• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

New Browser-in-the Browser (BITB) Attack Makes Phishing Nearly Undetectable

You are here: Home / General Cyber Security News / New Browser-in-the Browser (BITB) Attack Makes Phishing Nearly Undetectable
March 21, 2022

Browser-in-the Browser

A novel phishing method termed browser-in-the-browser (BitB) attack can be exploited to simulate a browser window inside of the browser in purchase to spoof a authentic area, thus generating it achievable to phase convincing phishing attacks.

In accordance to penetration tester and security researcher, who goes by the handle mrd0x_, the process normally takes benefit of 3rd-party single indication-on (SSO) options embedded on internet sites this kind of as “Sign in with Google” (or Fb, Apple, or Microsoft).

✔ Approved Seller From Our Partners
Malwarebytes Premium 2022

Protect yourself against all threads using Malwarebytes. Get Malwarebytes Premium with 60% discount from a Malwarebytes official seller SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Automatic GitHub Backups

Though the default actions when a user makes an attempt to indicator in by using these techniques is to be greeted by a pop-up window to total the authentication system, the BitB attack aims to replicate this full approach employing a combine of HTML and CSS code to develop an completely fabricated browser window.

Browser-in-the Browser

“Blend the window style with an iframe pointing to the malicious server hosting the phishing webpage, and it can be essentially indistinguishable,” mrd0x_ mentioned in a technical produce-up published previous 7 days. “JavaScript can be easily utilized to make the window show up on a url or button click, on the page loading and so on.”

Prevent Data Breaches

Although this process noticeably makes it less complicated to mount successful social engineering campaigns, it is well worth noting that possible victims have to have to be redirected to a phishing domain that can display screen such a phony authentication window for credential harvesting.

“But after landed on the attacker-owned website, the consumer will be at simplicity as they type their credentials away on what appears to be the authentic web-site (for the reason that the trusted URL states so),” mrd0x_ added.

Uncovered this post appealing? Abide by THN on Facebook, Twitter  and LinkedIn to examine much more exclusive information we article.


Some components of this post are sourced from:
thehackernews.com

Previous Post: «ransomware strikes scottish mental health charity Ransomware strikes Scottish mental health charity

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New Browser-in-the Browser (BITB) Attack Makes Phishing Nearly Undetectable
  • Ransomware strikes Scottish mental health charity
  • Australia launches $89 million cyber crime centre
  • AvosLocker Ransomware Striking Critical Infrastructure Targets
  • Former Apple worker alleged to have defrauded company out of $10 million
  • NFT Fraud in the UK Soars 400% in 2021
  • Over 40,000 London Voters Have Data Leaked to Strangers
  • New Backdoor Targets French Entities via Open-Source Package Installer
  • ‘CryptoRom’ Crypto Scam Abusing iPhone Features to Target Mobile Users
  • South Korean DarkHotel Hackers Targeted Luxury Hotels in Macau

Copyright © TheCyberSecurity.News, All Rights Reserved.