Techniques for stealing confidential banking credentials and data by cybercriminals are becoming increasingly sophisticated. Generally, they tend to use the public’s misinformation about Internet security measures to carry out their attacks and surprise us if we let our guard down. In this article, we will explain BitB, a technique to deceive users and get hold of their data.
Cybercriminals create pages that look very similar to the ones mentioned above to try to steal user passwords or access credentials. This technique is known as Browser-in-the-Browser, in which a cybercriminal or phisher simulates a page of an online service to introduce a single login popup window into it, making the user believe that it is a legitimate login window, like the ones we are used to seeing on many legitimate websites and enter your credentials.
Next, we will see some of the most likely risks that we could face if we become a victim of this attack:
Dragging the popup off the browser border causes it to get stuck and not detach. It tries to drag the main window of the login further from the edge of the main window, that is, away from the main window. A normal window would cross without a problem since it is not part of the other, while a dummy or malicious window would get stuck inside the main window as if it were part of it.
In summary, if the main window with the form has the behaviors indicated above, it is not a legitimate and safe page. Please do not enter your credentials in it in any case!
What happens if I enter my credentials into one of these fraudulent forms? The password and username you provided will be sent directly to the cybercriminal’s server, even if clicking redirects you to the official pages or if nothing happens visually.
Ultimately, avoiding these types of attacks largely depends on us, as responsible users, being vigilant and paying attention to the websites we browse to avoid them once we know how they work. We invite you to continue growing and learning with the resources on our website. Remember! Always stay up-to-date!
In this article, we will guide you on how to use WhatsApp's multi-device feature. Many… Read More
People suffering from hypothyroidism have a slower metabolism, and even if they have a low… Read More
In a world where data security and control of IT resources are paramount, private clouds… Read More
Today, businesses constantly have to adapt to new market conditions and requirements. This is especially… Read More
Did you know that external positioning factors, those that you cannot control directly on your… Read More
WhatsApp is an essential communication tool but can be vulnerable to unauthorized access. Learn how… Read More