Skip to content

SamuelWornop

Primary Menu
  • Home
  • Software
  • Cybersecurity
  • Artificial Intelligence
  • Home
  • 2025
  • May
  • 12
  • Phishing Assault Makes use of Blob URIs to Present Faux Login Pages in Your Browser
  • Cybersecurity

Phishing Assault Makes use of Blob URIs to Present Faux Login Pages in Your Browser

Samuelwornop May 12, 2025
phishing-attack-blob-uri-fake-login-pages-browser-3.jpg


Cofense Intelligence reveals a novel phishing method utilizing blob URIs to create native faux login pages, bypassing e mail safety and stealing credentials.

Cybersecurity researchers at Cofense Intelligence have reported a brand new and more and more efficient technique cybercriminals are utilizing to ship credential phishing pages on to customers’ e mail inboxes. This method, which emerged in mid-2022, leverages “blob URIs” (binary giant objects- Uniform Useful resource Identifiers).

In your info, Blob URIs are addresses that time to non permanent knowledge saved by your web browser by yourself pc. These have legit functions on the web, reminiscent of how YouTube briefly shops video knowledge inside a person’s browser for playback.

A key attribute of blob URIs is their localized nature; that’s, a blob URI created by one browser can’t be accessed by some other, even on the identical gadget. This inherent privateness function though useful for legit internet capabilities, has been weaponized by risk actors for malicious functions.

In accordance with Cofense Intelligence’s evaluation, shared with Hackread.com, since Blob URI knowledge isn’t on the common web, safety methods that examine emails can not simply see the dangerous faux login pages.

Due to this fact, once you get a phishing e mail, the hyperlink doesn’t go straight to a faux web site. As a substitute, it usually sends you to an actual web site that the safety packages belief, like Microsoft’s OneDrive. From there, you get despatched to a hidden webpage managed by the attacker.

This hidden web page then makes use of a blob URI to create the faux login web page proper in your browser. Although this web page is just saved in your pc, it may possibly nonetheless steal your username and password and ship it to the hackers.

Phishing Attack Uses Blob URIs to Show Fake Login Pages in Your Browser
The attacker first redirects the person by means of an actual Microsoft OneDrive hyperlink earlier than resulting in the faux login web page (Picture credit score: Cofense)
Phishing Attack Uses Blob URIs to Show Fake Login Pages in Your Browser
A faux OneDrive login web page created utilizing a blob URI, proven throughout the sufferer’s browser (Picture credit score: Cofense)
Phishing Attack Uses Blob URIs to Show Fake Login Pages in Your Browser
Step-by-step movement of a phishing assault utilizing a Blob URI (Picture credit score: Cofense)

This presents a problem for automated safety methods, significantly Safe Electronic mail Gateways (SEGs), which analyze web site content material to establish phishing makes an attempt, researchers famous. The novelty of phishing assaults utilizing blob URIs means AI-powered safety fashions might not but be adequately educated to differentiate between legit and malicious makes use of.

This lack of sample recognition, mixed with the widespread attacker tactic of utilizing a number of redirects, complicates automated detection and will increase the chance of phishing emails bypassing safety.

Cofense Intelligence has noticed a number of phishing campaigns using this blob URI method, with lures designed to trick customers into logging in to faux variations of acquainted providers like OneDrive. These lures embody notifications of encrypted messages, prompts to entry Intuit tax accounts, and alerts from monetary establishments. Regardless of the various preliminary pretexts, the final assault movement stays constant.

Researchers warn that this kind of phishing would possibly grow to be extra widespread as a result of it’s good at getting previous safety. So, it’s necessary to watch out about hyperlinks in emails, even when they seem like they go to actual web sites, and to at all times double-check earlier than you sort in your login info. Seeing “blob:http://” or “blob:https://” within the web site tackle generally is a signal of this new trick.



Continue Reading

Previous: Dream 7B: How Diffusion-Based mostly Reasoning Fashions Are Reshaping AI
Next: Unlocking the Way forward for Finance

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related Stories

shutterstock_722936992.jpg
  • Cybersecurity

Lumma Stealer, coming and going – Sophos Information

Samuelwornop May 11, 2025
dynamically-generated-phishing-logokit.jpeg
  • Cybersecurity

Catching a phish with many faces

Samuelwornop May 11, 2025
google.jpg
  • Cybersecurity

Google Pays $1.375 Billion to Texas Over Unauthorized Monitoring and Biometric Knowledge Assortment

Samuelwornop May 10, 2025

Recent Posts

  • Why Do We Search Digital Companionship?
  • Unlocking the Way forward for Finance
  • Phishing Assault Makes use of Blob URIs to Present Faux Login Pages in Your Browser
  • Dream 7B: How Diffusion-Based mostly Reasoning Fashions Are Reshaping AI
  • Lumma Stealer, coming and going – Sophos Information

Recent Comments

No comments to show.

Archives

  • May 2025
  • April 2025
  • March 2025
  • February 2025

Categories

  • Artificial Intelligence
  • Cybersecurity
  • Software

You may have missed

The-Psychology-Behind-AI-Girlfriend-Chatbots-Why-Do-We-Seek-Virtual-Companionship.jpg
  • Artificial Intelligence

Why Do We Search Digital Companionship?

Samuelwornop May 12, 2025
blog-7.jpg
  • Software

Unlocking the Way forward for Finance

Samuelwornop May 12, 2025
phishing-attack-blob-uri-fake-login-pages-browser-3.jpg
  • Cybersecurity

Phishing Assault Makes use of Blob URIs to Present Faux Login Pages in Your Browser

Samuelwornop May 12, 2025
ChatGPT-Image-Apr-18-2025-08_23_57-PM-942x600.png
  • Artificial Intelligence

Dream 7B: How Diffusion-Based mostly Reasoning Fashions Are Reshaping AI

Samuelwornop May 11, 2025

SamuelWornop

Welcome to Nathan Armstrong—your trusted source for insightful content on Software, Cybersecurity, and Artificial Intelligence. At Nathan Armstrong, we are passionate about exploring the world of technology and sharing valuable insights that empower you to understand and navigate the ever-evolving digital landscape.

Categories

  • Software
  • Cybersecurity
  • Artificial Intelligence

Recent Posts

  • Why Do We Search Digital Companionship?
  • Unlocking the Way forward for Finance
  • Phishing Assault Makes use of Blob URIs to Present Faux Login Pages in Your Browser
  • Dream 7B: How Diffusion-Based mostly Reasoning Fashions Are Reshaping AI
  • Lumma Stealer, coming and going – Sophos Information
  • About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us
  • About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us
Copyright © https://samuelwornop.site/ - All rights reserved. | MoreNews by AF themes.