Hi everyone,
just a quick update about a new type of attack: browser in the browser.
It simulates SSO popup windows to steal credentials with graphic html5 engine.
https://thehackernews.com/2022/03/new-browser-in-browser-bitb-attack.html
This is an example:

I’ll leave more info in next days about this attack when I found about it!
[UPDATE]
So it's a new type of attack (to say right, the first time it show itself was in 2020) called browser in the browser (BitB) attack. It's a midway to a phishing attack and social, because it relies on a miscalculation (hope it's the right word in english) of the user: it show up a pop-up windows rendered with HTML5 engine that's exacly the correct contropart.
It take advantage of all those SSO login or MFA authentication mechanisms that require user interaction.
A Facebook example was posted on Twitter by mr.d0x: https://twitter.com/mrd0x
"Combine the window design with an iframe pointing to the malicious server hosting the phishing page, and it's basically indistinguishable," mrd0x said in a technical write-up published last week "JavaScript can be easily used to make the window appear on a link or button click, on the page loading etc."
