Cyber Security News

Hackers Exploit JavaScript & CSS Tricks to Steal Browsing History

The web browsing history feature, designed to enhance user convenience by styling visited links differently, has inadvertently created a privacy vulnerability.

Hackers have exploited this feature, using JavaScript and CSS techniques to deduce users’ online habits, revealing a concerning loophole in digital privacy.

Browsers use the :visited CSS pseudo-class to style visited links differently from unvisited ones, enabling users to visually distinguish sites they’ve visited. However, attackers have turned this visual styling into a side-channel attack vector.

By analyzing variations in link styles—such as color or rendering time—malicious websites can determine which links a user has previously visited.

This privacy breach extends beyond current sessions, leaking browsing data for entirely different domains.

Evolution of Side-Channel Attacks

Over time, attackers have developed increasingly sophisticated methods to exploit this vulnerability. Among these are:

  • DOM Inspection: Directly analyzing CSS properties of anchor elements to check if a link is visited.
  • Timing Attacks: Measuring rendering times to differentiate visited links.
  • Pixel Color Attacks: Detecting subtle color changes, even when mitigations are in place.
  • Renderer Exploits: Advanced techniques like SpectreJS to extract internal data about visited links.

Such methods allow hackers to infer sensitive browsing behaviors, potentially exposing details about users’ health concerns, finances, or political views.

This opens doors to targeted advertising, enhanced browser fingerprinting, and even precise phishing attempts.

Research highlights the alarming potential for browser history to act as a digital fingerprint. Studies have shown that up to 97% of users have unique browsing patterns, making histories nearly as stable and identifiable as biometric data.

Further large-scale telemetry studies confirmed this figure at 99%, underlining the risk of deanonymization and profiling.

These findings drew attention from privacy regulators, including the GDPR, which regards browsing history as personal data.

Legacy Fixes Fall Short

Despite mitigations introduced in 2010—such as “lying” about visited style queries and limiting CSS properties for :visited links—the issue remained unresolved. These defenses were complex and often insufficient to thwart advanced techniques.

Now, the browser landscape is poised for a transformative change. A newly proposed approach, partitioned visited link history, promises to fix this vulnerability definitively.

Instead of maintaining a global list of visited links, browsers will store these records in a triple-keyed partition:

  1. Link URL: The link destination.
  2. Top-Level Site: The domain of the active browsing context.
  3. Frame Origin: The origin of the frame rendering the link.

Under this model, a visited link will only be styled as such if accessed from the same top-level site and frame origin.

For instance, a user’s visit to https://w3.org from https://example.com would not appear as visited when browsing https://malicious-site.com. This ensures privacy isolation and adheres to the web’s same-origin policy.

The new partitioned model not only protects against cross-site history leaks but also aligns with modern data protection regulations, setting a precedent for other browsers to follow.

Privacy engineers and users alike can look forward to a web that prioritizes security without compromising usability.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

Hack The box “Ghost” Challenge Cracked – A Detailed Technical Exploit

Cybersecurity researcher "0xdf" has cracked the "Ghost" challenge on Hack The Box (HTB), a premier…

9 hours ago

Sec-Gemini v1 – Google’s New AI Model for Cybersecurity Threat Intelligence

Google has unveiled Sec-Gemini v1, an AI model designed to redefine cybersecurity operations by empowering…

10 hours ago

U.S. Secures Extradition of Rydox Cybercrime Marketplace Admins from Kosovo in Major International Operation

The United States has successfully extradited two Kosovo nationals, Ardit Kutleshi, 26, and Jetmir Kutleshi,…

15 hours ago

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti Connect…

2 days ago

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing how…

2 days ago

EncryptHub Ransomware Uncovered Through ChatGPT Use and OPSEC Failures

EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of operational…

2 days ago