A phishing kit has just been released that allows malicious users to create plausible and effective forms connections phishing using fake Chrome browser windows.
When you link to sites, you also see the option to connect with Google, Microsoft, Apple, Twitter or even Steam.
For example, the DropBox login form lets you sign in using an Apple or Google Account, as shown below.
With the new method, when you click the login buttons with Google or Apple, an identical single-sign-on (SSO) browser window will appear asking you to enter your credentials and sign in. with the account.
Malicious users used to try to create these fake SSO windows using HTML, CSS and JavaScript, but there was usually something that made them look suspicious.
Browser in the Browser attacks
Εδώ έρχεται η νέα μέθοδος "Browser in the Browser (BitB) Attack" που uses pre-made templates for creating fake but realistic Chrome popups that include custom URLs and titles that can be used in phishing attacks.
This attack creates fake browser windows inside the actual browser windows (Browser in the Browser) to create compelling phishing attacks.
Browser attack templates are already in place in GitHub. Includes Google Chrome windows for Windows and Mac with dark and light variants.
Attackers can simply download the templates, edit them to contain the desired URL, the title of window and then use an iframe to display the login form.
Kuba Gretzky, the creator of the Evilginx phishing toolkit, tested the new method and said it works perfectly with the Evilginx platform, which means it can be adapted to steal 2FA keys during phishing attacks.
So in the next period it would be good to be more careful with each login form. With the pre-built templates for fake Chrome windows, very convincing login forms for phishing will appear.
Good evening George. You are obviously talking about 2FA code theft from applications that generate 2FA codes. We're not talking about passwords being sent to our cell phones, are we? This is only done via SIM swapping as far as I know.
look
In the end it is much simpler than I imagined. The fake page just asks you for the 2FA key, as soon as you receive it you enter it in the fake page you have entered and the username and password and the hacker has everything he needs!
Thanks!
Can we find somewhere in detail if it is true that it can actually steal 2FA keys ???
The article mentions it briefly, but in a search I made on the subject I did not find anything related to the 2FA keys
need tools to steal 2fa, the Evilginx phishing toolkit for example already steals 2fa The new technique made it easier