My organization has moved away from Adobe Flash to HTML5 because of security concerns, but I've seen new research...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
that shows HMTL5 can be used to prevent detection of drive-by download attacks. How does this new malware obfuscation technique leverage HTML5, and what can we do about it?
Enterprises need to remember the state of software security and vulnerabilities is changing faster than ever before and will most likely outpace anything they can do to keep up. Enterprises need to have a rigorous security program to evaluate emerging risks. Today's new security control is tomorrow's new vulnerability. An enterprise security program needs to be nimble enough that if one security control or compensating control ceases to be effective, it can be replaced or retired without having to redesign the entire program.
Enterprise responses to this proof-of-concept malware obfuscation should be the same as with any new attack in which a vulnerability is identified in software or security controls. Researchers suggest enterprises could disable some of the functionality of HTML5 that is used in this attack to prevent infections. However, limiting the functionality on untrusted sites and allowing for trusted sites could be too restrictive. Ensure that Web browser and antimalware tools are updated so they can incorporate some of the other countermeasures recommended by the researchers. Be sure only trusted data is executed on endpoints and the new malware obfuscation techniques can be detected.
Ask the Expert:
Have a question about enterprise threats? Send it via email today. (All questions are anonymous.)
Learn more about attack obfuscation
Find out more about HTML 5 security features and risks
Learn if HTML 5 is really safer than Flash
Dig Deeper on Web application and API security best practices
Related Q&A from Nick Lewis
The Fruitfly Mac malware has decades-old code, but has been conducting surveillance attacks for over two years without detection. Expert Nick Lewis ...continue reading
A Gmail phishing attack brought users to fake login pages designed to look like Google's. Expert Nick Lewis explains how users can prevent similar ...continue reading
A HummingBad malware variant, HummingWhale, was discovered being spread through 20 apps on the Google Play Store. Expert Nick Lewis explains the ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.