Thursday, April 24, 2025
HomeBrowserNew Phishing Attack Uses Browser-in-the-Browser Technique to Target Gamers

New Phishing Attack Uses Browser-in-the-Browser Technique to Target Gamers

Published on

SIEM as a Service

Follow Us on Google News

A sophisticated phishing campaign has been uncovered by Silent Push threat analysts, employing the browser-in-the-browser (BitB) technique to target gamers, particularly those playing Counter-Strike 2 on the Steam platform.

This campaign involves creating fake but realistic browser pop-up windows that mimic legitimate login pages, aiming to deceive users into divulging their Steam account credentials.

Example of a website selling Steam accounts with pricing

The attackers are exploiting the brand and identity of the professional eSports team Navi to enhance the credibility of their phishing sites.

- Advertisement - Google News

Technical Details of the Attack

The BitB attacks are designed to appear as legitimate browser pop-ups, complete with a URL bar that displays the address of the real website, in this case, Steam.

However, these pop-ups are not actual browser windows and cannot be moved or resized outside the main browser frame.

According to the Report, this is a key indicator that can help users identify such phishing attempts.

The attackers have also been promoting their scam domains on platforms like YouTube, further expanding their reach.

The campaign includes websites in English and one in Mandarin, indicating a broad target audience.

Example of the Chinese phishing website in Mandarin with English wording

Impact and Mitigation

The motivation behind targeting Steam accounts is the potential resale value of these accounts, which can contain numerous games and sell for substantial sums.

Websites like playerauctions.com facilitate the sale of such accounts, providing a lucrative market for stolen credentials.

To protect against these attacks, users should be cautious of login pop-ups that cannot be moved or resized.

If a user suspects they have been phished, they should immediately change their account credentials and monitor for any further unauthorized activity.

Silent Push is providing tools and resources to track and mitigate these threats, including a free Community Edition platform that offers advanced threat detection capabilities.

The company is also sharing indicators of future attacks (IOFAs) to help the security community stay ahead of evolving phishing tactics.

As these BitB attacks continue to evolve, it is crucial for gamers and cybersecurity professionals to remain vigilant and adapt their defenses accordingly.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup – Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Blue Shield Exposed Health Data of 4.7 Million via Google Ads

Blue Shield of California has disclosed a significant data privacy incident affecting up to...

Microsoft Offers $30,000 Bounties for AI Security Flaws

Microsoft has launched a new bounty program that offers up to $30,000 to security...

The Human Firewall: Strengthening Your Weakest Security Link

Despite billions spent annually on cybersecurity technology, organizations continue to experience breaches with alarming...

WhatsApp Launches Advanced Privacy Tool to Secure Private Chats

WhatsApp, the world’s leading messaging platform, has unveiled a major privacy upgrade called "Advanced...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Blue Shield Exposed Health Data of 4.7 Million via Google Ads

Blue Shield of California has disclosed a significant data privacy incident affecting up to...

Microsoft Offers $30,000 Bounties for AI Security Flaws

Microsoft has launched a new bounty program that offers up to $30,000 to security...

The Human Firewall: Strengthening Your Weakest Security Link

Despite billions spent annually on cybersecurity technology, organizations continue to experience breaches with alarming...