In today’s digital world, cyber attacks are as diverse as they are threatening. Some attacks like DDoS target vulnerabilities in networks. Others such as phishing exploit social engineering tactics to trick unsuspecting individuals. But many others, including JavaScript-Binding-Over-HTTP (JBOH) attacks, target specific weaknesses in endpoints. To effectively defend against all these attacks, a foundational understanding of what they are and how they work is required.

What is JavaScript-Binding-Over-HTTP (JBOH)

JavaScript-Binding-Over-HTTP is a type of mobile device attack targeting android users. Through a malicious or compromised application, attackers can execute arbitrary code. In other words, they can remotely activate any code or command they please to enact the attack. The applications used in JBOH attacks are normally from smaller and less well known developers on the Google Play Store. They rely on keeping their malicious nature hidden from both the user and any moderating party before the attack has taken place.

How does a JBOH attack happen?

JBOH attacks begin with an attacker making or compromising an application. It is then made available on the Google Play Store. Here, an unsuspecting user downloads the application onto their mobile device. Once in place, the hacker is able to execute arbitrary code remotely. The specific nature of the attack will vary from case to case. For example, some attacks may be done to listen in on the user’s actions or communications. Alternatively, data could be encrypted to be used as ransom.

JavaScript-Binding-Over-HTTP (JBOH)

How are JBOH attacks prevented?

On the user end, JBOH attacks can be prevented by educating yourself and your employees. Everyone should follow general caution and safety measures when downloading applications onto their mobile devices. This is especially true for those handling sensitive information or data on the same mobile devices. Tips include:

  • Not downloading obscure applications from new and not verifiable developers
  • Checking reviews and other user testimonials first
  • Utilizing endpoint security solutions to keep devices safe

While some applications used for JBOH attacks are made by the hackers themselves, many others are simply compromised applications. For the coders and developers of these apps, good care should be taken to eradicate vulnerabilities. To do this, we would recommend following the OWASP top 10 guidelines.

Fortunately, JBOH attacks are relatively infrequent. However, it always pays off in the long run to be prepared against them and other cyber attacks. You can read more on Cybersecurity for small businesses on securing from such JavaScript Binding Over HTTP attacks.

Learn more with Sangfor

If you want to learn more about JBOH attacks, please contact a member of our team.

Sangfor also offers a range of cyber security solutions designed to keep your business safe in the digital world. Learn more about Sangfor's solutions here.

Listen To This Post

Search

Get in Touch

Get in Touch with Sangfor Team for Business Inquiry

Related Glossaries

Cyber Security

SASE vs SD-WAN: What’s the Difference?

Date : 30 Apr 2024
Read Now
Cyber Security

Zero Trust Network Access (ZTNA) vs Virtual Private Network (VPN): What’s the Difference?

Date : 29 Apr 2024
Read Now
Cyber Security

What is a Tailgating Attack?

Date : 28 Apr 2024
Read Now

See Other Product

Cyber Command - NDR Platform
Endpoint Secure
Internet Access Gateway (IAG)
Sangfor Network Secure - Next Generation Firewall
Platform-X
Sangfor Access Secure