How can virtual meeting hijackers be halted by a remote browser?

How can virtual meeting hijackers be halted by a remote browser? ...

Virtual meetings continue to attract cyberattackers who use them to distribute ransomware, including GIF-based account takeover attacks. Zoom partnered with Zoom to increase its capabilities to help stop hackers from sending malware and account takeover attempts via chat on its platform. This week, the company has pledged to implement additional security and privacy safeguards as part of a legal settlement.

Before the epidemic, many CISOs were wary of the first generations of virtual meeting platforms. One of the reasons why virtual meeting platforms did not grow faster was because to the fact that they can hide malware in HTML, JavaScript, and browser code before attacks aimed at secured endpoints. Laterally, cyberattackers move across an enterprise network and initiate additional malware attacks.

Cyberattacks growing more sophisticated

An example of how users successfully used a GIF message to launch a worm-like malware variant through organizations montres how vulnerabilitysome Teams and Microsoft-based applications can be.

The CyberArks post demonstrates how Microsoft responded swiftly to the threat, stating that hackers could traverse an organization and gain access to confidential, confidential data. Moreover, cyberattacks have become a new way for them to gain access to privileged access credentials without having to steal them first.

The following illustration demonstrates how the GIF-based attack performed.

Why remote browser isolation works

Due to the high cost of the legal settlement this week, Zoom and other virtual meeting platforms have developed unprecedented security. However, many enterprises initially agreed to migrate their legacy teleconferencing systems as slow and intuitive as they were, owing to Zoom''s security concerns.

Virtual and hybrid teams are flourishing across all organizations since the start of the epidemic and are continuing to flourish, posing unprecedented security hazards for virtual meeting sessions. This makes CISOs and CIOs jobs challenging to maintain the proliferation of personal, unmanaged devices.

The rise of remote browser isolation (RBI) in the past two years is a response to the needs that organizations must include a more zero trust security-based approach to all web sessions, regardless of where they are located. As a result, Ericom is the only one to have successfully developed and delivered a scalable solution that meets the demanding technological demands of securing virtual meetings globally. It has applied for a patent for their innovations in this area.

The RBI is proving to be a more secure alternative to downloading clients that lack of security and may result in software failures on certain endpoints. In the past, virtual devices such as a microphone, a webcam, or desktop within the container are synchronized with other devices.

Only safe rendering information for isolated users media is streamed from the container to participants endpoint browsers. Isolated users likewise receive only safe renderings of media originating from otherparticipants. In addition, policies restrict what users may share in virtual meetings via screen shares and chats. No images, video or audio of meetings are cached in participants browsers, thus they cannot be recovered and shared. The solution also prevents the illicit recording of meetings.

Turning a cautionary tale into a proactive strategy

Virtual meetings keep teams working, creating and accomplishing complex tasks together. CIOs and CISOs who enable the underlying virtual meeting technologies must continue to be transparent about the security risks of virtual meeting platforms. However, every CIO I know still speaks about when virtual meeting platforms come up in discussions.

The ability to isolate virtual meetings can alleviate CIOs and CISOs who want a solution that can scale across unmanaged devices. In parallel with RBI, organizations have adopted a more zero trust-based strategy to safeguard every threat surface and reduce enterprise risk.

You may also like: