Saturday, March 29, 2025
Homecyber securityZero-Hour Phishing Attacks Exploiting Browser Vulnerabilities Surge by 130%

Zero-Hour Phishing Attacks Exploiting Browser Vulnerabilities Surge by 130%

Published on

SIEM as a Service

Follow Us on Google News

Menlo Security, a leader in Secure Enterprise Browsers, has released its annual State of Browser Security Report, revealing a sharp rise in browser-based cyberattacks.

The report highlights a 130% surge in zero-hour phishing attacks and a significant increase in the exploitation of generative AI (GenAI) platforms for fraudulent activities.

Menlo Threat Intelligence analyzed over 752,000 browser-based phishing attacks to identify key trends shaping the cybersecurity landscape.

AI-Powered Threats Driving Attack Sophistication

The report underscores the growing use of AI-powered tools by cybercriminals to exploit browser vulnerabilities and evade traditional security defenses.

Generative AI fraud incidents reached nearly 600 cases in 2024, with attackers impersonating popular GenAI platforms to manipulate victims into sharing sensitive personal information.

These fraudulent sites often promise services like résumé creation but deliver malware-laden documents instead.

Andrew Harding, VP of Security Strategy at Menlo Security, noted that these attacks are shifting from credential theft to harvesting personal data through advanced social engineering techniques.

Browser Vulnerabilities as a Prime Target

Web browsers, being ubiquitous in both professional and personal use, remain a key target for cyberattacks.

Threat actors increasingly leverage tactics such as malicious ads on trusted websites, brand impersonation on collaboration tools like Slack and Microsoft Teams, and exploitation of vulnerabilities in major browsers like Chrome, Firefox, and Edge.

Legacy Reputation URL Evasion (LURE) techniques have also become prevalent, allowing attackers to bypass web filters by exploiting trusted domains.

Menlo Security’s findings reveal that nearly one million new phishing sites are created monthly, a staggering 700% increase since 2020.

Approximately 51% of browser-based phishing attempts involve brand impersonation, with Microsoft, Facebook, and Netflix being the most impersonated entities.

Alarmingly, 75% of phishing links are hosted on legitimate websites, with an average exposure window of six days before detection by legacy security tools.

The report highlights the increasing misuse of cloud services like AWS and CloudFlare for hosting phishing sites and ransomware.

These platforms accounted for nearly half of all instances of abused cloud hosting in 2024.

Four out of five hosting providers used by attackers were based in the U.S., reflecting the country’s prominence in digital transformation and reliance on cloud-based services.

Menlo Security emphasizes the urgent need for organizations to prioritize browser security as attackers continue to adopt AI-driven techniques to scale their operations.

Harding warned that one in five attacks in 2024 displayed evasive techniques designed to bypass traditional network and endpoint security controls.

This trend is expected to escalate further in 2025.

The full State of Browser Security Report provides detailed insights into major attack vectors, real-world examples, and actionable recommendations for security teams to mitigate risks associated with browser-based threats.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup – Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

SquareX Discloses Browser-Native Ransomware that Puts Millions at Risk

From WannaCry to the MGM Resorts Hack, ransomware remains one of the most damaging...

Hackers Exploit DNS MX Records to Create Fake Logins Imitating 100+ Brands

Cybersecurity researchers have discovered a sophisticated phishing-as-a-service (PhaaS) platform, dubbed "Morphing Meerkat," that leverages...

New Python-Based Discord RAT Targets Users to Steal Login Credentials

A recently identified Remote Access Trojan (RAT) has raised alarms within the cybersecurity community...

PJobRAT Android Malware Masquerades as Dating and Messaging Apps to Target Military Personnel

PJobRAT, an Android Remote Access Trojan (RAT) first identified in 2019, has resurfaced in...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Hackers Exploit DNS MX Records to Create Fake Logins Imitating 100+ Brands

Cybersecurity researchers have discovered a sophisticated phishing-as-a-service (PhaaS) platform, dubbed "Morphing Meerkat," that leverages...

New Python-Based Discord RAT Targets Users to Steal Login Credentials

A recently identified Remote Access Trojan (RAT) has raised alarms within the cybersecurity community...

PJobRAT Android Malware Masquerades as Dating and Messaging Apps to Target Military Personnel

PJobRAT, an Android Remote Access Trojan (RAT) first identified in 2019, has resurfaced in...