Google to Block Logins From Embedded Browser Frameworks to Protect From Phishing & MitM Attacks

Google announced a new security update to block users sign-in using Embedded browser frameworks in order to improve the protection against Phishing and MitM attacks.

Jonathan Skelker, Product Manager and Account Security at Google said,
“Form of phishing, known as “man in the middle” (MITM), is hard to detect when an embedded browser framework (e.g., Chromium Embedded Framework – CEF) or another automation platform is being used for authentication. “

Cybercriminals abusing this technology to perform Man-in-the-Middle attacks and steal the user’s credentials by intercepting the web traffic when Embedded browsers frameworks help users for the automated login process.

Embedded Browser Frameworks Lets Hackers Intercept the Traffic

If any users enter the Google account credentials on the phishing page that using Embedded browser frameworks will automate the login process by interacting with the original Google server.

Meanwhile, MITM attacker intercepts the communications between a user and Google in real-time to obtain the user’s credentials, and also this technique also used to bypass the 2-factor authentication.

Because we can’t differentiate between a legitimate sign in and a MITM attack on these platforms, we will be blocking sign-ins from embedded browser frameworks starting in June, Google said.

To prevent users from login based attacks, last year Google announced JavaScript to be enabled is require in your browser when users sign in so that Google can run a risk assessment whenever credentials are entered on a sign-in page and block the sign-in if we suspect an attack.

Similarly this new announcement brings more protection from credentials based phishing and Man-in-the-Middle attacks.

As an alternative method to embedded browser frameworks, Google suggested that developers use browser-based OAuth authentication, which enables users to see the full URL of the page where they’re entering their credentials.

“If you are a developer with an app that requires access to Google Account data, switch to using browser-based OAuth authentication today.”
Jonathan Skelker said.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Miner Malware Uses Multiple Propagation Methods to Infect Windows Machines and to Drop Monero Miner

Two Hackers of Bayrob Malware Gang Convicted for Infecting more than 400,000 Computers Worldwide


Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

NVIDIA NeMo Vulnerability Enables Remote Exploits

NVIDIA has issued an urgent security advisory addressing three high-severity vulnerabilities in its NeMo Framework,…

2 hours ago

Multiple Cisco Tools at Risk from Erlang/OTP SSH Remote Code Execution Flaw

Cisco has issued a high-severity advisory (cisco-sa-erlang-otp-ssh-xyZZy) warning of a critical remote code execution (RCE)…

3 hours ago

Commvault RCE Vulnerability Exploited—PoC Released

Enterprises and managed service providers globally are now facing urgent security concerns following the disclosure…

3 hours ago

Zyxel RCE Flaw Lets Attackers Run Commands Without Authentication

Security researcher Alessandro Sgreccia (aka "rainpwn") has revealed a set of critical vulnerabilities in Zyxel’s…

4 hours ago

Redis DoS Flaw Allows Attackers to Crash Servers or Drain Memory

A high-severity denial-of-service (DoS) vulnerability in Redis, tracked as CVE-2025-21605, allows unauthenticated attackers to crash servers…

6 hours ago

Google Warns: Threat Actors Growing More Sophisticated, Exploiting Zero-Day Vulnerabilities

Google’s Mandiant team has released its M-Trends 2025 report, highlighting the increasing sophistication of threat…

7 hours ago