Code Defence Cyber security

New “Matrix Push” C2 Uses Browser Notifications for Fileless Attacks

Researchers have identified “Matrix Push,” a new Command and Control (C2) framework that abuses legitimate browser push notifications to execute attacks. It creates a fileless persistence mechanism that is invisible to many traditional antivirus tools.

Business Impact

This technique allows attackers to bypass firewalls and maintain communication with compromised endpoints using standard web traffic (HTTPS). It can be used to deliver phishing links, malvertising, or commands to infected machines without dropping files on the disk.

Why It Happened

Attackers are exploiting the native “Push API” in modern browsers. Once a user is tricked into clicking “Allow” on a notification prompt, the browser maintains a persistent connection to the attacker’s server, even when the malicious website is closed.

Recommended Executive Action

Update browser security policies (Group Policy/MDM) to block push notification requests from all websites by default, or whitelist only approved domains. This eliminates the primary vector for this growing class of “browser-native” attacks.

Hashtags: #Malware #C2 #BrowserSecurity #Phishing #MatrixPush #CyberSecurity #EndpointProtection #InfoSec

Scroll to Top

Review My Order

0

Subtotal