IT Brief Asia - Technology news for CIOs & IT decision-makers
Story image

Server-side scanners fail at detecting malicious pages: Here's What to do about It

Thu, 27th Mar 2025

The web has undergone a remarkable transformation since its inception. What began as simple static HTML pages has evolved into complex applications built with intricate frameworks, dynamic content loading, and client-side rendering. In the early days, detecting malicious websites was relatively straightforward – security teams could monitor network traffic and identify suspicious content before it reached end users. Back then, what you saw in the HTTP response was essentially what rendered in the browser.

This simplicity created a security paradigm that's still deeply embedded in today's enterprise security architecture. Cloud proxies and secure web gateways route all traffic through central chokepoints where server-side scanners analyze content. URL scanners attempt to simulate web applications in headless or virtual browsers, trying to detect malicious pages and other threats before they reach users. These approaches worked reasonably well when websites were simpler and more predictable.

However, today's web landscape has fundamentally changed. Modern web applications are assembled dynamically with JavaScript frameworks, API calls, and client-side rendering engines. Critical parts of the application only materialize within the user's browser, making traditional server-side scanning increasingly ineffective. This shift has created a perfect opportunity for attackers to exploit the gap between what security tools see and what users experience.

Attackers now routinely employ techniques to serve different content to security scanners versus actual users. When a scanning engine visits a malicious site, it receives innocuous content that easily passes security filters. But when a real user visits the same URL, they're served a convincing brand impersonation page designed to steal credentials and sensitive information. This technique, known as cloaking, leverages browser fingerprinting to identify and evade security tools.

Beyond simple cloaking, attackers have developed numerous "last-mile reassembly" techniques that further challenge traditional security approaches. Malicious code fragments are distributed across multiple seemingly innocent resources, only combining into harmful content when rendered in the user's browser. Content might be loaded through WebSocket after initial page load, assembled through complex DOM manipulations, or constructed through multi-stage JavaScript execution – all invisible to server-side scanning (read more).

Even the most advanced cloud proxy solutions struggle with these techniques. Headless browsers used for security scanning can be detected through subtle behavioural differences, allowing attackers to identify and evade them. Client-side JavaScript obfuscation, delayed execution, and environment-specific triggers create additional layers of evasion that server-side tools simply cannot overcome.

The reality is that security teams are blind to a whole category of advanced attacks without visibility into the actual browser environment where content ultimately renders and executes. True protection against modern malicious pages requires security capabilities that operate where the attack actually materializes – in the user's browser itself. 

A Browser Detection and Response solution excels at malicious page detection by accessing the fully rendered webpage that users actually see. With visibility into DOM mutations, script execution, and visual elements as they assemble in real-time, it catches impersonation techniques that server-side scanners miss. Its distributed architecture creates a detection mesh across thousands of endpoints, making systematic evasion nearly impossible. By analysing the final, fully-rendered content rather than pre-assembly fragments, it identifies malicious pages with significantly higher precision when suspicious visuals appear or credential forms operate on unauthorized domains.

It's high time that Browser Detection and Response solutions get adopted widely across organisations.

Follow us on:
Follow us on LinkedIn Follow us on X
Share on:
Share on LinkedIn Share on X