New Phishing Attack Using Browser-in-the-Browser Technique Targets Gamers

A sophisticated phishing campaign has been uncovered by Silent Push threat analysts, targeting gamers, particularly those playing Counter-Strike 2 on the Steam platform.

This campaign employs a complex browser-in-the-browser (BitB) technique, creating fake but realistic browser pop-up windows to deceive victims into divulging their login credentials.

The Phishing Technique

The BitB attacks involve creating convincing fake browser pop-up windows that display the URL of the real website, in this case, Steam.

Browser-in-the-Browser Technique
Example of a website selling Steam accounts with pricing

These pop-ups are designed to make users believe they are interacting with a legitimate login page.

Once a victim attempts to log in, the threat actor captures the credentials, likely intending to resell the compromised accounts on online marketplaces.

The campaign also exploits the brand and identity of the professional eSports team Navi, further increasing its credibility among gamers.

The phishing sites discovered were primarily in English, with one notable exception being a Chinese site hosted on the domain simplegive.cn, which included some English wording.

According to the SilentPush, this diversity in language suggests the threat actor is targeting a broad audience.

The campaign’s effectiveness is heightened by its convincing nature; the fake pop-up windows appear legitimate but cannot be maximized, minimized, or moved outside the browser window, unlike genuine pop-ups.

Phishing Attack
Example of the Chinese phishing website in Mandarin with English wording

Steam accounts are valuable targets due to their potential resale value, especially if they contain a large collection of games.

Websites like playerauctions.com list Steam accounts for sale, with prices reaching into the tens of thousands of dollars.

To protect against these BitB attacks, users are advised to be cautious of fake URL bars in login pop-ups. If a pop-up cannot be dragged outside the browser window, it may be a phishing attempt.

Immediate action should be taken if a user suspects they have been phished, including changing account credentials and monitoring for further unauthorized activity.

Silent Push is offering tools to track and mitigate these threats through their Community Edition platform, which provides advanced threat detection capabilities.

The company is also sharing indicators of future attacks (IOFAs) to help the security community stay ahead of emerging phishing campaigns.

As these attacks continue to evolve, it is crucial for gamers and cybersecurity professionals to remain vigilant and proactive in their defense strategies.

Find this Story Interesting! Follow us on LinkedIn, and X to Get More Instant Updates

Mandvi
Mandvi
Mandvi is a Security Reporter covering data breaches, malware, cyberattacks, data leaks, and more at Cyber Press.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here