Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 122

BREACH Attack

What is BREACH Attack?

BREACH AttackA 2013 side-channel attack that recovers HTTPS-protected secrets by exploiting HTTP-level compression and observing response sizes across attacker-influenced requests.


BREACH (Browser Reconnaissance and Exfiltration via Adaptive Compression of Hypertext) was disclosed at Black Hat USA 2013 by Gluck, Harris, and Prado. It targets web applications that gzip-compress HTTP responses containing both attacker-controlled input and a secret such as a CSRF token. By injecting guess strings and measuring the length of encrypted responses, the attacker performs a byte-by-byte compression-ratio oracle even when TLS itself is sound. Unlike CRIME, BREACH attacks HTTP body compression, so disabling TLS compression does not mitigate it. Defences include separating secrets from compressed bodies, masking tokens per request, rate limiting, length randomization, and CSRF-token rotation.

Examples

  1. 01

    Extracting an anti-CSRF token from a Gmail-style page that reflects user input alongside the token.

  2. 02

    Recovering OAuth state values from a compressed HTTPS response.

Frequently asked questions

What is BREACH Attack?

A 2013 side-channel attack that recovers HTTPS-protected secrets by exploiting HTTP-level compression and observing response sizes across attacker-influenced requests. It belongs to the Attacks & Threats category of cybersecurity.

What does BREACH Attack mean?

A 2013 side-channel attack that recovers HTTPS-protected secrets by exploiting HTTP-level compression and observing response sizes across attacker-influenced requests.

How does BREACH Attack work?

BREACH (Browser Reconnaissance and Exfiltration via Adaptive Compression of Hypertext) was disclosed at Black Hat USA 2013 by Gluck, Harris, and Prado. It targets web applications that gzip-compress HTTP responses containing both attacker-controlled input and a secret such as a CSRF token. By injecting guess strings and measuring the length of encrypted responses, the attacker performs a byte-by-byte compression-ratio oracle even when TLS itself is sound. Unlike CRIME, BREACH attacks HTTP body compression, so disabling TLS compression does not mitigate it. Defences include separating secrets from compressed bodies, masking tokens per request, rate limiting, length randomization, and CSRF-token rotation.

How do you defend against BREACH Attack?

Defences for BREACH Attack typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for BREACH Attack?

Common alternative names include: BREACH, HTTP compression side channel.

Related terms