The screenshot above is one of the provided BITB templates for chrome.
Imagine i’m an attacker and i want to steal user credentials for gmail. I setup a phishing site offering free downloads for popular games. The webiste instructs the users to sign-in using gmail to get an email for a download link to the game requested. When the user clicks on the gmail sign-in button, my fake pop up window appears displaying an exact copy of the gmail login page.
mrd0x created fake chrome pop up templates for anyone to use in this attack, however there are many features the attacker must build out for the pop up window to look convincing.
Think of this attack as a phishing site within a phishing site. First the attacker must create and host a phishing site pretending to be hosting free games. Then the attacker must create another web page pretending to be a gmail login page.
The attacker must also create a button on their phishing site that links to the fake gmail login page.
The final step is to configure file index.html
.
Once complete, the attacker would have an effective phishing site to steal gmail login credentials.
There are some checks the end user can make to determine if the pop up window is legit.
Normally pop up windows are rendered by the browser. In this phishing attack, the pop up window is rendered using html and css hosted on the website. Try to move the pop up window outside of the parent window, such as moving the pop up to another monitor. If the pop up window is unable to be moved outside of the parent window, then the website is most likely rendering a fake pop up as seen below:
To view a site’s certificate, you would click on the lock and another pop up appears with certificate information. The provided template does not include this functionality which is another indicator of a fake pop up window. The attacker could modify the template to include a fake certifcate pop up, but i would only expect that from advanced threats.
You can use docker to quickly setup an Apache web server and copy over the provieded template files to the web server to serve. After naviagting to the index.html
page, the fake pop up window automaticlly opens.
This attack method has already been used in the wild to steal Steam account credentials.
The above screenshot is a fake Steam login pop up. This attack was reported by user Bangaladore on Reddit in 2019. In my opinion, we will not be seeing this attack more in the future due to the limited scope of sites. Not every site uses single sign-in and the sites that do, often do not use a pop up window. Most sites use a redirect within the same window to handle the single sign-in.