InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: Sneaky 2FA phishing kit adds BitB pop-up designed to mimic browser address bar
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > Sneaky 2FA phishing kit adds BitB pop-up designed to mimic browser address bar
Technology

Sneaky 2FA phishing kit adds BitB pop-up designed to mimic browser address bar

November 18, 2025 6 Min Read
Share
Sneaky 2FA phishing kit adds BitB pop-up designed to mimic browser address bar
SHARE

Malware authors associated with the Phishing-as-a-Service (PhaaS) kit known as Sneaky 2FA have incorporated Browser-in-the-Browser (BitB) functionality into their arsenals, highlighting the continued evolution of such products, making it even easier for less-skilled attackers to launch large-scale attacks.

Push Security said in a report shared with The Hacker News that it observed the technique being used in phishing attacks aimed at stealing victims’ Microsoft account credentials.

BitB was first documented in March 2022 by security researcher mr.d0x, detailing how it utilizes a combination of HTML and CSS code to create a fake browser window that can masquerade as a legitimate service’s login page to facilitate credential theft.

“BitB is primarily designed to mask suspicious phishing URLs by simulating a very common feature of in-browser authentication: a pop-up login form,” Push Security said. “The BitB phishing page replicates the design of a pop-up window with an iframe pointing to a malicious server.”

To complete the deception, a pop-up browser window displays a legitimate Microsoft login URL, giving the victim the impression that they are entering their credentials on a legitimate page, when in fact it is a phishing page.

One attack chain the company observed provides a Cloudflare Turnstile check to users who visit a suspicious URL (“previewdoc(.)us”). The attack advances to the next stage only if the user passes the bot protection check. At this stage, you will see a page with a “Sign in with Microsoft” button to view the PDF document.

Once the button is clicked, a phishing page disguised as a Microsoft login form is loaded into the embedded browser using BitB technology, ultimately exposing the entered information and session details to the attacker, who can then use them to take over the victim’s account.

See also  Stealit malware exploits a single executable feature in Node.js via game and VPN installers

In addition to using bot protection technologies like CAPTCHA and Cloudflare Turnstile to prevent security tools from accessing phishing pages, attackers leverage conditional loading techniques to ensure only intended targets have access, while filtering out remaining targets or redirecting them to a secure site instead.

The sneaky 2FA, first brought to our attention by Sekoia earlier this year, is known to employ a variety of methods to thwart analysis, including the use of obfuscation and disabling browser developer tools that prevent attempts to inspect web pages. Additionally, phishing domains are quickly rotated to minimize detection.

“Threakers are continually innovating phishing techniques, especially in the context of the increasingly specialized PhaaS ecosystem,” Push Security said. “As identity-based attacks continue to be the leading cause of breaches, attackers are incentivized to improve and harden their phishing infrastructure.”

The disclosure comes on the back of research that found that malicious browser extensions can be used to spoof passkey registrations and logins, potentially allowing threat actors to access corporate apps without a user’s device or biometrics.

The attack, dubbed the “Passkey Pwned Attack,” takes advantage of the fact that there is no secure communication channel between the device and the service, and the browser acting as an intermediary can be manipulated by malicious scripts or extensions, effectively hijacking the authentication process.

When you register or authenticate with a website using a passkey, the website calls WebAuthn APIs such as navigator.credentials.create() and navigator.credentials.get() to communicate through your web browser. This attack manipulates these flows through JavaScript injection.

“The malicious extension intercepts the call before it reaches the authentication system and generates a unique key pair (including a private and public key) controlled by the attacker,” SquareX said. “The malicious extension stores an attacker-controlled private key locally, allowing it to be reused to sign future authentication challenges on the victim’s device without generating a new key.”

A copy of the private key is also sent to the attacker, allowing him to access corporate apps on his device. Similarly, during the login phase, a call to “navigator.credentials.get()” is intercepted by the extension and the challenge is signed using the attacker’s private key created during registration.

See also  Samsung zero-click vulnerability exploited to deploy LANDFALL Android spyware via WhatsApp

That’s not all. Threat actors are also finding ways to circumvent phishing-resistant authentication methods like passkeys through so-called downgrade attacks. In this attack, man-in-the-middle (AitM) phishing kits like Tycoon can ask victims to choose between phishable and less secure options in exchange for allowing the use of a passkey.

“So even if a phish-resistant login method exists, the existence of a less secure backup method means your account is still vulnerable to phishing attacks,” Push Security noted in July 2025.

As attackers continue to refine their tactics, it’s important for users to be wary before opening suspicious messages or installing extensions on their browsers. Organizations can also employ conditional access policies to prevent account takeover attacks by restricting logins that don’t meet certain conditions.

Share This Article
Twitter Copy Link
Previous Article Razer's new gaming bag costs nearly $200 less than the Apple iPhone Pocket and does almost every feature better. Razer’s new gaming bag costs nearly $200 less than the Apple iPhone Pocket and does almost every feature better.
Next Article Justice has no expiration date. That's why 2020 election fraud still matters. Justice has no expiration date. That’s why 2020 election fraud still matters.

Latest News

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

threat actor known as silver fox In attacks targeting Chinese…

December 4, 2025
Critical RSC bug in React and Next.js allows unauthenticated remote code execution

Critical RSC bug in React and Next.js allows unauthenticated remote code execution

A maximum severity security flaw has been disclosed in React…

December 3, 2025
India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India's Department of Telecommunications (DoT) has directed app-based telecom service…

December 2, 2025
India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India's Ministry of Telecommunications has reportedly asked major mobile device…

December 1, 2025
CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated…

November 30, 2025

You Might Also Like

Experts warn of widespread SonicWall VPN breach affecting over 100 accounts
Technology

Experts warn of widespread SonicWall VPN breach affecting over 100 accounts

4 Min Read
Europol dismantles SIM farm network running 49 million fake accounts worldwide
Technology

Europol dismantles SIM farm network running 49 million fake accounts worldwide

4 Min Read
Quantum Hacks to AI Defenses
Technology

From quantum hacks to AI defense – an expert guide to building unbreakable cyber resilience

7 Min Read
LastPass warns about fake repositories that infect MacOS with Atomic Infostealer
Technology

LastPass warns about fake repositories that infect MacOS with Atomic Infostealer

2 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?