Security News > 2022 > April > “Browser in the Browser” attacks: A devastating new phishing technique arises

Browser in the browser attacks consist of simulating a browser window within the browser to spoof a legitimate domain.
The principle is pretty straightforward: The user connects to a website, which in turn opens a new browser window that asks for Google, Apple, Microsoft or other third parties' credentials, to allow the user to log in.
Google's Threat Analysis Group reported a new attack campaign from known threat actor Ghostwriter.
The threat actor originates from Belarus and has deployed BITB attacks with the phishing pages being hosted by a compromised website.
We suspect a lot more threat actors will quickly adapt and use this new technique in their attack campaigns.
The best ways to avoid BITB attacks are actually the same as for usual phishing.
News URL
https://www.techrepublic.com/article/browser-in-the-browser-attacks-arise/
Related news
- Three Reasons Why the Browser is Best for Stopping Phishing Attacks (source)
- Phishing platform 'Lucid' behind wave of iOS, Android SMS attacks (source)
- iOS devices face twice the phishing attacks of Android (source)
- Browser extensions make nearly every employee a potential attack vector (source)
- Windows NTLM hash leak flaw exploited in phishing attacks on governments (source)
- Phishing detection is broken: Why most attacks feel like a zero day (source)
- DPRK Hackers Steal $137M from TRON Users in Single-Day Phishing Attack (source)
- Low-tech phishing attacks are gaining ground (source)
- MintsLoader Drops GhostWeaver via Phishing, ClickFix — Uses DGA, TLS for Stealth Attacks (source)
- Focused Phishing: Attack Targets Victims With Trusted Sites and Live Validation (source)