arstechnica.com Open in urlscan Pro
3.23.219.58  Public Scan

URL: https://arstechnica.com/information-technology/2022/03/behold-a-password-phishing-site-that-can-trick-even-savvy-users/
Submission: On March 22 via manual from US — Scanned from US

Form analysis 4 forms found in the DOM

GET /search/

<form action="/search/" method="GET" id="search_form">
  <input type="hidden" name="ie" value="UTF-8">
  <input type="text" name="q" id="hdr_search_input" value="" aria-label="Search..." placeholder="Search...">
</form>

POST https://arstechnica.com/civis/ucp.php?mode=login

<form id="login-form" action="https://arstechnica.com/civis/ucp.php?mode=login" method="post">
  <input type="text" name="username" id="username" placeholder="Username or Email" aria-label="Username or Email">
  <input type="password" name="password" id="password" placeholder="Password" aria-label="Password">
  <input type="submit" value="Submit" class="button button-orange button-wide" name="login">
  <label id="remember-label">
    <input type="checkbox" name="autologin" id="autologin"> Stay logged in</label> <span>|</span> <a href="/civis/ucp.php?mode=sendpassword" data-uri="53ec6d3f65bb7762a489b7a13824e81f">Having trouble?</a>
  <input type="hidden" name="redirect" value="./ucp.php?mode=login&amp;autoredirect=1&amp;return_to=%2Finformation-technology%2F2022%2F03%2Fbehold-a-password-phishing-site-that-can-trick-even-savvy-users%2F">
  <input type="hidden" name="return_to" value="/information-technology/2022/03/behold-a-password-phishing-site-that-can-trick-even-savvy-users/">
  <input type="hidden" name="from_homepage" value="1">
</form>

POST https://api.bounceexchange.com/capture/submit

<form id="bx-form-1063227-step-1" bx-novalidate="true" method="post" action="https://api.bounceexchange.com/capture/submit" onsubmit="return bouncex.submitCampaignStep(1063227); return false" onreset="bouncex.close_ad(1063227); return false"
  tabindex="0" aria-labelledby="bx-campaign-ally-title-1063227"><input type="hidden" name="campaign_id" value="1063227">
  <div class="bx-group bx-group-default bx-group-1063227-rQWiaQ5 bx-group-rQWiaQ5" id="bx-group-1063227-rQWiaQ5">
    <div class="bx-row bx-row-image bx-row-image-logo  bx-row-ICDTsc2 bx-element-1063227-ICDTsc2" id="bx-element-1063227-ICDTsc2"><img src="//assets.bounceexchange.com/assets/uploads/clients/2806/creatives/78dbf26fc8687b650f46e91adf23f5fa.svg"
        alt="logo"></div>
  </div>
  <div class="bx-group bx-group-default bx-group-1063227-9V7DjRk bx-group-9V7DjRk" id="bx-group-1063227-9V7DjRk">
    <div class="bx-row bx-row-text bx-row-text-default  bx-row-eLuSF9U bx-element-1063227-eLuSF9U" id="bx-element-1063227-eLuSF9U">
      <div>Join Ars Technica and</div>
    </div>
    <div class="bx-row bx-row-text bx-row-text-headline  bx-row-nNHNozp bx-element-1063227-nNHNozp" id="bx-element-1063227-nNHNozp">
      <div>Get Our Best Tech Stories</div>
    </div>
    <div class="bx-row bx-row-text bx-row-text-subheadline  bx-row-IMQMdcF bx-element-1063227-IMQMdcF" id="bx-element-1063227-IMQMdcF">
      <div>Delivered Straight to your Inbox.</div>
    </div>
  </div>
  <div class="bx-group bx-group-default bx-group-1063227-7Y4PFWQ bx-group-7Y4PFWQ" id="bx-group-1063227-7Y4PFWQ">
    <div class="bx-row bx-row-input bx-row-input-default  bx-row-VYWXDZZ bx-element-1063227-VYWXDZZ" id="bx-element-1063227-VYWXDZZ">
      <div class="bx-inputwrap"><input class="bx-el bx-input" id="bx-element-1063227-VYWXDZZ-input" type="email" name="email" placeholder="Email address" aria-required="true"></div>
      <div class="bx-component  bx-component-validation bx-vtext bx-error-1063227-email" id="bx-error-1063227-email">Please enter above</div>
    </div>
    <div class="bx-row bx-row-submit bx-row-submit-default  bx-row-KmYHkpO bx-element-1063227-KmYHkpO" id="bx-element-1063227-KmYHkpO"><button type="submit" class="bx-button" data-click="submit" data-step-delay="0" data-submit-jump="0"
        data-submit-force="0">SIGN ME UP</button></div>
  </div>
  <div class="bx-group bx-group-micro bx-group-1063227-B6Hxp6I bx-group-B6Hxp6I" id="bx-group-1063227-B6Hxp6I">
    <div class="bx-row bx-row-text bx-row-text-sosumi  bx-row-PqlU3Cr bx-element-1063227-PqlU3Cr" id="bx-element-1063227-PqlU3Cr">
      <div>Will be used in accordance with our</div>
    </div>
    <div class="bx-row bx-row-text bx-row-text-sosumi-link  bx-row-XAmqvwI bx-element-1063227-XAmqvwI" id="bx-element-1063227-XAmqvwI">
      <a href="http://www.condenast.com/privacy-policy/" target="_blank" class="" data-click="hyperlink" data-click-report="nothing"><div>Privacy Policy</div></a></div>
  </div><input autocomplete="carb-trap" type="input" name="carb-trap" tabindex="-1" aria-hidden="true" class="bx-input bx-carb-trap">
</form>

POST https://api.bounceexchange.com/capture/submit

<form id="bx-form-1063227-step-2" bx-novalidate="true" method="post" action="https://api.bounceexchange.com/capture/submit" onsubmit="return bouncex.submitCampaignStep(1063227); return false" onreset="bouncex.close_ad(1063227); return false"
  tabindex="0" aria-labelledby="bx-campaign-ally-title-1063227"><input type="hidden" name="campaign_id" value="1063227">
  <div class="bx-group bx-group-default bx-group-1063227-VnlQ1Q6 bx-group-VnlQ1Q6" id="bx-group-1063227-VnlQ1Q6">
    <div class="bx-row bx-row-image bx-row-image-logo  bx-row-wuBSHw3 bx-element-1063227-wuBSHw3" id="bx-element-1063227-wuBSHw3"><img src="//assets.bounceexchange.com/assets/uploads/clients/2806/creatives/78dbf26fc8687b650f46e91adf23f5fa.svg"
        alt=""></div>
  </div>
  <div class="bx-group bx-group-default bx-group-1063227-YytTDny bx-group-YytTDny" id="bx-group-1063227-YytTDny">
    <div class="bx-row bx-row-text bx-row-text-default  bx-row-73sFtao bx-element-1063227-73sFtao" id="bx-element-1063227-73sFtao">
      <div>Thanks!</div>
    </div>
    <div class="bx-row bx-row-text bx-row-text-headline  bx-row-YJNA5ZQ bx-element-1063227-YJNA5ZQ" id="bx-element-1063227-YJNA5ZQ">
      <div>You Are Successfully Subscribed</div>
    </div>
  </div>
</form>

Text Content

Skip to main content
 * Biz & IT
 * Tech
 * Science
 * Policy
 * Cars
 * Gaming & Culture
 * Store
 * Forums

Subscribe

Close


NAVIGATE

 * Store
 * Subscribe
 * Videos
 * Features
 * Reviews

 * RSS Feeds
 * Mobile Site

 * About Ars
 * Staff Directory
 * Contact Us

 * Advertise with Ars
 * Reprints


FILTER BY TOPIC

 * Biz & IT
 * Tech
 * Science
 * Policy
 * Cars
 * Gaming & Culture
 * Store
 * Forums


SETTINGS

Front page layout


Grid


List


Site theme

Black on white

White on black

Sign in


COMMENT ACTIVITY

Sign up or login to join the discussions!

Stay logged in | Having trouble?
Sign up to comment and more Sign up

DECEPTION —


BEHOLD, A PASSWORD PHISHING SITE THAT CAN TRICK EVEN SAVVY USERS


JUST WHEN YOU THOUGHT YOU'D SEEN EVERY PHISHING TRICK OUT THERE, BITB COMES
ALONG.

Dan Goodin - 3/21/2022, 6:47 PM

Enlarge
Getty Images

READER COMMENTS

153 with 125 posters participating, including story author

SHARE THIS STORY

 * Share on Facebook
 * Share on Twitter
 * Share on Reddit

When we teach people how to avoid falling victim to phishing sites, we usually
advise closely inspecting the address bar to make sure it does contain HTTPS and
that it doesn’t contain suspicious domains such as google.evildomain.com or
substitute letters such as g00gle.com. But what if someone found a way to phish
passwords using a malicious site that didn’t contain these telltale signs?

One researcher has devised a technique to do just that. He calls it a BitB,
short for "browser in the browser." It uses a fake browser window inside a real
browser window to spoof an OAuth page. Hundreds of thousands of sites use the
OAuth protocol to let visitors login using their existing accounts with
companies like Google, Facebook, or Apple. Instead of having to create an
account on the new site, visitors can use an account that they already have—and
the magic of OAuth does the rest.

Enter your email to get the Ars Technica newsletter
close dialog
Join Ars Technica and
Get Our Best Tech Stories
Delivered Straight to your Inbox.
Please enter above
SIGN ME UP
Will be used in accordance with our
Privacy Policy
Thanks!
You Are Successfully Subscribed
close dialog


EXPLOITING TRUST

The photo editing site Canva, for instance, gives visitors the option to login
using any of three common accounts. The images below show what a user sees after
clicking the "sign in" button; following that, the image show what appears after
choosing to sign in with a Google password. After the user chooses Google, a new
browser window with a legitimate address opens in front of the existing Canva
window.

Enlarge
Enlarge

The OAuth protocol ensures that only Google receives the user password. Canva
never sees the credentials. Instead, OAuth securely establishes a login session
with Google and, when the username and password check out, Google provides the
visitor with a token that gives access to Canva. (Something similar happens when
a shopper chooses a payment method like PayPal.)

Advertisement

Enlarge

The BitB technique capitalizes on this scheme. Instead of opening a genuine
second browser window that’s connected to the site facilitating the login or
payment, BitB uses a series of HTML and cascading style sheets (CSS) tricks to
convincingly spoof the second window. The URL that appears there can show a
valid address, complete with a padlock and HTTPS prefix. The layout and behavior
of the window appear identical to the real thing.

A researcher using the handle mr.d0x described the technique last week. His
proof-of-concept exploit starts with a Web page showing a painstakingly accurate
spoofing of Canva. In the event a visitor chooses to login using Apple, Google,
or Facebook, the fake Canva page opens a new page that embeds what looks like
the familiar-looking OAuth page.

mr.dox

This new page is also a spoof. It includes all the graphics a person would
expect to see when using Google to login. The page also has the legitimate
Google address displayed in what appears to be the address bar. The new window
behaves much like a browser window would if connected to a real Google OAuth
session.

If a potential victim opens the fake Canva.com page and tries to login with
Google, “it will open a new browser window and go to [what appears to be] the
URL accounts.google.com,” mr.d0x wrote in a message. In actuality, the fake
Canva site “doesn’t open a new browser window. It makes it LOOK like a new
browser window was opened but it’s only HTML/CSS. Now that fake window sets the
URL to accounts.google.com, but that's an illusion.”


MALVERTISERS: PLEASE DON'T READ THIS

A fellow security researcher was impressed enough by the demonstration to create
a YouTube video that more vividly shows what the technique looks like. It also
explains how the technique works and how easy it is to carry out.

Advertisement


Browser in the Browser (BITB) Phishing Technique - Created by mr.d0x

The BitB technique is simple and effective enough that it’s surprising it isn’t
better known. After mr.d0x wrote about the technique, a small chorus of fellow
researchers remarked how likely it would be for even more experienced Web users
to fall for the trick. (mr.d0x has made proof of concept templates available
here.)

“This browser-in-the-browser attack is perfect for phishing,” one developer
wrote. “If you're involved in malvertising, please don't read this. We don't
want to give you ideas.”

“Ooh that’s nasty: Browser In The Browser (BITB) Attack, a new phishing
technique that allows stealing credentials that even a web professional can’t
detect,” another person said.




The technique has been actively used in the wild at least once before. As
security firm Zscaler reported in 2020, scammers used a BitB attack in an
attempt to steal credentials for video game distribution service Steam.

Enlarge
Zscaler

While the method is convincing, it has a few weaknesses that should give savvy
visitors a foolproof way to detect that something is amiss. Genuine OAuth or
payment windows are in fact separate browser instances that are distinct from
the primary page. That means a user can resize them and move them anywhere on
the monitor, including outside the primary window.

BitB windows, by contrast, aren’t a separate browser instance at all. Instead,
they’re images rendered by custom HTML and CSS and contained in the primary
window. That means the fake pages can’t be resized, fully maximized or dragged
outside the primary window.

Unfortunately, as mr.d0x pointed out, these checks might be difficult to teach
“because now we move away from the ‘check the URL’” advice that’s standard.
“You’re teaching users to do something they never do.”

All users should protect their accounts with two-factor authentication. One
other thing more experienced users can do is right click on the popup page and
choose "inspect." If the window is a BitB spawn, its URL will be hardcoded into
the HTML.

It wouldn’t be surprising to find that the BitB technique has been more widely
used, but the reaction mr.d0x received demonstrates that many security defenders
aren't aware of BitB. And that means plenty of end users aren’t, either.


ARS VIDEO


UNSOLVED MYSTERIES OF QUANTUM LEAP WITH DONALD P. BELLISARIO




READER COMMENTS

153 with 125 posters participating, including story author

SHARE THIS STORY

 * Share on Facebook
 * Share on Twitter
 * Share on Reddit

Dan Goodin Dan is the Security Editor at Ars Technica, which he joined in 2012
after working for The Register, the Associated Press, Bloomberg News, and other
publications.
Email dan.goodin@arstechnica.com // Twitter @dangoodin001

Advertisement


You must login or create an account to comment.




CHANNEL ARS TECHNICA

UNSOLVED MYSTERIES OF QUANTUM LEAP WITH DONALD P. BELLISARIO

Today "Quantum Leap" series creator Donald P. Bellisario joins Ars Technica to
answer once and for all the lingering questions we have about his enduringly
popular show. Was Dr. Sam Beckett really leaping between all those time periods
and people or did he simply imagine it all? What do people in the waiting room
do while Sam is in their bodies? What happens to Sam's loyal ally Al? 30 years
following the series finale, answers to these mysteries and more await.

 * UNSOLVED MYSTERIES OF QUANTUM LEAP WITH DONALD P. BELLISARIO

 * UNSOLVED MYSTERIES OF WARHAMMER 40K WITH AUTHOR DAN ABNETT

 * SITREP: F-16 REPLACEMENT SEARCH A SIGNAL OF F-35 FAIL?

 * SITREP: BOEING 707

 * STEVE BURKE OF GAMERSNEXUS REACTS TO THEIR TOP 1000 COMMENTS ON YOUTUBE

 * MODERN VINTAGE GAMER REACTS TO HIS TOP 1000 COMMENTS ON YOUTUBE

 * HOW THE NES CONQUERED A SKEPTICAL AMERICA IN 1985

 * SCOTT MANLEY REACTS TO HIS TOP 1000 YOUTUBE COMMENTS

 * HOW HORROR WORKS IN AMNESIA: REBIRTH, SOMA AND AMNESIA: THE DARK DESCENT

 * LGR'S CLINT BASINGER REACTS TO HIS TOP 1000 YOUTUBE COMMENTS

 * THE F-35'S NEXT TECH UPGRADE

 * HOW ONE GAMEPLAY DECISION CHANGED DIABLO FOREVER

 * UNSOLVED MORTAL KOMBAT MYSTERIES WITH DOMINIC CIANCIOLO FROM NETHERREALM
   STUDIOS

 * US NAVY GETS AN ITALIAN ACCENT

 * HOW AMAZON’S “UNDONE” ANIMATES DREAMS WITH ROTOSCOPING AND OIL PAINTS

 * FIGHTER PILOT BREAKS DOWN EVERY BUTTON IN AN F-15 COCKPIT

 * HOW NBA JAM BECAME A BILLION-DOLLAR SLAM DUNK

 * LINUS "TECH TIPS" SEBASTIAN REACTS TO HIS TOP 1000 YOUTUBE COMMENTS

 * HOW ALAN WAKE WAS REBUILT 3 YEARS INTO DEVELOPMENT

 * HOW PRINCE OF PERSIA DEFEATED APPLE II'S MEMORY LIMITATIONS

 * HOW CRASH BANDICOOT HACKED THE ORIGINAL PLAYSTATION

 * MYST: THE CHALLENGES OF CD-ROM | WAR STORIES

 * MARKIPLIER REACTS TO HIS TOP 1000 YOUTUBE COMMENTS

 * HOW MIND CONTROL SAVED ODDWORLD: ABE'S ODDYSEE

 * BIOWARE ANSWERS UNSOLVED MYSTERIES OF THE MASS EFFECT UNIVERSE

 * CIVILIZATION: IT'S GOOD TO TAKE TURNS | WAR STORIES

 * SITREP: DOD RESETS BALLISTIC MISSILE INTERCEPTOR PROGRAM

 * WARFRAME'S REBECCA FORD REVIEWS YOUR CHARACTERS

 * SUBNAUTICA: A WORLD WITHOUT GUNS | WAR STORIES

 * HOW SLAY THE SPIRE’S ORIGINAL INTERFACE ALMOST KILLED THE GAME | WAR STORIES

 * AMNESIA: THE DARK DESCENT - THE HORROR FACADE | WAR STORIES

 * COMMAND & CONQUER: TIBERIAN SUN | WAR STORIES

 * BLADE RUNNER: SKINJOBS, VOXELS, AND FUTURE NOIR | WAR STORIES

 * DEAD SPACE: THE DRAG TENTACLE | WAR STORIES

 * TEACH THE CONTROVERSY: FLAT EARTHERS

 * DELTA V: THE BURGEONING WORLD OF SMALL ROCKETS, PAUL ALLEN'S HUGE PLANE, AND
   SPACEX GETS A CRUCIAL GREEN-LIGHT

 * CHRIS HADFIELD EXPLAINS HIS 'SPACE ODDITY' VIDEO

 * THE GREATEST LEAP, EPISODE 1: RISK

 * ULTIMA ONLINE: THE VIRTUAL ECOLOGY | WAR STORIES

More videos
← Previous story Next story →


RELATED STORIES

Sponsored Stories
Average Retirement Savings By Age: Are You Normal? SmartAsset
We are selling off our remaining magic metal windmills. acsthper
Most American Chrome Users Didn't Know This (Do It Now) guard.io
[Photos] Giraffe Woman Removes Neck Rings After 5 Years, This Is How She Looks
12Up
Banned Movies That You Will Never See Again Definition
27 New Sci-Fi and Fantasy Shows You Really Need to Watch Thrillist
Recommended by



TODAY ON ARS

 * Store
 * Subscribe
 * About Us
 * RSS Feeds
 * View Mobile Site

 * Contact Us
 * Staff
 * Advertise with us
 * Reprints


NEWSLETTER SIGNUP

Join the Ars Orbital Transmission mailing list to get weekly updates delivered
to your inbox.

Sign me up →

CNMN Collection
WIRED Media Group
© 2022 Condé Nast. All rights reserved. Use of and/or registration on any
portion of this site constitutes acceptance of our User Agreement (updated
1/1/20) and Privacy Policy and Cookie Statement (updated 1/1/20) and Ars
Technica Addendum (effective 8/21/2018). Ars may earn compensation on sales from
links on this site. Read our affiliate link policy.
Your California Privacy Rights | Cookies Settings
The material on this site may not be reproduced, distributed, transmitted,
cached or otherwise used, except with the prior written permission of Condé
Nast.
Ad Choices