
Edeline said the exposure is away from theoretical, as Squarex is detecting customers against them and protecting them. “LMR allows the attackers to smuggle any malicious script, site, or file – including the known phishing site and malware – bypassing SWGs perfectly,” he explained. “Once it occurs inside the browser, enterprises cure the theft, data exfIs, and their existing tools face monitoring attacks without any overs.”
Squarex researchers have extended these findings into “data spling attacks”, showing that the attackers, or even internal threads, can use similar techniques to exfiltrate sensitive data. Whether copy-paste operations or peer-to-peer file sharing sites, data uncontrollably controls traditional data loss prevention (DLP).
According to Edeline, securing channels such as Webrtc and GRPC is difficult with traditional SASE or SSE tools, which lack browser-tier visibility and often force enterprises to completely block. Browser-foreign security, he said, these channels can protect in the browser by inspecting the phishing sites or malicious scripts in real-time by blocking malicious downloads to these channels.

