Exploit: Proton

Analysis of spam and virus filter logs showed no evidence of the exploit being used in the wild by malicious actors.

If successful, the script would run in the victim's session, allowing the attacker to "see" what the user sees—effectively stealing the decrypted content of their inbox. Proton's Response and Resolution Proton Exploit

When possible, use native desktop or mobile apps which often have different attack surfaces than web-based versions. If you'd like to refine this draft, tell me if you want to: Analysis of spam and virus filter logs showed

The attack required a specific sequence of actions to succeed, which limited its real-world viability: If you'd like to refine this draft, tell

An attacker would need to send two carefully crafted emails to the target.

Add details about other recent fixes (like the patch). Include SEO keywords tailored for cybersecurity audiences. Proton Mail's responsible vulnerability disclosure policy