InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: Sneaky 2FA phishing kit adds BitB pop-up designed to mimic browser address bar
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > Sneaky 2FA phishing kit adds BitB pop-up designed to mimic browser address bar
Technology

Sneaky 2FA phishing kit adds BitB pop-up designed to mimic browser address bar

November 18, 2025 6 Min Read
Share

Malware authors associated with the Phishing-as-a-Service (PhaaS) kit known as Sneaky 2FA have incorporated Browser-in-the-Browser (BitB) functionality into their arsenals, highlighting the continued evolution of such products, making it even easier for less-skilled attackers to launch large-scale attacks.

Push Security said in a report shared with The Hacker News that it observed the technique being used in phishing attacks aimed at stealing victims’ Microsoft account credentials.

BitB was first documented in March 2022 by security researcher mr.d0x, detailing how it utilizes a combination of HTML and CSS code to create a fake browser window that can masquerade as a legitimate service’s login page to facilitate credential theft.

“BitB is primarily designed to mask suspicious phishing URLs by simulating a very common feature of in-browser authentication: a pop-up login form,” Push Security said. “The BitB phishing page replicates the design of a pop-up window with an iframe pointing to a malicious server.”

To complete the deception, a pop-up browser window displays a legitimate Microsoft login URL, giving the victim the impression that they are entering their credentials on a legitimate page, when in fact it is a phishing page.

One attack chain the company observed provides a Cloudflare Turnstile check to users who visit a suspicious URL (“previewdoc(.)us”). The attack advances to the next stage only if the user passes the bot protection check. At this stage, you will see a page with a “Sign in with Microsoft” button to view the PDF document.

Once the button is clicked, a phishing page disguised as a Microsoft login form is loaded into the embedded browser using BitB technology, ultimately exposing the entered information and session details to the attacker, who can then use them to take over the victim’s account.

See also  Legacy Python bootstrap script creates domain takeover risk for multiple PyPI packages

In addition to using bot protection technologies like CAPTCHA and Cloudflare Turnstile to prevent security tools from accessing phishing pages, attackers leverage conditional loading techniques to ensure only intended targets have access, while filtering out remaining targets or redirecting them to a secure site instead.

The sneaky 2FA, first brought to our attention by Sekoia earlier this year, is known to employ a variety of methods to thwart analysis, including the use of obfuscation and disabling browser developer tools that prevent attempts to inspect web pages. Additionally, phishing domains are quickly rotated to minimize detection.

“Threakers are continually innovating phishing techniques, especially in the context of the increasingly specialized PhaaS ecosystem,” Push Security said. “As identity-based attacks continue to be the leading cause of breaches, attackers are incentivized to improve and harden their phishing infrastructure.”

The disclosure comes on the back of research that found that malicious browser extensions can be used to spoof passkey registrations and logins, potentially allowing threat actors to access corporate apps without a user’s device or biometrics.

The attack, dubbed the “Passkey Pwned Attack,” takes advantage of the fact that there is no secure communication channel between the device and the service, and the browser acting as an intermediary can be manipulated by malicious scripts or extensions, effectively hijacking the authentication process.

When you register or authenticate with a website using a passkey, the website calls WebAuthn APIs such as navigator.credentials.create() and navigator.credentials.get() to communicate through your web browser. This attack manipulates these flows through JavaScript injection.

“The malicious extension intercepts the call before it reaches the authentication system and generates a unique key pair (including a private and public key) controlled by the attacker,” SquareX said. “The malicious extension stores an attacker-controlled private key locally, allowing it to be reused to sign future authentication challenges on the victim’s device without generating a new key.”

A copy of the private key is also sent to the attacker, allowing him to access corporate apps on his device. Similarly, during the login phase, a call to “navigator.credentials.get()” is intercepted by the extension and the challenge is signed using the attacker’s private key created during registration.

See also  CISA adds actively exploited flaw in Sierra wireless routers that enables RCE attacks

That’s not all. Threat actors are also finding ways to circumvent phishing-resistant authentication methods like passkeys through so-called downgrade attacks. In this attack, man-in-the-middle (AitM) phishing kits like Tycoon can ask victims to choose between phishable and less secure options in exchange for allowing the use of a passkey.

“So even if a phish-resistant login method exists, the existence of a less secure backup method means your account is still vulnerable to phishing attacks,” Push Security noted in July 2025.

As attackers continue to refine their tactics, it’s important for users to be wary before opening suspicious messages or installing extensions on their browsers. Organizations can also employ conditional access policies to prevent account takeover attacks by restricting logins that don’t meet certain conditions.

Share This Article
Twitter Copy Link
Previous Article Razer's new gaming bag costs nearly $200 less than the Apple iPhone Pocket and does almost every feature better. Razer’s new gaming bag costs nearly $200 less than the Apple iPhone Pocket and does almost every feature better.
Next Article Justice has no expiration date. That's why 2020 election fraud still matters. Justice has no expiration date. That’s why 2020 election fraud still matters.

You Might Also Like

Spyware alerts, Mirai Strikes, Docker leaks, ValleyRAT rootkits — 20 more stories
Technology

Spyware alerts, Mirai Strikes, Docker leaks, ValleyRAT rootkits — 20 more stories

29 Min Read
US Department of Justice charges $54 for ATM jackpotting scheme using Ploutus malware
Technology

US Department of Justice charges $54 for ATM jackpotting scheme using Ploutus malware

5 Min Read
Researchers discover more than 30 flaws in AI coding tools that enable data theft and RCE attacks
Technology

Researchers discover more than 30 flaws in AI coding tools that enable data theft and RCE attacks

9 Min Read
ShadowRay 2.0 exploits unpatched Ray flaw to build self-spreading GPU cryptomining botnet
Technology

ShadowRay 2.0 exploits unpatched Ray flaw to build self-spreading GPU cryptomining botnet

5 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?