Wednesday, March 26, 2025
HomeBrowserNew Phishing Attack Uses Browser-in-the-Browser Technique to Target Gamers

New Phishing Attack Uses Browser-in-the-Browser Technique to Target Gamers

Published on

SIEM as a Service

Follow Us on Google News

A sophisticated phishing campaign has been uncovered by Silent Push threat analysts, employing the browser-in-the-browser (BitB) technique to target gamers, particularly those playing Counter-Strike 2 on the Steam platform.

This campaign involves creating fake but realistic browser pop-up windows that mimic legitimate login pages, aiming to deceive users into divulging their Steam account credentials.

Example of a website selling Steam accounts with pricing

The attackers are exploiting the brand and identity of the professional eSports team Navi to enhance the credibility of their phishing sites.

Technical Details of the Attack

The BitB attacks are designed to appear as legitimate browser pop-ups, complete with a URL bar that displays the address of the real website, in this case, Steam.

However, these pop-ups are not actual browser windows and cannot be moved or resized outside the main browser frame.

According to the Report, this is a key indicator that can help users identify such phishing attempts.

The attackers have also been promoting their scam domains on platforms like YouTube, further expanding their reach.

The campaign includes websites in English and one in Mandarin, indicating a broad target audience.

Example of the Chinese phishing website in Mandarin with English wording

Impact and Mitigation

The motivation behind targeting Steam accounts is the potential resale value of these accounts, which can contain numerous games and sell for substantial sums.

Websites like playerauctions.com facilitate the sale of such accounts, providing a lucrative market for stolen credentials.

To protect against these attacks, users should be cautious of login pop-ups that cannot be moved or resized.

If a user suspects they have been phished, they should immediately change their account credentials and monitor for any further unauthorized activity.

Silent Push is providing tools and resources to track and mitigate these threats, including a free Community Edition platform that offers advanced threat detection capabilities.

The company is also sharing indicators of future attacks (IOFAs) to help the security community stay ahead of evolving phishing tactics.

As these BitB attacks continue to evolve, it is crucial for gamers and cybersecurity professionals to remain vigilant and adapt their defenses accordingly.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup – Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

DrayTek Router Vulnerability Exploited in the Wild – Linked to Reboot Loop Issue

The cybersecurity world has been abuzz with reports of widespread reboots affecting DrayTek routers...

Appsmith Developer Tool Vulnerability Exposes Systems to Remote Code Execution

A recent analysis by Rhino Security Labs has uncovered a series of critical vulnerabilities...

Google Chrome Zero-Day Vulnerability Actively Exploited in the Wild

Google has released an urgent update for its Chrome browser to patch a zero-day...

CISA Highlights Four ICS Flaws Being Actively Exploited

The Cybersecurity and Infrastructure Security Agency (CISA) released four significant Industrial Control Systems (ICS)...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

DrayTek Router Vulnerability Exploited in the Wild – Linked to Reboot Loop Issue

The cybersecurity world has been abuzz with reports of widespread reboots affecting DrayTek routers...

Appsmith Developer Tool Vulnerability Exposes Systems to Remote Code Execution

A recent analysis by Rhino Security Labs has uncovered a series of critical vulnerabilities...

Google Chrome Zero-Day Vulnerability Actively Exploited in the Wild

Google has released an urgent update for its Chrome browser to patch a zero-day...