Watch out for this fake turn of address – Naked Security



[ad_1]

When is an address bar not an address bar?

When it's a fake.

Security researcher James Fisher has encountered a sneak attack that could prompt unsolicited mobile users to navigate a phishing site with an address bar displaying a legitimate URL.

This trick exploits the way the Android version of the Chrome browser saves valuable real estate on a small screen. When you scroll down a web page on your mobile device, Chrome's address bar disappears so you can see more of the page. Fisher used this to introduce a fake UI attack.

His attack displays a fake URL bar instead of the real one. This URL bar is only one element of the page, so it can say anything you want. It could even be an image of an address bar if you like. An attacker could use it to simulate your bank's website, but display a dummy address bar displaying his legitimate address, deceiving you into believing that the site is genuine.

You should be able to check the actual address bar by simply scrolling to the top of your webpage because Chrome will show the address again. Fisher also has something to avoid that. It moves the entire Web page to a new item with its Cascading Style Sheet (CSS) property set to overflow: scrolling. the overflow The property contains instructions on what to do if it has too much content to display at the same time. Setting scroll has it introduce a scrollbar.

The result is a Web page in a web page, which contains its own scroll bar. Users who scroll back and forth in the content of the web page think that they are scrolling to the top of the original web page, but they are actually scrolling an item from that page. This means that they access the top of the content of this element, but not the original web page.