Saturday, May 17, 2025
HomeAndroidHackers Tricks You With Advanced Phishing Attack using Fake Address Bar on...

Hackers Tricks You With Advanced Phishing Attack using Fake Address Bar on Chrome for Android

Published on

SIEM as a Service

Follow Us on Google News

A new form of a sophisticated phishing attack on Android Chrome let hackers hide the original address bar’ screen space by displaying its own fake URL bar when the user scrolls down the web page.

Security researcher James fisher demonstrated this phishing attack by hosting his own domain (jameshfisher.com), and he exploits the flaw in chrome browser for mobile.

The fake address bar that associated with the phishing web page posed with legitimate site URL by intercept the original chrome bar.

- Advertisement - Google News

Normally, when we scroll down the web page, browser hides the URL bar and the webpage will overlap on it because the page accessed via “trustworthy browser UI”.

Here, the phishing site abusing this process by displaying its own fake URL bar that posed as a legitimate bar and trick users to give away their personal information.

This attack is even worse, generally when users scroll up the webpage they will again reach the original URL bar, but in this case, attackers can trick users to never reappear the original URL bar.

Researcher call it as “scroll jail”, a trick let move entire page content into it, when users scroll up the page using a new element overflow:scroll.

According to James Fisher, the user thinks they’re scrolling up in the page, but in fact they’re only scrolling up in the scroll jail! Like a dream in Inception, the user believes they’re in their own browser, but they’re actually in a browser within their browser.

Behalf of demonstration, Fisher using HSBC domain (www.hsbc.com) as a fake URL bar and, by using the same way attackers could use any legit website to intercept the URL bar and trick to steal the data.

“Is this a serious security flaw? Well, even I, as the creator of the inception bar, found myself accidentally using it! So I can imagine this technique fooling users who are less aware of it, and who are less technically literate. The only time the user has the opportunity to verify the true URL is on page load, before scrolling the page. After that, there’s not much escape.” Fisher said. He also believes that it might be a security flaw in Chrome browser.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

Free tool to Check Website Security, Mobile app, SSL Security & Phishing Test

Hackers Abuse GitHub Service to Host Variety of Phishing Kits to Steal Login Credentials

Google to Block Logins From Embedded Browser Frameworks to Protect From Phishing & MitM Attacks


Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for...

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign...

New Ransomware Attack Targets Elon Musk Supporters Using PowerShell to Deploy Payloads

A newly identified ransomware campaign has emerged, seemingly targeting supporters of Elon Musk through...

Printer Company Distributes Malicious Drivers Infected with XRed Malware

Procolored, a printer manufacturing company, has been found distributing software drivers infected with malicious...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

SSH Auth Key Reuse Uncovers Advanced Targeted Phishing Campaign

A meticulously orchestrated phishing campaign targeting Kuwait's fisheries, telecommunications, and insurance sectors has been...

Xanthorox Emerging BlackHat AI Tool Empowering Hackers in Phishing and Malware Campaigns

Artificial intelligence platform named Xanthorox has emerged as a potent new tool for cybercriminals,...

Kimsuky Hacker Group Deploys New Phishing Techniques and Malware Campaigns

The North Korean state-sponsored Advanced Persistent Threat (APT) group Kimsuky, also known as “Black...