{"id":2302,"date":"2025-05-10T18:55:17","date_gmt":"2025-05-10T18:55:17","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=2302"},"modified":"2025-05-10T18:55:17","modified_gmt":"2025-05-10T18:55:17","slug":"phishing-assault-makes-use-of-blob-uris-to-present-pretend-login-pages-in-your-browser","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=2302","title":{"rendered":"Phishing Assault Makes use of Blob URIs to Present Pretend Login Pages in Your Browser"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p class=\"is-style-cnvs-paragraph-callout\">Cofense Intelligence reveals a novel phishing method utilizing blob URIs to create native faux login pages, bypassing electronic mail safety and stealing credentials.<\/p>\n<p>Cybersecurity researchers at Cofense Intelligence have reported a brand new and more and more efficient methodology cybercriminals are utilizing to ship credential phishing pages on to customers\u2019 electronic mail inboxes. This method, which emerged in mid-2022, leverages \u201cblob URIs\u201d (binary massive objects- Uniform Useful resource Identifiers).<\/p>\n<p>On your data, Blob URIs are addresses that time to short-term knowledge saved by your web browser by yourself pc. These have reputable functions on the web, reminiscent of how YouTube quickly shops video knowledge inside a person\u2019s browser for playback. <\/p>\n<p>A key attribute of <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/stackoverflow.com\/questions\/30864573\/what-is-a-blob-url-and-why-it-is-used\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">blob<\/a> URIs is their localized nature; that&#8217;s, a blob URI created by one browser can&#8217;t be accessed by some other, even on the identical system. This inherent privateness function though useful for reputable internet features, has been weaponized by menace actors for malicious functions.<\/p>\n<p>In line with Cofense Intelligence\u2019s <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/cofense.com\/blog\/using-blob-urls-to-bypass-segs-and-evade-analysis\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">evaluation<\/a>, shared with Hackread.com, since Blob URI knowledge isn\u2019t on the common web, safety programs that examine emails can not simply see the dangerous faux login pages. <\/p>\n<p>Due to this fact, while you get a phishing electronic mail, the hyperlink doesn\u2019t go straight to a faux web site. As an alternative, it typically sends you to an actual web site that the safety applications belief, like Microsoft\u2019s <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/hackread.com\/how-to-use-onedrive-for-office-365-on-desktop\/\">OneDrive<\/a>. From there, you get despatched to a hidden webpage managed by the attacker. <\/p>\n<p>This hidden web page then makes use of a blob URI to create the faux login web page proper in your browser. Despite the fact that this web page is simply saved in your pc, it will probably nonetheless steal your username and password and ship it to the hackers.<\/p>\n<div id=\"gallery-1\" class=\"gallery galleryid-129739 gallery-type-slider gallery-size-large \" pk-flickity=\"init\" data-sg-page-dots=\"true\" data-sg-page-info=\"true\" data-sg-nav=\"true\">\n<figure class=\"gallery-item\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/hackread.com\/phishing-attack-blob-uri-fake-login-pages-browser\/phishing-attack-blob-uri-fake-login-pages-browser-2\/\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"493\" src=\"https:\/\/hackread.com\/wp-content\/uploads\/2025\/05\/phishing-attack-blob-uri-fake-login-pages-browser-2-1024x493.png\" class=\"attachment-large size-large\" alt=\"Phishing Attack Uses Blob URIs to Show Fake Login Pages in Your Browser\" aria-describedby=\"gallery-1-129751\" data-gallery=\"slider\" srcset=\"https:\/\/hackread.com\/wp-content\/uploads\/2025\/05\/phishing-attack-blob-uri-fake-login-pages-browser-2-1024x493.png 1024w, https:\/\/hackread.com\/wp-content\/uploads\/2025\/05\/phishing-attack-blob-uri-fake-login-pages-browser-2-300x144.png 300w, https:\/\/hackread.com\/wp-content\/uploads\/2025\/05\/phishing-attack-blob-uri-fake-login-pages-browser-2-768x370.png 768w, https:\/\/hackread.com\/wp-content\/uploads\/2025\/05\/phishing-attack-blob-uri-fake-login-pages-browser-2-380x183.png 380w, https:\/\/hackread.com\/wp-content\/uploads\/2025\/05\/phishing-attack-blob-uri-fake-login-pages-browser-2-800x385.png 800w, https:\/\/hackread.com\/wp-content\/uploads\/2025\/05\/phishing-attack-blob-uri-fake-login-pages-browser-2.png 1090w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\"\/><\/a><figcaption class=\"caption wp-caption-text gallery-caption\" id=\"gallery-1-129751\">\n\t\t\t\t\t\tThe attacker first redirects the person by way of an actual Microsoft OneDrive hyperlink earlier than resulting in the faux login web page (Picture credit score: Cofense)<br \/>\n\t\t\t\t\t\t<\/figcaption><\/figure>\n<figure class=\"gallery-item\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/hackread.com\/phishing-attack-blob-uri-fake-login-pages-browser\/phishing-attack-blob-uri-fake-login-pages-browser-3\/\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"657\" src=\"https:\/\/hackread.com\/wp-content\/uploads\/2025\/05\/phishing-attack-blob-uri-fake-login-pages-browser-3-1024x657.png\" class=\"attachment-large size-large\" alt=\"Phishing Attack Uses Blob URIs to Show Fake Login Pages in Your Browser\" aria-describedby=\"gallery-1-129752\" data-gallery=\"slider\" srcset=\"https:\/\/hackread.com\/wp-content\/uploads\/2025\/05\/phishing-attack-blob-uri-fake-login-pages-browser-3-1024x657.png 1024w, https:\/\/hackread.com\/wp-content\/uploads\/2025\/05\/phishing-attack-blob-uri-fake-login-pages-browser-3-300x192.png 300w, https:\/\/hackread.com\/wp-content\/uploads\/2025\/05\/phishing-attack-blob-uri-fake-login-pages-browser-3-768x493.png 768w, https:\/\/hackread.com\/wp-content\/uploads\/2025\/05\/phishing-attack-blob-uri-fake-login-pages-browser-3-1536x986.png 1536w, https:\/\/hackread.com\/wp-content\/uploads\/2025\/05\/phishing-attack-blob-uri-fake-login-pages-browser-3-2048x1314.png 2048w, https:\/\/hackread.com\/wp-content\/uploads\/2025\/05\/phishing-attack-blob-uri-fake-login-pages-browser-3-380x244.png 380w, https:\/\/hackread.com\/wp-content\/uploads\/2025\/05\/phishing-attack-blob-uri-fake-login-pages-browser-3-800x513.png 800w, https:\/\/hackread.com\/wp-content\/uploads\/2025\/05\/phishing-attack-blob-uri-fake-login-pages-browser-3-1160x744.png 1160w, https:\/\/hackread.com\/wp-content\/uploads\/2025\/05\/phishing-attack-blob-uri-fake-login-pages-browser-3.png 2210w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\"\/><\/a><figcaption class=\"caption wp-caption-text gallery-caption\" id=\"gallery-1-129752\">\n\t\t\t\t\t\tA faux OneDrive login web page created utilizing a blob URI, proven throughout the sufferer\u2019s browser (Picture credit score: Cofense)<br \/>\n\t\t\t\t\t\t<\/figcaption><\/figure>\n<figure class=\"gallery-item\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/hackread.com\/phishing-attack-blob-uri-fake-login-pages-browser\/blob-uri-phishing-new-email-scam-bypasses-security-cofense\/\"><img loading=\"lazy\" decoding=\"async\" width=\"1017\" height=\"604\" src=\"https:\/\/hackread.com\/wp-content\/uploads\/2025\/05\/Blob-URI-Phishing-New-Email-Scam-Bypasses-Security-Cofense.png\" class=\"attachment-large size-large\" alt=\"Phishing Attack Uses Blob URIs to Show Fake Login Pages in Your Browser\" aria-describedby=\"gallery-1-129740\" data-gallery=\"slider\" srcset=\"https:\/\/hackread.com\/wp-content\/uploads\/2025\/05\/Blob-URI-Phishing-New-Email-Scam-Bypasses-Security-Cofense.png 1017w, https:\/\/hackread.com\/wp-content\/uploads\/2025\/05\/Blob-URI-Phishing-New-Email-Scam-Bypasses-Security-Cofense-300x178.png 300w, https:\/\/hackread.com\/wp-content\/uploads\/2025\/05\/Blob-URI-Phishing-New-Email-Scam-Bypasses-Security-Cofense-768x456.png 768w, https:\/\/hackread.com\/wp-content\/uploads\/2025\/05\/Blob-URI-Phishing-New-Email-Scam-Bypasses-Security-Cofense-380x226.png 380w, https:\/\/hackread.com\/wp-content\/uploads\/2025\/05\/Blob-URI-Phishing-New-Email-Scam-Bypasses-Security-Cofense-800x475.png 800w\" sizes=\"auto, (max-width: 1017px) 100vw, 1017px\"\/><\/a><figcaption class=\"caption wp-caption-text gallery-caption\" id=\"gallery-1-129740\">\n\t\t\t\t\t\tStep-by-step movement of a phishing assault utilizing a Blob URI (Picture credit score: Cofense)<br \/>\n\t\t\t\t\t\t<\/figcaption><\/figure>\n<\/div>\n<p>This presents a problem for automated safety programs, notably <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/hackread.com\/secure-email-gateway-integrated-cloud-email-security-seg-ices\/\" target=\"_blank\" rel=\"noreferrer noopener\">Safe Electronic mail Gateways<\/a> (SEGs), which analyze web site content material to determine phishing makes an attempt, researchers famous. The novelty of phishing assaults utilizing blob URIs means AI-powered safety fashions could not but be adequately educated to tell apart between reputable and malicious makes use of. <\/p>\n<p>This lack of sample recognition, mixed with the frequent attacker tactic of utilizing a number of redirects, complicates automated detection and will increase the chance of phishing emails bypassing safety.<\/p>\n<p>Cofense Intelligence has noticed a number of phishing campaigns using this blob URI method, with lures designed to trick customers into logging in to faux variations of acquainted companies like OneDrive. These lures embrace notifications of encrypted messages, prompts to entry Intuit tax accounts, and alerts from monetary establishments. Regardless of the numerous preliminary pretexts, the final assault movement stays constant.<\/p>\n<p>Researchers warn that one of these phishing may develop into extra frequent as a result of it\u2019s good at getting previous safety. So, it\u2019s necessary to watch out about hyperlinks in emails, even when they seem like they go to actual web sites, and to all the time double-check earlier than you sort in your login data. Seeing \u201c<code>blob:http:\/\/<\/code>\u201d or \u201c<code>blob:https:\/\/<\/code>\u201d within the web site deal with is usually a signal of this new trick.<\/p>\n<p>\n\t\t\t<\/div>\n<p><template id="2kOkVuzjnXSXjxTWS96m"></template><\/script><br \/>\n<br \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cofense Intelligence reveals a novel phishing method utilizing blob URIs to create native faux login pages, bypassing electronic mail safety and stealing credentials. Cybersecurity researchers at Cofense Intelligence have reported a brand new and more and more efficient methodology cybercriminals are utilizing to ship credential phishing pages on to customers\u2019 electronic mail inboxes. This method, [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":2304,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[717,2266,214,67,2268,2269,261,2112,2267],"class_list":["post-2302","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-attack","tag-blob","tag-browser","tag-fake","tag-login","tag-pages","tag-phishing","tag-show","tag-uris"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/2302","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2302"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/2302\/revisions"}],"predecessor-version":[{"id":2303,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/2302\/revisions\/2303"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/2304"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2302"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2302"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2302"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-05-15 03:04:56 UTC -->