunnel.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Final&nbsp;Words&nbsp;on&nbsp;MitB&nbsp;Attacks&nbsp;<\/h2>\n\n\n\n<p>Man in the browser&nbsp;attacks are committed against individuals and organizations. While medium and big organizations can afford to buy expensive security solutions,&nbsp;many&nbsp;small businesses&nbsp;don\u2019t have&nbsp;extensive IT and security&nbsp;budgets.&nbsp;Small businesses must provide cybersecurity training to their employees to&nbsp;help them recognize phishing scams. There are many free or inexpensive training tutorials available for this purpose&nbsp;\u2014&nbsp;for example,&nbsp;the&nbsp;<a href=\"https:\/\/sectigostore.com\/blog\/dod-cyber-awareness-challenge-2020-your-ultimate-guide\/\">DoD cyber awareness challenge<\/a>. &nbsp;&nbsp;<\/p>\n\n\n\n<p>The most challenging aspect of man in the browser attacks is&nbsp;the&nbsp;time&nbsp;gap.&nbsp;Most&nbsp;users&nbsp;don&#8217;t&nbsp;initially&nbsp;notice anything suspicious&nbsp;after the fraud has taken place. It usually takes a long time when users check their bank statements or&nbsp;to&nbsp;contact the website&#8217;s customer care for non-receipt of the ordered items.&nbsp;This&nbsp;gives cybercriminals enough time to&nbsp;eliminate&nbsp;the evidence of their&nbsp;MiB attacks and transfer the funds to the foreign bank account or&nbsp;cash&nbsp;the money and close the bank account. Hence&nbsp;why&nbsp;you must regularly check your bank statements&nbsp;or ecommerce accounts&nbsp;to detect such attacks in their earliest stages. &nbsp;&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A man in the browser attack is something that can do a lot of damage in very little time. Here&#8217;s what it is, how it works, and how to prevent it. <\/p>\n","protected":false},"author":6,"featured_media":1147,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[88,89],"class_list":["post-1144","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-man-in-the-browser","tag-mitb","post-with-tags"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>A Man in the Browser Attack: What It Is &amp; How to Prevent It<\/title>\n<meta name=\"description\" content=\"A man in the browser attack can impact any organization with an online presence as well as its users. Here&#039;s what to know about MitB attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sectigostore.com\/blog\/a-man-in-the-browser-attack-what-it-is-how-to-prevent-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Man in the Browser Attack: What It Is &amp; How to Prevent It\" \/>\n<meta property=\"og:description\" content=\"A man in the browser attack can impact any organization with an online presence as well as its users. Here&#039;s what to know about MitB attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sectigostore.com\/blog\/a-man-in-the-browser-attack-what-it-is-how-to-prevent-it\/\" \/>\n<meta property=\"og:site_name\" content=\"InfoSec Insights\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-26T13:41:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-12T11:40:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/man-in-the-browser-attack.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Medha Mehta\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Medha Mehta\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"17 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/a-man-in-the-browser-attack-what-it-is-how-to-prevent-it\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/a-man-in-the-browser-attack-what-it-is-how-to-prevent-it\\\/\"},\"author\":{\"name\":\"Medha Mehta\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/41d095943b7798ade1bc3683c8822f15\"},\"headline\":\"A Man in the Browser Attack: What It Is &#038; How to Prevent It\",\"datePublished\":\"2020-06-26T13:41:04+00:00\",\"dateModified\":\"2021-01-12T11:40:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/a-man-in-the-browser-attack-what-it-is-how-to-prevent-it\\\/\"},\"wordCount\":3393,\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/a-man-in-the-browser-attack-what-it-is-how-to-prevent-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/man-in-the-browser-attack.jpg\",\"keywords\":[\"Man in the Browser\",\"MitB\"],\"articleSection\":[\"Cyber Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/a-man-in-the-browser-attack-what-it-is-how-to-prevent-it\\\/\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/a-man-in-the-browser-attack-what-it-is-how-to-prevent-it\\\/\",\"name\":\"A Man in the Browser Attack: What It Is & How to Prevent It\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/a-man-in-the-browser-attack-what-it-is-how-to-prevent-it\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/a-man-in-the-browser-attack-what-it-is-how-to-prevent-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/man-in-the-browser-attack.jpg\",\"datePublished\":\"2020-06-26T13:41:04+00:00\",\"dateModified\":\"2021-01-12T11:40:36+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/41d095943b7798ade1bc3683c8822f15\"},\"description\":\"A man in the browser attack can impact any organization with an online presence as well as its users. Here's what to know about MitB attacks.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/a-man-in-the-browser-attack-what-it-is-how-to-prevent-it\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sectigostore.com\\\/blog\\\/a-man-in-the-browser-attack-what-it-is-how-to-prevent-it\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/a-man-in-the-browser-attack-what-it-is-how-to-prevent-it\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/man-in-the-browser-attack.jpg\",\"contentUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/man-in-the-browser-attack.jpg\",\"width\":1600,\"height\":1000,\"caption\":\"Back view of woman doing shopping online on website with digital tablet at home. Top view of lady on relaxing sofa. Rear view of girl hand touching screen while selecting product on e-commerce portal.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/a-man-in-the-browser-attack-what-it-is-how-to-prevent-it\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A Man in the Browser Attack: What It Is &#038; How to Prevent It\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\",\"name\":\"InfoSec Insights\",\"description\":\"SectigoStore.com Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/41d095943b7798ade1bc3683c8822f15\",\"name\":\"Medha Mehta\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g\",\"caption\":\"Medha Mehta\"},\"description\":\"Medha is a regular contributor to InfoSec Insights. She's a tech enthusiast and writes about technology, website security, cryptography, cyber security, and data protection.\",\"sameAs\":[\"https:\\\/\\\/sectigostore.com\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A Man in the Browser Attack: What It Is & How to Prevent It","description":"A man in the browser attack can impact any organization with an online presence as well as its users. Here's what to know about MitB attacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sectigostore.com\/blog\/a-man-in-the-browser-attack-what-it-is-how-to-prevent-it\/","og_locale":"en_US","og_type":"article","og_title":"A Man in the Browser Attack: What It Is & How to Prevent It","og_description":"A man in the browser attack can impact any organization with an online presence as well as its users. Here's what to know about MitB attacks.","og_url":"https:\/\/sectigostore.com\/blog\/a-man-in-the-browser-attack-what-it-is-how-to-prevent-it\/","og_site_name":"InfoSec Insights","article_published_time":"2020-06-26T13:41:04+00:00","article_modified_time":"2021-01-12T11:40:36+00:00","og_image":[{"width":1600,"height":1000,"url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/man-in-the-browser-attack.jpg","type":"image\/jpeg"}],"author":"Medha Mehta","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Medha Mehta","Est. reading time":"17 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sectigostore.com\/blog\/a-man-in-the-browser-attack-what-it-is-how-to-prevent-it\/#article","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/a-man-in-the-browser-attack-what-it-is-how-to-prevent-it\/"},"author":{"name":"Medha Mehta","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/41d095943b7798ade1bc3683c8822f15"},"headline":"A Man in the Browser Attack: What It Is &#038; How to Prevent It","datePublished":"2020-06-26T13:41:04+00:00","dateModified":"2021-01-12T11:40:36+00:00","mainEntityOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/a-man-in-the-browser-attack-what-it-is-how-to-prevent-it\/"},"wordCount":3393,"image":{"@id":"https:\/\/sectigostore.com\/blog\/a-man-in-the-browser-attack-what-it-is-how-to-prevent-it\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/man-in-the-browser-attack.jpg","keywords":["Man in the Browser","MitB"],"articleSection":["Cyber Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sectigostore.com\/blog\/a-man-in-the-browser-attack-what-it-is-how-to-prevent-it\/","url":"https:\/\/sectigostore.com\/blog\/a-man-in-the-browser-attack-what-it-is-how-to-prevent-it\/","name":"A Man in the Browser Attack: What It Is & How to Prevent It","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/a-man-in-the-browser-attack-what-it-is-how-to-prevent-it\/#primaryimage"},"image":{"@id":"https:\/\/sectigostore.com\/blog\/a-man-in-the-browser-attack-what-it-is-how-to-prevent-it\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/man-in-the-browser-attack.jpg","datePublished":"2020-06-26T13:41:04+00:00","dateModified":"2021-01-12T11:40:36+00:00","author":{"@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/41d095943b7798ade1bc3683c8822f15"},"description":"A man in the browser attack can impact any organization with an online presence as well as its users. Here's what to know about MitB attacks.","breadcrumb":{"@id":"https:\/\/sectigostore.com\/blog\/a-man-in-the-browser-attack-what-it-is-how-to-prevent-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sectigostore.com\/blog\/a-man-in-the-browser-attack-what-it-is-how-to-prevent-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sectigostore.com\/blog\/a-man-in-the-browser-attack-what-it-is-how-to-prevent-it\/#primaryimage","url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/man-in-the-browser-attack.jpg","contentUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/man-in-the-browser-attack.jpg","width":1600,"height":1000,"caption":"Back view of woman doing shopping online on website with digital tablet at home. Top view of lady on relaxing sofa. Rear view of girl hand touching screen while selecting product on e-commerce portal."},{"@type":"BreadcrumbList","@id":"https:\/\/sectigostore.com\/blog\/a-man-in-the-browser-attack-what-it-is-how-to-prevent-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sectigostore.com\/blog\/"},{"@type":"ListItem","position":2,"name":"A Man in the Browser Attack: What It Is &#038; How to Prevent It"}]},{"@type":"WebSite","@id":"https:\/\/sectigostore.com\/blog\/#website","url":"https:\/\/sectigostore.com\/blog\/","name":"InfoSec Insights","description":"SectigoStore.com Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sectigostore.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/41d095943b7798ade1bc3683c8822f15","name":"Medha Mehta","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g","caption":"Medha Mehta"},"description":"Medha is a regular contributor to InfoSec Insights. She's a tech enthusiast and writes about technology, website security, cryptography, cyber security, and data protection.","sameAs":["https:\/\/sectigostore.com\/"]}]}},"_links":{"self":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/1144","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/comments?post=1144"}],"version-history":[{"count":10,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/1144\/revisions"}],"predecessor-version":[{"id":2210,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/1144\/revisions\/2210"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media\/1147"}],"wp:attachment":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media?parent=1144"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/categories?post=1144"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/tags?post=1144"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}