{"id":589,"date":"2022-03-22T11:07:56","date_gmt":"2022-03-22T15:07:56","guid":{"rendered":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2020\/?p=589"},"modified":"2022-03-22T11:07:56","modified_gmt":"2022-03-22T15:07:56","slug":"browser-in-the-browser-attack","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2020\/2022\/03\/22\/browser-in-the-browser-attack\/","title":{"rendered":"Browser in the browser attack"},"content":{"rendered":"<p>This article talks about how there is a phishing technique a called browser in the browser (BitB) This attack is able to be exploited to simulate a browser window within the browser to spoof a legitimate domain. It then makes it possible to create a convincing phishing attack. This type of attack takes advantage of 3<sup>rd<\/sup> party single sign on (SSO). Normally, a pop up window will be created to complete the sign on process and the BitB creates a fabrication browser window to replicate the process. By doing this, it becomes undetectable.<\/p>\n<p>https:\/\/thehackernews.com\/2022\/03\/new-browser-in-browser-bitb-attack.html<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This article talks about how there is a phishing technique a called browser in the browser (BitB) This attack is able to be exploited to simulate a browser window within the browser to spoof a legitimate domain. It then makes it possible to create a convincing phishing attack. This type of attack takes advantage of [&hellip;]<\/p>\n","protected":false},"author":26651,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[663943],"tags":[],"class_list":{"0":"post-589","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-instructor","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2020\/wp-json\/wp\/v2\/posts\/589","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2020\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2020\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2020\/wp-json\/wp\/v2\/users\/26651"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2020\/wp-json\/wp\/v2\/comments?post=589"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2020\/wp-json\/wp\/v2\/posts\/589\/revisions"}],"predecessor-version":[{"id":590,"href":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2020\/wp-json\/wp\/v2\/posts\/589\/revisions\/590"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2020\/wp-json\/wp\/v2\/media?parent=589"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2020\/wp-json\/wp\/v2\/categories?post=589"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2020\/wp-json\/wp\/v2\/tags?post=589"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}