Squarex explains the browser-local ransom software that risks millions

Palo Alto, USA, March 28, 2025/CyberNewswire/-wannacry to MGM Resorts Hack, ransom software continues to be one of the most harmful cyber wires of plague businesses.
Chainalysis estimates that companies spend about $ 1 billion for ransom each year, but the larger cost usually comes from reputation damage and operational interruptions caused by the attack.
Ransom software attacks usually involve victims to download and install the critical data on the device, encrypting and/or deleted ransom software, only to deceive in a way that is restored in the ransom payment.
Traditionally, the primary goal of the ransom software was the device of the victim. However, thanks to the proliferation of cloud and saas services, the device no longer holds the keys of the kingdom.
Instead, the browser has become the primary way for employees to work with the Internet and interact with the Internet. In other words, the browser becomes a new endpoint.
The founder of Squarex,
Vivek ramachandran Attention, “As we have seen with the Chrome Store Oauth attack, with the last increase in browser-based identity attacks, we begin to see the evidence of the ‘components of the browser-local ransom waves used by competitors’. It will make it a necessity to fight with Ransomwares.
Unlike traditional ransom software, browser-local ransom software does not require any file reduction, which cannot completely detect them by extreme security solutions.
On the contrary, this attack aims to the victim’s digital identity, and uses the fact that cloud -based corporate storage and browser -based authentication is the primary passage to access these resources.
In case studies
A potential scenario involves the supply of a fake efficiency tool access to an user, where the victim can define all the saas applications to which the victim is saved. It can then systematically reset the password of these applications with AI intermediaries, save users on their own, and keep the corporate data stored as hostage in these applications.
Similarly, the attacker can target file sharing services such as Google Drive, Dropbox and OneDrive, and to copy and delete all files stored under their accounts using the identity of the victim. Critically, attackers can access all shared drivers, including those shared by their colleagues, customers and other third parties.
This significantly expands the attack surface of browser-natural ransom software, most of which is limited to a single device, which is limited to a single device.
As less and less files are downloaded, it is inevitable that attackers will follow where the work and valuable data are created and where they are stored. As browsers become a new endpoint, it is very important for businesses to reconsider browser security strategies-just as EDRs have critical importance to defend file-based ransom software, as well as a browser-local solution, the client side will be necessary to combat the next generation of ransom attacks.
Users can visit to learn more about this security research
About Squarex
In addition to browser ransom software, Squarex also provides protection against various browser threats, including identity attacks, malicious extensions, advanced Spearphishing, Genei DLP and internal threats.
Description of browser-native ransom software,
Users can contact us to learn more about Squarex’s BDR
Users can send e -mail for press questions about this description or browser errors year
Come into contact with
PR President
Junice Liew
Square
[email protected]This story was published by CyberNawswire under Hackernoon’s business blog program. Learn more about the program