{"id":76630,"date":"2025-05-11T05:30:55","date_gmt":"2025-05-11T05:30:55","guid":{"rendered":"https:\/\/mailinvest.blog\/index.php\/2025\/05\/11\/hackers-found-a-sneaky-new-way-to-steal-your-login-even-when-its-encrypted-heres-how-theyre-pulling-it-off\/"},"modified":"2025-05-11T05:31:58","modified_gmt":"2025-05-11T05:31:58","slug":"hackers-found-a-sneaky-new-way-to-steal-your-login-even-when-its-encrypted-heres-how-theyre-pulling-it-off","status":"publish","type":"post","link":"https:\/\/mailinvest.blog\/index.php\/2025\/05\/11\/hackers-found-a-sneaky-new-way-to-steal-your-login-even-when-its-encrypted-heres-how-theyre-pulling-it-off\/","title":{"rendered":"Hackers found a sneaky new way to steal your login even when it\u2019s encrypted &#8211; here\u2019s how they\u2019re pulling it off"},"content":{"rendered":"<p> <a href=\"https:\/\/go.fiverr.com\/visit\/?bta=1052423&nci=17043\" Target=\"_Top\"><img loading=\"lazy\" decoding=\"async\" border=\"0\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/fiverr.ck-cdn.com\/tn\/serve\/?cid=40081059\"  width=\"601\" height=\"201\"><\/a>\n<br \/><img decoding=\"async\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/cdn.mos.cms.futurecdn.net\/LqY7HKu9U9Ey8QoKMdnSzX-1200-80.jpg\" \/><\/p>\n<div id=\"article-body\">\n<hr\/>\n<ul>\n<li><strong>Bypasses electronic mail gateways and safety instruments by by no means hitting an actual server<\/strong><\/li>\n<li><strong>Blob URIs imply phishing content material isn\u2019t hosted on-line, so filters by no means see it coming<\/strong><\/li>\n<li><strong>No bizarre URLs, no dodgy domains, simply silent theft from a faux Microsoft login web page<\/strong><\/li>\n<\/ul>\n<hr\/>\n<p>Safety researchers have uncovered a collection of phishing campaigns that use a hardly ever exploited approach to steal login credentials, even when these credentials are protected by encryption.<\/p>\n<p>New analysis from <a data-analytics-id=\"inline-link\" href=\"https:\/\/cofense.com\/blog\/using-blob-urls-to-bypass-segs-and-evade-analysis\" target=\"_blank\" rel=\"nofollow\" data-url=\"https:\/\/cofense.com\/blog\/using-blob-urls-to-bypass-segs-and-evade-analysis\" referrerpolicy=\"no-referrer-when-downgrade\" data-hl-processed=\"none\">Cofense<\/a> warns the tactic depends on blob URIs, a browser function designed to show non permanent native content material, and cybercriminals are actually abusing this function to ship phishing pages.<\/p>\n<aside data-block-type=\"embed\" data-render-type=\"fte\" data-skip=\"dealsy\" data-widget-type=\"seasonal\" class=\"hawk-base\"\/>\n<p>Blob URIs are created and accessed totally inside a consumer&#8217;s browser, that means the phishing content material by no means exists on a public-facing server. This makes it extraordinarily troublesome for even essentially the most superior <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/news\/best-endpoint-security-software\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/news\/best-endpoint-security-software\">endpoint protection<\/a> techniques to detect.<\/p>\n<aside data-component-name=\"Recirculation:ArticleRiver\" data-nosnippet=\"\">\n<span class=\"bg-secondary-500 text-white text-lg font-bold uppercase py-1 px-2 leading-[1.625rem] sm:leading-[6px] sm:text-sm\"><br \/>\nYou might like<br \/>\n<\/span><\/p>\n<\/aside>\n<h2 id=\"a-hidden-technique-that-slips-past-defenses-3\">A hidden approach that slips previous defenses<\/h2>\n<p>In these campaigns, the phishing course of begins with an electronic mail that simply bypasses Safe Electronic mail Gateways (SEGs). These emails usually include a hyperlink to what seems to be a reputable web page, typically hosted on trusted domains akin to <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/tag\/microsoft\" data-auto-tag-linker=\"true\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/tag\/microsoft\">Microsoft<\/a>\u2019s OneDrive.<\/p>\n<p>Nevertheless, this preliminary web page doesn\u2019t host the phishing content material straight. As a substitute, it acts as an middleman, silently loading a threat-actor-controlled HTML file that decodes right into a blob URI.<\/p>\n<p>The result&#8217;s a faux login web page rendered inside the sufferer\u2019s browser, designed to carefully mimic Microsoft\u2019s sign-in portal.<\/p>\n<p>To the sufferer, nothing appears misplaced &#8211; no unusual URLs or apparent indicators of fraud &#8211; only a immediate to log in to view a safe message or entry a doc. As soon as they click on \u2018Register,\u2019 the web page redirects to a different attacker-controlled HTML file, which generates an area blob URI that shows the spoofed login web page.<\/p>\n<div id=\"slice-container-newsletterForm-articleInbodyContent-fywUwWbhbEjPtUuLw6CBK\" class=\"slice-container newsletter-inbodyContent-slice newsletterForm-articleInbodyContent-fywUwWbhbEjPtUuLw6CBK slice-container-newsletterForm\">\n<div data-hydrate=\"true\" class=\"newsletter-form__wrapper newsletter-form__wrapper--inbodyContent\">\n<div class=\"newsletter-form__container\">\n<section class=\"newsletter-form__top-bar\"\/>\n<section class=\"newsletter-form__main-section\">\n<p class=\"newsletter-form__strapline\">Signal as much as the TechRadar Professional e-newsletter to get all the highest information, opinion, options and steerage your enterprise must succeed!<\/p>\n<\/section>\n<\/div>\n<\/div>\n<\/div>\n<p>As a result of blob URIs function totally inside the browser\u2019s reminiscence and are inaccessible from outdoors the session, conventional safety instruments are unable to scan or block the content material.<\/p>\n<p>\u201cThis methodology makes detection and evaluation particularly difficult,\u201d stated Jacob Malimban of the Cofense Intelligence Staff.<\/p>\n<p>\u201cThe phishing web page is created and rendered regionally utilizing a blob URI. It\u2019s not hosted on-line, so it could actually\u2019t be scanned or blocked within the normal manner.\u201d<\/p>\n<p>Credentials entered on the spoofed web page are silently exfiltrated to a distant menace actor endpoint, leaving the sufferer unaware.<\/p>\n<p>AI-based safety filters additionally battle to catch these assaults, as blob URIs are hardly ever used maliciously and might not be well-represented in coaching knowledge. Researchers warn that except detection strategies evolve, this method is more likely to achieve traction amongst attackers.<\/p>\n<p>To defend towards such threats, organizations are urged to undertake superior Firewall-as-a-Service (<a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/best\/top-FWaaS-services\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/best\/top-FWaaS-services\">FWAAS<\/a>) and Zero Belief Community Entry (<a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/best\/ztna-solutions\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/best\/ztna-solutions\">ZTNA<\/a>) options that may assist safe entry and flag suspicious login exercise.<\/p>\n<h3 class=\"article-body__section\" id=\"section-you-might-also-like\"><span>You may additionally like<\/span><\/h3>\n<\/div>\n<iframe data-lazy=\"true\" data-src=\"https:\/\/www.fiverr.com\/gig_widgets?id=U2FsdGVkX18x7XQvttUTrv1oEqmGNGTgvvCUiUoJ\/AP4z\/UyMz8lXGOLpu15jIMxBbTR0gmD5uBoFvhC4KWeALQRp3h\/X\/AwcVD0K8Wj9H\/ZzYKzcCNHosB9oS4SCJJFWiN85P9ICAc4OgCoE\/wHKIY7CDkf2\/DQ1vqGvk4smVe5cRDEmrLPCWi4FC8p40VUhSmWQ5udCm0zoJtorgWv3vbDQw0kKYkwn39ozAnQXDe+YvWMxkLFWA+O3TFwkJvdkIK+\/AUSnRssPKt5WHY0FhNOxnSPcLslEL4G4\/RfP95ve99U+kRnDy3X+KtzdQLY+u935ghON\/o3UE4IMv9oN6JX9RnxzL\/LRcOgnHigxStSGPKsZYtnz8RWNVT\/rOLAibqiWJadC5MYHRbekF3eg6FOGrQGkXYbsn0+a5aovnlLCbLwIqY9fcS17UX8J235iQ6cdmHNbrPeS84CMm34RA==&affiliate_id=1052423&strip_google_tagmanager=true\" loading=\"lazy\" data-with-title=\"true\" class=\"fiverr_nga_frame\" frameborder=\"0\" height=\"350\" width=\"100%\" referrerpolicy=\"no-referrer-when-downgrade\" data-mode=\"random_gigs\" onload=\" var frame = this; var script = document.createElement('script'); script.addEventListener('load', function() { window.FW_SDK.register(frame); }); script.setAttribute('src', 'https:\/\/www.fiverr.com\/gig_widgets\/sdk'); document.body.appendChild(script); \" ><\/iframe>\n<br \/><a href=\"https:\/\/www.techradar.com\/pro\/cybercriminals-have-found-a-sneaky-way-of-stealing-tax-accounts-and-even-encrypted-messages-heres-what-you-need-to-know\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Bypasses electronic mail gateways and safety instruments by by no means hitting an actual server Blob URIs imply phishing content material isn\u2019t hosted on-line, so&#8230;<\/p>\n","protected":false},"author":1,"featured_media":76631,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-76630","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-universe"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hackers found a sneaky new way to steal your login even when it\u2019s encrypted - here\u2019s how they\u2019re pulling it off - mailinvest.blog<\/title>\n<meta name=\"description\" content=\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mailinvest.blog\/index.php\/2025\/05\/11\/hackers-found-a-sneaky-new-way-to-steal-your-login-even-when-its-encrypted-heres-how-theyre-pulling-it-off\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers found a sneaky new way to steal your login even when it\u2019s encrypted - here\u2019s how they\u2019re pulling it off - mailinvest.blog\" \/>\n<meta property=\"og:description\" content=\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mailinvest.blog\/index.php\/2025\/05\/11\/hackers-found-a-sneaky-new-way-to-steal-your-login-even-when-its-encrypted-heres-how-theyre-pulling-it-off\/\" \/>\n<meta property=\"og:site_name\" content=\"mailinvest.blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/freelanceracademic\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-11T05:30:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-11T05:31:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mailinvest.blog\/wp-content\/uploads\/2025\/05\/LqY7HKu9U9Ey8QoKMdnSzX.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin@mailinvest.blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin@mailinvest.blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/05\\\/11\\\/hackers-found-a-sneaky-new-way-to-steal-your-login-even-when-its-encrypted-heres-how-theyre-pulling-it-off\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/05\\\/11\\\/hackers-found-a-sneaky-new-way-to-steal-your-login-even-when-its-encrypted-heres-how-theyre-pulling-it-off\\\/\"},\"author\":{\"name\":\"admin@mailinvest.blog\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/person\\\/012701c4c204d4e4ebd34f926cfd31a4\"},\"headline\":\"Hackers found a sneaky new way to steal your login even when it\u2019s encrypted &#8211; here\u2019s how they\u2019re pulling it off\",\"datePublished\":\"2025-05-11T05:30:55+00:00\",\"dateModified\":\"2025-05-11T05:31:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/05\\\/11\\\/hackers-found-a-sneaky-new-way-to-steal-your-login-even-when-its-encrypted-heres-how-theyre-pulling-it-off\\\/\"},\"wordCount\":549,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/05\\\/11\\\/hackers-found-a-sneaky-new-way-to-steal-your-login-even-when-its-encrypted-heres-how-theyre-pulling-it-off\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/LqY7HKu9U9Ey8QoKMdnSzX.jpg\",\"articleSection\":[\"Tech Universe\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/05\\\/11\\\/hackers-found-a-sneaky-new-way-to-steal-your-login-even-when-its-encrypted-heres-how-theyre-pulling-it-off\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/05\\\/11\\\/hackers-found-a-sneaky-new-way-to-steal-your-login-even-when-its-encrypted-heres-how-theyre-pulling-it-off\\\/\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/05\\\/11\\\/hackers-found-a-sneaky-new-way-to-steal-your-login-even-when-its-encrypted-heres-how-theyre-pulling-it-off\\\/\",\"name\":\"Hackers found a sneaky new way to steal your login even when it\u2019s encrypted - here\u2019s how they\u2019re pulling it off - mailinvest.blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/05\\\/11\\\/hackers-found-a-sneaky-new-way-to-steal-your-login-even-when-its-encrypted-heres-how-theyre-pulling-it-off\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/05\\\/11\\\/hackers-found-a-sneaky-new-way-to-steal-your-login-even-when-its-encrypted-heres-how-theyre-pulling-it-off\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/LqY7HKu9U9Ey8QoKMdnSzX.jpg\",\"datePublished\":\"2025-05-11T05:30:55+00:00\",\"dateModified\":\"2025-05-11T05:31:58+00:00\",\"description\":\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/05\\\/11\\\/hackers-found-a-sneaky-new-way-to-steal-your-login-even-when-its-encrypted-heres-how-theyre-pulling-it-off\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/05\\\/11\\\/hackers-found-a-sneaky-new-way-to-steal-your-login-even-when-its-encrypted-heres-how-theyre-pulling-it-off\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/05\\\/11\\\/hackers-found-a-sneaky-new-way-to-steal-your-login-even-when-its-encrypted-heres-how-theyre-pulling-it-off\\\/#primaryimage\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/LqY7HKu9U9Ey8QoKMdnSzX.jpg\",\"contentUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/LqY7HKu9U9Ey8QoKMdnSzX.jpg\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2025\\\/05\\\/11\\\/hackers-found-a-sneaky-new-way-to-steal-your-login-even-when-its-encrypted-heres-how-theyre-pulling-it-off\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/mailinvest.blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hackers found a sneaky new way to steal your login even when it\u2019s encrypted &#8211; here\u2019s how they\u2019re pulling it off\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#website\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/\",\"name\":\"mailinvest.blog\",\"description\":\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis. mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\",\"publisher\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/mailinvest.blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\",\"name\":\"mailinvest\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/default.png\",\"contentUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/default.png\",\"width\":1000,\"height\":1000,\"caption\":\"mailinvest\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/freelanceracademic\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/person\\\/012701c4c204d4e4ebd34f926cfd31a4\",\"name\":\"admin@mailinvest.blog\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"caption\":\"admin@mailinvest.blog\"},\"sameAs\":[\"https:\\\/\\\/mailinvest.blog\",\"admin@mailinvest.blog\"],\"url\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/author\\\/adminmailinvest-blog\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackers found a sneaky new way to steal your login even when it\u2019s encrypted - here\u2019s how they\u2019re pulling it off - mailinvest.blog","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mailinvest.blog\/index.php\/2025\/05\/11\/hackers-found-a-sneaky-new-way-to-steal-your-login-even-when-its-encrypted-heres-how-theyre-pulling-it-off\/","og_locale":"en_US","og_type":"article","og_title":"Hackers found a sneaky new way to steal your login even when it\u2019s encrypted - here\u2019s how they\u2019re pulling it off - mailinvest.blog","og_description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","og_url":"https:\/\/mailinvest.blog\/index.php\/2025\/05\/11\/hackers-found-a-sneaky-new-way-to-steal-your-login-even-when-its-encrypted-heres-how-theyre-pulling-it-off\/","og_site_name":"mailinvest.blog","article_publisher":"https:\/\/www.facebook.com\/freelanceracademic\/","article_published_time":"2025-05-11T05:30:55+00:00","article_modified_time":"2025-05-11T05:31:58+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2025\/05\/LqY7HKu9U9Ey8QoKMdnSzX.jpg","type":"image\/jpeg"}],"author":"admin@mailinvest.blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin@mailinvest.blog","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mailinvest.blog\/index.php\/2025\/05\/11\/hackers-found-a-sneaky-new-way-to-steal-your-login-even-when-its-encrypted-heres-how-theyre-pulling-it-off\/#article","isPartOf":{"@id":"https:\/\/mailinvest.blog\/index.php\/2025\/05\/11\/hackers-found-a-sneaky-new-way-to-steal-your-login-even-when-its-encrypted-heres-how-theyre-pulling-it-off\/"},"author":{"name":"admin@mailinvest.blog","@id":"https:\/\/mailinvest.blog\/#\/schema\/person\/012701c4c204d4e4ebd34f926cfd31a4"},"headline":"Hackers found a sneaky new way to steal your login even when it\u2019s encrypted &#8211; here\u2019s how they\u2019re pulling it off","datePublished":"2025-05-11T05:30:55+00:00","dateModified":"2025-05-11T05:31:58+00:00","mainEntityOfPage":{"@id":"https:\/\/mailinvest.blog\/index.php\/2025\/05\/11\/hackers-found-a-sneaky-new-way-to-steal-your-login-even-when-its-encrypted-heres-how-theyre-pulling-it-off\/"},"wordCount":549,"commentCount":0,"publisher":{"@id":"https:\/\/mailinvest.blog\/#organization"},"image":{"@id":"https:\/\/mailinvest.blog\/index.php\/2025\/05\/11\/hackers-found-a-sneaky-new-way-to-steal-your-login-even-when-its-encrypted-heres-how-theyre-pulling-it-off\/#primaryimage"},"thumbnailUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2025\/05\/LqY7HKu9U9Ey8QoKMdnSzX.jpg","articleSection":["Tech Universe"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/mailinvest.blog\/index.php\/2025\/05\/11\/hackers-found-a-sneaky-new-way-to-steal-your-login-even-when-its-encrypted-heres-how-theyre-pulling-it-off\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/mailinvest.blog\/index.php\/2025\/05\/11\/hackers-found-a-sneaky-new-way-to-steal-your-login-even-when-its-encrypted-heres-how-theyre-pulling-it-off\/","url":"https:\/\/mailinvest.blog\/index.php\/2025\/05\/11\/hackers-found-a-sneaky-new-way-to-steal-your-login-even-when-its-encrypted-heres-how-theyre-pulling-it-off\/","name":"Hackers found a sneaky new way to steal your login even when it\u2019s encrypted - here\u2019s how they\u2019re pulling it off - mailinvest.blog","isPartOf":{"@id":"https:\/\/mailinvest.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mailinvest.blog\/index.php\/2025\/05\/11\/hackers-found-a-sneaky-new-way-to-steal-your-login-even-when-its-encrypted-heres-how-theyre-pulling-it-off\/#primaryimage"},"image":{"@id":"https:\/\/mailinvest.blog\/index.php\/2025\/05\/11\/hackers-found-a-sneaky-new-way-to-steal-your-login-even-when-its-encrypted-heres-how-theyre-pulling-it-off\/#primaryimage"},"thumbnailUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2025\/05\/LqY7HKu9U9Ey8QoKMdnSzX.jpg","datePublished":"2025-05-11T05:30:55+00:00","dateModified":"2025-05-11T05:31:58+00:00","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","breadcrumb":{"@id":"https:\/\/mailinvest.blog\/index.php\/2025\/05\/11\/hackers-found-a-sneaky-new-way-to-steal-your-login-even-when-its-encrypted-heres-how-theyre-pulling-it-off\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mailinvest.blog\/index.php\/2025\/05\/11\/hackers-found-a-sneaky-new-way-to-steal-your-login-even-when-its-encrypted-heres-how-theyre-pulling-it-off\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailinvest.blog\/index.php\/2025\/05\/11\/hackers-found-a-sneaky-new-way-to-steal-your-login-even-when-its-encrypted-heres-how-theyre-pulling-it-off\/#primaryimage","url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2025\/05\/LqY7HKu9U9Ey8QoKMdnSzX.jpg","contentUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2025\/05\/LqY7HKu9U9Ey8QoKMdnSzX.jpg","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/mailinvest.blog\/index.php\/2025\/05\/11\/hackers-found-a-sneaky-new-way-to-steal-your-login-even-when-its-encrypted-heres-how-theyre-pulling-it-off\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mailinvest.blog\/"},{"@type":"ListItem","position":2,"name":"Hackers found a sneaky new way to steal your login even when it\u2019s encrypted &#8211; here\u2019s how they\u2019re pulling it off"}]},{"@type":"WebSite","@id":"https:\/\/mailinvest.blog\/#website","url":"https:\/\/mailinvest.blog\/","name":"mailinvest.blog","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis. mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","publisher":{"@id":"https:\/\/mailinvest.blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mailinvest.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mailinvest.blog\/#organization","name":"mailinvest","url":"https:\/\/mailinvest.blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailinvest.blog\/#\/schema\/logo\/image\/","url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/default.png","contentUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/default.png","width":1000,"height":1000,"caption":"mailinvest"},"image":{"@id":"https:\/\/mailinvest.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/freelanceracademic\/"]},{"@type":"Person","@id":"https:\/\/mailinvest.blog\/#\/schema\/person\/012701c4c204d4e4ebd34f926cfd31a4","name":"admin@mailinvest.blog","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","caption":"admin@mailinvest.blog"},"sameAs":["https:\/\/mailinvest.blog","admin@mailinvest.blog"],"url":"https:\/\/mailinvest.blog\/index.php\/author\/adminmailinvest-blog\/"}]}},"_links":{"self":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/76630","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/comments?post=76630"}],"version-history":[{"count":1,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/76630\/revisions"}],"predecessor-version":[{"id":76632,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/76630\/revisions\/76632"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/media\/76631"}],"wp:attachment":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/media?parent=76630"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/categories?post=76630"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/tags?post=76630"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}