Friday, May 9, 2025
HomeBrowserNew Phishing Attack Uses Browser-in-the-Browser Technique to Target Gamers

New Phishing Attack Uses Browser-in-the-Browser Technique to Target Gamers

Published on

SIEM as a Service

Follow Us on Google News

A sophisticated phishing campaign has been uncovered by Silent Push threat analysts, employing the browser-in-the-browser (BitB) technique to target gamers, particularly those playing Counter-Strike 2 on the Steam platform.

This campaign involves creating fake but realistic browser pop-up windows that mimic legitimate login pages, aiming to deceive users into divulging their Steam account credentials.

Example of a website selling Steam accounts with pricing

The attackers are exploiting the brand and identity of the professional eSports team Navi to enhance the credibility of their phishing sites.

- Advertisement - Google News

Technical Details of the Attack

The BitB attacks are designed to appear as legitimate browser pop-ups, complete with a URL bar that displays the address of the real website, in this case, Steam.

However, these pop-ups are not actual browser windows and cannot be moved or resized outside the main browser frame.

According to the Report, this is a key indicator that can help users identify such phishing attempts.

The attackers have also been promoting their scam domains on platforms like YouTube, further expanding their reach.

The campaign includes websites in English and one in Mandarin, indicating a broad target audience.

Example of the Chinese phishing website in Mandarin with English wording

Impact and Mitigation

The motivation behind targeting Steam accounts is the potential resale value of these accounts, which can contain numerous games and sell for substantial sums.

Websites like playerauctions.com facilitate the sale of such accounts, providing a lucrative market for stolen credentials.

To protect against these attacks, users should be cautious of login pop-ups that cannot be moved or resized.

If a user suspects they have been phished, they should immediately change their account credentials and monitor for any further unauthorized activity.

Silent Push is providing tools and resources to track and mitigate these threats, including a free Community Edition platform that offers advanced threat detection capabilities.

The company is also sharing indicators of future attacks (IOFAs) to help the security community stay ahead of evolving phishing tactics.

As these BitB attacks continue to evolve, it is crucial for gamers and cybersecurity professionals to remain vigilant and adapt their defenses accordingly.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup – Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

FBI Warns Hackers Are Using End-of-Life Routers to Mask Their Tracks

The Federal Bureau of Investigation (FBI) has issued a stark warning to businesses and...

Azure Storage Utility Vulnerability Allows Privilege Escalation to Root Access

A critical vulnerability discovered by Varonis Threat Labs has exposed users of Microsoft Azure’s...

Critical Vulnerability in Ubiquiti UniFi Protect Camera Allows Remote Code Execution by Attackers

Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score...

IXON VPN Client Vulnerability Allows Privilege Escalation for Attackers

A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux,...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

FBI Warns Hackers Are Using End-of-Life Routers to Mask Their Tracks

The Federal Bureau of Investigation (FBI) has issued a stark warning to businesses and...

Azure Storage Utility Vulnerability Allows Privilege Escalation to Root Access

A critical vulnerability discovered by Varonis Threat Labs has exposed users of Microsoft Azure’s...

Critical Vulnerability in Ubiquiti UniFi Protect Camera Allows Remote Code Execution by Attackers

Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score...