• Bypasses electronic mail gateways and safety instruments by by no means hitting an actual server
  • Blob URIs imply phishing content material isn’t hosted on-line, so filters by no means see it coming
  • No bizarre URLs, no dodgy domains, simply silent theft from a faux Microsoft login web page

Safety researchers have uncovered a collection of phishing campaigns that use a hardly ever exploited approach to steal login credentials, even when these credentials are protected by encryption.

New analysis from Cofense warns the tactic depends on blob URIs, a browser function designed to show non permanent native content material, and cybercriminals are actually abusing this function to ship phishing pages.


Source link