Connect with us

Security

Unmasking the Latest Tactic of Facebook Login Thieves: The Browser-in-Browser Trick

Published

on

Facebook Login Thieves Increasingly Use Browser-in-Browser Trick

Hackers have been resorting to the browser-in-the-browser (BitB) technique to deceive users into divulging their Facebook account details. This method, developed by security researcher mr.d0x in 2022, has been adopted by cybercriminals targeting various online platforms, including Facebook and Steam.

Research conducted by Trellix indicates that threat actors steal Facebook accounts to perpetrate scams, gather personal information, or engage in identity fraud. With over three billion active users, Facebook remains a prime target for fraudulent activities.

The BitB Phishing Technique

In a BitB attack, users visiting attacker-controlled websites encounter a fake browser pop-up containing a login form. This pop-up is created using an iframe that mimics the authentication interface of legitimate platforms, making the deception harder to detect.

Trellix reports that recent phishing campaigns targeting Facebook users impersonate law firms alleging copyright infringement, threatening immediate account suspension, or sending Meta security notifications regarding unauthorized logins.

Sample of an email used in the phishing attacks
Sample of an email used in the phishing attacks
Source: Trellix

To evade detection and enhance credibility, cybercriminals have incorporated shortened URLs and fake Meta CAPTCHA pages. Ultimately, victims are coerced into entering their Facebook credentials in a bogus pop-up window.

The malicious iframe mimicking a standard login page
The malicious iframe mimicking a standard login page
Source: Trellix

Additionally, Trellix has identified numerous phishing pages hosted on reputable cloud platforms like Netlify and Vercel. These pages imitate Meta’s Privacy Center portal, redirecting users to forms disguised as appeals that illicitly collect personal data.

Fake appeal form hosted on legitimate cloud infrastructure
Fake appeal form hosted on legitimate cloud infrastructure
Source: Trellix

These campaigns represent a significant advancement compared to conventional Facebook phishing schemes. The abuse of trusted infrastructure, such as legitimate cloud hosting services and URL shorteners, aids fraudsters in circumventing security measures and instilling a false sense of security in their phishing pages.

See also  Silent Listeners: Exploiting Vulnerabilities in Grandstream VoIP Phones for Covert Surveillance

The emergence of the Browser-in-the-Browser technique marks a substantial escalation in phishing tactics. By creating a custom fake login pop-up window within the victim’s browser, this method leverages users’ familiarity with authentication processes, making credential theft visually undetectable.

Protecting Against BitB Attacks

When users receive security alerts or infringement notifications, it is advisable to navigate to the official URL in a separate tab instead of clicking embedded links in emails. When prompted to enter credentials in login pop-ups, it is essential to check if the window can be moved outside the browser window, as iframes used in the BitB trick are confined to the underlying window.

Enabling two-factor authentication is a general recommendation for bolstering the security of online accounts. While not foolproof, this feature adds an extra layer of protection against unauthorized access, even if credentials are compromised.

Wiz

Whether you’re managing old keys or implementing safeguards for AI-generated code, this guide assists your team in building secure systems from the ground up.

Download the cheat sheet to simplify secrets management.

Trending