Caution: Browser in the Browser attacks (BitB)

A phishing kit has just been released that allows malicious users to create credible and effective phishing logins using fake Chrome browser windows.

chrome

When you link to sites, you also see the option to connect with Google, Microsoft, Apple, Twitter or even Steam.

For example, the DropBox login form lets you sign in using an Apple or Google Account, as shown below.

With the new method, when you click the login buttons with Google or Apple, an identical single-sign-on (SSO) browser window will appear asking you to enter your credentials and sign in. with the account.

dropbox login

Malicious users used to try to create these fake SSO windows using HTML, CSS, and JavaScript, but there was usually something that made them look suspicious.

chrome sso

Browser in the Browser attacks

Here comes the new "Browser in the Browser (BitB) Attack" method that uses prefabricated templates to create fake but realistic Chrome pop-ups that include custom URLs and titles that can be used in phishing attacks.

  Firefox 70.0 (Quantum) download before official release

This attack creates fake browser windows inside the actual browser windows (Browser in the Browser) to create compelling phishing attacks.

Browser attack templates are already in place in GitHub. Includes Google Chrome windows for Windows and Mac with dark and light variants.

facebook phishing

Attackers can simply download the templates, edit them to include the desired URL, the window title, and then use an iframe to display the login form.

Kuba Gretzky, the creator of the Evilginx phishing toolkit, tested the new method and said it works perfectly with the Evilginx platform, which means it can be adapted to steal 2FA keys during phishing attacks.

So in the next period it would be good to be more careful with each login form. With the pre-built templates for fake Chrome windows, very convincing login forms for phishing will appear.

Registration in iGuRu.gr via email

Your email for sending each new post

Follow us on Google News iGuRu.gr at Google news

5 Comments

  1. Good evening George. You are obviously talking about 2FA code theft from applications that generate 2FA codes. We're not talking about passwords being sent to our cell phones, are we? This is only done via SIM swapping as far as I know.

  2. Can we find somewhere in detail if it is true that it can actually steal 2FA keys ???
    The article mentions it briefly, but in a search I made on the subject I did not find anything related to the 2FA keys

Leave a reply

Your email address Will not be published.

18 +    = 27

Previous Story

Lazesoft Recovery Suite Home Edition 4.5 free for everyone

Next Story

How to change the need for passwords