Thank you for your interest in Obsidian! Please enter your information in the form and we will contact you shortly to schedule a demo.
Recently, we detected a phishing attack targeting one of our customers. In this blog post, we analyze the attack’s life cycle to show why you need a thoughtful solution to defend against sophisticated identity threats.
In a customer environment testing Obsidian’s browser extension, we observed two critical alerts triggered by the same user identity:
After investigating the user’s activity timeline, here’s how the attack unfolded:
Upon closer inspection, we discovered the phishing site used Cloudflare turnstiles to evade traditional detection methods. Despite the customer having an email security gateway (ESG) in place, it failed to catch the attack.
While this might seem like a routine phishing attempt, it underscores the complexity of modern phishing techniques. Successful attacks navigate multiple layers of an organization’s defenses across the tech stacks.
A Typical Phishing Path
Here’s a simplified view of the phishing attack:
Traditional defenses like email security filters can only go so far. As attackers evolve, they use techniques like CAPTCHA to bypass these defenses.
While the example above focuses on email-based phishing, attackers often employ alternative methods to circumvent corporate security:
These methods are frequently used in targeted attacks, exploiting personal information readily available online.
Phishing attacks span multiple layers of the tech stack, including:
The permutation of these tech stacks creates many attack paths, and the complexity of securing every layer grows exponentially. This underscores the need for robust security architecture.
To defend against phishing, organizations must evaluate their security controls across all layers. A key strategy is to identify choke points—critical areas that attackers cannot bypass. In SaaS environments, two natural choke points emerge:
At Obsidian, our strategy focuses on these choke points. Our browser extension provides real-time phishing detection and administers warnings when users visit malicious sites. If an attack slips past the browser extension, our detection systems analyze SaaS activity logs to identify suspicious behaviors, stopping potential breaches before they escalate.
Phishing attacks are evolving, with attackers finding creative ways to bypass traditional defenses. A layered approach that secures critical control points—such as the browser and SaaS applications—is key to preventing account takeovers and protecting against identity-based threats. Combining browser-based protection with SaaS monitoring and conditional access policies offers a strong defense against even the most sophisticated phishing attempts.