[jpshare]Critical Microsoft Edge Vulnerability Allows to steal the cookies and password revealed by Recent Research by PoC (Proof-of-Concepts) .This Vulnerability Discovered under bypass the Same Origin Policy (SOP).
This Vulnerability Allows to Bypass the victims cookies by force them to access the Malicious URL in Microsoft Edge browser.
This Vulnerability has been tested in Twitter Account by twit with Malicious URL and trick the active session twitter Account Holder to click the link .
Researcher Explained with (Proof-of-Concepts), Victims Clicks the link in Microsoft Edge browser, its will pop-up to the another Window which contain some information which makes to victim keep busy with Reading the particular page which popped up the new Window.
According to Researcher Victim opened a new inPrivate window and loaded the URL that Attacker sent him. What he didn’t know was that browser windows, even inPrivate, can communicate with each other.
window.open(“javascript:alert(document.cookie)”, “dm-post-iframe”);This Security Flow attacker’s ability to logout a user, load the login page, and steal the user’s credentials that are automatically filled in by the browser’s password autofill feature.
This Proof of Concepts Discover by the Edge Browser Hidden Auto fill future which leads to force the victims Logout the session and Log in again. Researcher Said.
According to Malwarebytes ,malvertising Act Without your knowledge a tiny piece of code hidden deep in the advert is making your computer go to criminal servers.
It will deploying their bad bits inside cheap banners from popular sites. If an attacker is hosted inside a Yahoo banner and the user is logged in into her Twitter account, she will be owned with no interactions, at all.These then catalogue details about your computer and its location, before choosing which piece of malware to send you. This doesn’t need a new browser window and you won’t know about it.
This vulnerability is Still Not Yet patched, This Vulnerability Versions of the proof-of-concept demos are explained in online [1, 2, 3] .
Caballero is providing the demos for download, so others can inspect the source code and make sure their passwords and cookies aren’t uploaded anywhere.
Also Researcher said ,Before running the PoC, consider that it is your account the one that will be exposed, Nothing is being sent to the network but if there’s somebody behind you, she will see your password in a regular alert dialog. Watch out!
Risk with Steganography and Importance of running Steganalysis with Network Systems
Using n1n3 to Simulate an evasive “Fileless” Malware – Proof Of Concept
Researchers observed Lumma Stealer activity across multiple online samples, including PowerShell scripts and a disguised…
Palo Alto Networks reported the Contagious Interview campaign in November 2023, a financially motivated attack…
The recent discovery of the NjRat 2.3D Professional Edition on GitHub has raised alarms in…
A critical vulnerability, CVE-2024-3393, has been identified in the DNS Security feature of Palo Alto…
Threat Analysts have reported alarming findings about the "Araneida Scanner," a malicious tool allegedly based…
A major dark web operation dedicated to circumventing KYC (Know Your Customer) procedures, which involves…