A browser-in-the-browser (BitB) attack is a new phishing technique that simulates a login window with a spoofed domain within a parent browser window to steal credentials. This attack primarily exploits the single sign-on (SSO) authentication model, which allows users to log in to different websites using their existing accounts from services like Google, Facebook, or Microsoft.
The BitB attack is very effective because it takes advantage of users’ familiarity and trust in the SSO authentication model, and their lack of attention to browser details. If the user enters their credentials in the fake pop-up window, they are sent to the attacker’s server, while the user may be redirected to the real service or shown an error message.
In this article
How does a Browser-in-the-Browser Attack Work?
If the user falls for the BitB attack and enters their credentials in the fake login form, they are sent to the attacker’s server via an AJAX request or a hidden form submission. The attacker can then use these credentials to access the user’s account on the real service, or launch further attacks such as identity theft or account takeover.
Real-World Examples of BitB Attacks
The BitB attack was first discovered and described by an infosec researcher and pentester known as mr.d0x on their website in April 2022. They demonstrated how this attack could be used to spoof Google’s SSO login page and steal users’ credentials.
Hackers recently used a ‘Browser–in–the–Browser’ to target Steam credentials: “It has a fake green lock sign, a fake URL field that can be copied, and even an additional Steam Guard window for two–factor authentication.” Some of the Steam accounts stolen in these campaigns were reportedly valued between $100,000 and $300,000.
Furthermore, Ghostwriter, a Belarus-based operator of a disinformation campaign in Europe, is using browser-in-the-browser to target organizations in Ukraine and other countries. The campaign is one of several tied to Ukraine that Google has been observing from various threat actors, including nation-state-backed groups from Iran, China, North Korea, and Russia, as well as criminal and financially motivated groups.
How to Protect Yourself Against BiTB Attacks?
The BitB attack is a sophisticated and dangerous phishing technique that can bypass many traditional security measures and deceive even vigilant users. However, there are some steps that users can take to protect themselves from this attack:
- Try to resize the window. If you are unable to, it is likely a fake browser window.
- Fake BiTB browser windows might not behave as expected if you close/minimize/maximize them.
- The look-and-feel of fake browser windows might not match your operating system, browser theme, etc.
- Pay attention to the details of the pop-up window, such as the size, position, appearance and behavior of the elements. If something looks off or unusual, you should close the window and report it.
- In general, be careful when clicking on links or opening documents from unknown or suspicious sources.
- Use a security-focused browser extension that can detect and block such phishing attempts automatically.
- Keep your browser up to date with the latest security patches and update whenever prompted by your browser.
- Make sure you have 2FA enabled for all of your critical services.
Prevent Browser-in-the-Browser Attacks with Perception Point
Perception Point Advanced Browser Security adds enterprise-grade security to standard browsers like Chrome, Edge, and Safari. The solution fuses advanced threat detection with browser-level governance and DLP controls providing organizations of all sizes with unprecedented ability to detect, prevent and remediate web threats including sophisticated phishing attacks, ransomware, exploits, Zero-Days, and more.
By transforming the organizational browser into a protected work environment, the access to sensitive corporate infrastructure and SaaS applications is secure from data loss and insider threats. The solution is seamlessly deployed on the endpoints via a browser extension and is managed centrally from a cloud-based console. There is no need to tunnel/proxy traffic through Perception Point.
An all-included managed Incident Response service is available for all customers 24/7. Perception Point’s team of cybersecurity experts will manage incidents, provide analysis and reporting, and optimize detection on-the-fly. The service drastically minimizes the need for internal IT or SOC team resources, reducing the time required to react and mitigate web-borne attacks by up to 75%.
Customers deploying the solution will experience fewer breaches, while providing their users with a better experience as they have the freedom to browse the web, use SaaS applications that they require, and access privileged corporate data, confidently, securely, and without added latency.
Contact us for a demo of our Advanced Browser Security solution, today.