Phishing Kit Lets Attackers Create Fake Chrome Browser Windows

Share post:

A new phishing kit called Evilginx can allow attackers to create a replica of login forms using a fake Chrome browser.

The attack creates fake browser windows within real browser Windows (Browser in the Browser) in a bid to make it more convincing.

The Browser in the Browser attack uses templates that imitate Chrome browser Windows. The templates were created by security researcher mr. d0x include those for Google Chrome, Windows, and Macs. The templates also offer dark and light mode variants.

Previously, threat actors can only create fake SSO windows using HTML, CSS, and JavaScript. Now, even wannabe cybercriminals can use the template to create a Chrome window to display single sign-on login forms for any online platform.

They can do that by downloading the templates and editing them to contain the desired URL and Window title. After that, they can use an iframe to display the login form.

It is also possible to add the HTML for the login form directly into the template. However, to do this, they will need to align the form properly using CSS and HTML.

For more information, read the original story in BleepingComputer.

Featured Tech Jobs

SUBSCRIBE NOW

Related articles

Controversial expansion of US surveillance powers nears Senate vote

The US Senate is poised to vote on a significant expansion of Section 702 of the Foreign Intelligence...

Russian-linked hackers target U.S. and European water systems

A Russian military-affiliated hacking group, Sandworm, is suspected of coordinating recent cyberattacks on water utilities in the U.S.,...

Cisco Duo’s Multifactor Authentication service compromised by social engineering attack

Cisco Duo, a prominent provider of multifactor authentication (MFA) services, has fallen victim to a cyberattack targeting one...

Cyber Security Today, April 17, 2024 – More suspicious attempts to take over open source projects, a data theft at a Cisco Duo partner,...

This episode reports on security updates from Delinea and PuTTY, and reports on bad bots and threat actors going after Zoo

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways