Attack Coverage: AitM, ClickFix, MFA Bypass, and Extension Risk

The Security Coverage Gap

Traditional security layers stop at the network or the OS. The browser session remains a black box for modern threats.

Email Gateway

SEG

Covered

Browser Session

Post-Click Activity

Blind Spot
Covered
with Surface Security

Endpoint Security

EDR

Covered

The Browser Is the New Battleground

70%

of malware is now browser-based, while email-based delivery dropped to 15%

Keep Aware, 2025

95%

of organizations experienced browser-based attacks in 2024

Keepnet Labs / VentureBeat

<10%

of enterprises have deployed any form of browser security today

Gartner, 2025

Attack Coverage Matrix

Every modern browser attack — named and neutralized.

Surface doesn't just say "phishing protection." We map our coverage to the exact tradecraft attackers are using right now — from device-code grants to ClickFix to malicious extension updates — so you can verify protection, not infer it.

BlockDetect & AlertGovern· 17 named techniques covered

Modern Phishing & Identity Attacks

Reverse-Proxy / AitM PhishingBlock

Evilginx-class kits, real-time MFA capture

Browser-in-the-Browser (BITB)Block

Fake OAuth and login windows rendered in-page

Evilginx-Style ToolkitsBlock

Session-relay phishing infrastructure

OAuth Consent PhishingBlock

Malicious app authorization and ConsentFix flows

ClickFix LuresBlock

Fake captchas tricking users into running attacker code

FileFix LuresBlock

Pseudo-fix flows that drop and stage payloads

GitHub Device-Code PhishingBlock

OAuth 2.0 device authorization grant abuse

Microsoft Device-Code PhishingBlock

Entra ID device-code grant abuse, MFA-bypassing

Local Payloads & Smuggling

HTML SmugglingBlock

Inline payload assembly inside the browser DOM

SVG / File SmugglingBlock

Polyglot file delivery from local storage

Credential Harvesting PagesBlock

Lookalike portals scored by Surface Vision

Session, Token & Extension Threats

Shadow Token / Session TouchDetect & Alert

Multi-plane deception alerts on stolen-session use

Malicious Extension UpdateBlock

Update-aware risk scoring with allow / block / quarantine

Stealer & Replay ActivityDetect & Alert

Anomalous reuse of cookies, tokens, or API keys

Data Movement & AI Risk

API Key & Secret PasteBlock

Pre-submit DLP on inputs, uploads, and code blocks

Shadow AI Paste / UploadGovern

Sanctioned and unsanctioned GenAI guardrails

Source Code & PII ExfiltrationBlock

Pattern + context aware blocks across SaaS surfaces

Don't see your threat model on the list? Surface ships with a custom rule engine and live policy hits, so SOC teams can model org-specific tradecraft and enforce it across every browser session inside the perimeter.

Security solutions for every scenario

From BYOD and contractor access to phishing defense and AI governance — browser-level protection where work actually happens.

Surface Security

Stop Renting Visibility.
Start Commanding It.

Join enterprise security leaders who own their browser attack surface with Surface.