Business Insights
  • Home
  • Crypto
  • Finance Expert
  • Business
  • Invest News
  • Investing
  • Trading
  • Forex
  • Videos
  • Economy
  • Tech
  • Contact

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • August 2023
  • January 2023
  • December 2021
  • July 2021
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019

Categories

  • Business
  • Crypto
  • Economy
  • Finance Expert
  • Forex
  • Invest News
  • Investing
  • Tech
  • Trading
  • Uncategorized
  • Videos
Apply Loan
Money Visa
Advertise Us
Money Visa
  • Home
  • Crypto
  • Finance Expert
  • Business
  • Invest News
  • Investing
  • Trading
  • Forex
  • Videos
  • Economy
  • Tech
  • Contact
Hackers found a sneaky new way to steal your login even when it’s encrypted - here’s how they’re pulling it off
  • Tech

Hackers found a sneaky new way to steal your login even when it’s encrypted – here’s how they’re pulling it off

  • May 26, 2025
  • Roubens Andy King
Total
0
Shares
0
0
0
Total
0
Shares
Share 0
Tweet 0
Pin it 0


  • Bypasses email gateways and security tools by never hitting a real server
  • Blob URIs mean phishing content isn’t hosted online, so filters never see it coming
  • No weird URLs, no dodgy domains, just silent theft from a fake Microsoft login page

Security researchers have uncovered a series of phishing campaigns that use a rarely exploited technique to steal login credentials, even when those credentials are protected by encryption.

New research from Cofense warns the method relies on blob URIs, a browser feature designed to display temporary local content, and cybercriminals are now abusing this feature to deliver phishing pages.

Blob URIs are created and accessed entirely within a user's browser, meaning the phishing content never exists on a public-facing server. This makes it extremely difficult for even the most advanced endpoint protection systems to detect.


You may like

A hidden technique that slips past defenses

In these campaigns, the phishing process begins with an email that easily bypasses Secure Email Gateways (SEGs). These emails typically contain a link to what appears to be a legitimate page, often hosted on trusted domains such as Microsoft’s OneDrive.

However, this initial page doesn’t host the phishing content directly. Instead, it acts as an intermediary, silently loading a threat-actor-controlled HTML file that decodes into a blob URI.

The result is a fake login page rendered within the victim’s browser, designed to closely mimic Microsoft’s sign-in portal.

To the victim, nothing seems out of place – no strange URLs or obvious signs of fraud – just a prompt to log in to view a secure message or access a document. Once they click ‘Sign in,’ the page redirects to another attacker-controlled HTML file, which generates a local blob URI that displays the spoofed login page.

Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

Because blob URIs operate entirely within the browser’s memory and are inaccessible from outside the session, traditional security tools are unable to scan or block the content.

“This method makes detection and analysis especially tricky,” said Jacob Malimban of the Cofense Intelligence Team.

“The phishing page is created and rendered locally using a blob URI. It’s not hosted online, so it can’t be scanned or blocked in the usual way.”

Credentials entered on the spoofed page are silently exfiltrated to a remote threat actor endpoint, leaving the victim unaware.

AI-based security filters also struggle to catch these attacks, as blob URIs are rarely used maliciously and may not be well-represented in training data. Researchers warn that unless detection methods evolve, this technique is likely to gain traction among attackers.

To defend against such threats, organizations are urged to adopt advanced Firewall-as-a-Service (FWAAS) and Zero Trust Network Access (ZTNA) solutions that can help secure access and flag suspicious login activity.

You might also like

Total
0
Shares
Share 0
Tweet 0
Pin it 0
Roubens Andy King

Previous Article
Get paid to travel – MoneyMagpie
  • Invest News

Get paid to travel – MoneyMagpie

  • May 26, 2025
  • Roubens Andy King
Read More
Next Article
Why cruising Royal Caribbean back-to-back could be a solution
  • Trading

Why cruising Royal Caribbean back-to-back could be a solution

  • May 26, 2025
  • Roubens Andy King
Read More
You May Also Like
Disney Settles FTC Complaint With YouTube Over Children’s Data Collection
Read More
  • Tech

Disney Settles FTC Complaint With YouTube Over Children’s Data Collection

  • Roubens Andy King
  • September 3, 2025
This HP laptop with an astonishing 32GB of RAM is just 1
Read More
  • Tech

This HP laptop with an astonishing 32GB of RAM is just $261

  • Roubens Andy King
  • September 3, 2025
Hot deal: Samsung Galaxy S25 Edge plummets to record-low price!
Read More
  • Tech

Hot deal: Samsung Galaxy S25 Edge plummets to record-low price!

  • Roubens Andy King
  • September 3, 2025
007 First Light looks like a hit, man
Read More
  • Tech

007 First Light looks like a hit, man

  • Roubens Andy King
  • September 3, 2025
Amazon’s Tomb Raider series will star Sophie Turner as Lara Croft
Read More
  • Tech

Amazon’s Tomb Raider series will star Sophie Turner as Lara Croft

  • Roubens Andy King
  • September 3, 2025
Orchard Robotics, founded by a Thiel fellow Cornell dropout, raises M for farm vision AI 
Read More
  • Tech

Orchard Robotics, founded by a Thiel fellow Cornell dropout, raises $22M for farm vision AI 

  • Roubens Andy King
  • September 3, 2025
Meta launches an Instagram app for the iPad, 15 years after its mobile app; it is slightly different than the mobile app, opening directly to a feed of Reels (Mia Sato/The Verge)
Read More
  • Tech

Meta launches an Instagram app for the iPad, 15 years after its mobile app; it is slightly different than the mobile app, opening directly to a feed of Reels (Mia Sato/The Verge)

  • Roubens Andy King
  • September 3, 2025
Acer Swift Air 16 laptop weighs less than 1kg, with a 16-inch screen, up to 32GB memory, and up to 1TB storage
Read More
  • Tech

Acer Swift Air 16 laptop weighs less than 1kg, with a 16-inch screen, up to 32GB memory, and up to 1TB storage

  • Roubens Andy King
  • September 3, 2025

Recent Posts

  • Master Investing with This Game-Changing Strategy! #shorts #finance
  • Federal Reserve Board – Federal Reserve Board issues enforcement actions with former employee of Ally Bank and former employee of Regions Bank
  • Between Truth and Turmoil: Dakota Mortensen Reacts to Taylor Frankie Paul’s Abuse Allegations
  • Mohnish Pabrai: FASTEST Way To Financial Freedom! Proven Playbook For Quitting Your 9-5 In 9 Months!
  • Federal Reserve Board – Agencies request comment on proposals to modernize the regulatory capital framework and maintain the strength of the banking system
Featured Posts
  • Master Investing with This Game-Changing Strategy! #shorts #finance 1
    Master Investing with This Game-Changing Strategy! #shorts #finance
    • March 20, 2026
  • Federal Reserve Board – Federal Reserve Board issues enforcement actions with former employee of Ally Bank and former employee of Regions Bank 2
    Federal Reserve Board – Federal Reserve Board issues enforcement actions with former employee of Ally Bank and former employee of Regions Bank
    • March 20, 2026
  • Between Truth and Turmoil: Dakota Mortensen Reacts to Taylor Frankie Paul’s Abuse Allegations 3
    Between Truth and Turmoil: Dakota Mortensen Reacts to Taylor Frankie Paul’s Abuse Allegations
    • March 20, 2026
  • Mohnish Pabrai: FASTEST Way To Financial Freedom! Proven Playbook For Quitting Your 9-5 In 9 Months! 4
    Mohnish Pabrai: FASTEST Way To Financial Freedom! Proven Playbook For Quitting Your 9-5 In 9 Months!
    • March 19, 2026
  • Federal Reserve Board – Agencies request comment on proposals to modernize the regulatory capital framework and maintain the strength of the banking system 5
    Federal Reserve Board – Agencies request comment on proposals to modernize the regulatory capital framework and maintain the strength of the banking system
    • March 19, 2026
Recent Posts
  • China Import Made Easy | Start Business with Sea Cargo 100 PKR per Kg
    China Import Made Easy | Start Business with Sea Cargo 100 PKR per Kg
    • March 18, 2026
  • Federal Reserve Board – Federal Reserve issues FOMC statement
    Federal Reserve Board – Federal Reserve issues FOMC statement
    • March 18, 2026
  • Federal Reserve Board – Federal Reserve Board and Federal Open Market Committee release economic projections from the March 17-18 FOMC meeting
    Federal Reserve Board – Federal Reserve Board and Federal Open Market Committee release economic projections from the March 17-18 FOMC meeting
    • March 18, 2026
Categories
  • Business (2,057)
  • Crypto (2,023)
  • Economy (235)
  • Finance Expert (1,687)
  • Forex (2,016)
  • Invest News (2,449)
  • Investing (2,040)
  • Tech (2,056)
  • Trading (2,024)
  • Uncategorized (2)
  • Videos (1,006)

Subscribe

Subscribe now to our newsletter

Money Visa
  • Privacy Policy
  • DMCA
  • Terms of Use
Money & Invest Advices

Input your search keywords and press Enter.