Skip to main content

Google to Block Logins From Embedded Browser Frameworks to Protect From Phishing & MitM Attacks



Google announced a new security update to block users sign-in using Embedded browser frameworks in order to improve the protection against Phishing and MitM attacks.
Jonathan Skelker, Product Manager and Account Security at Google said,
“Form of phishing, known as “man in the middle” (MITM), is hard to detect when an embedded browser framework (e.g., Chromium Embedded Framework – CEF) or another automation platform is being used for authentication. “

Cybercriminals abusing this technology to perform Man-in-the-Middle attacks and steal the user’s credentials by intercepting the web traffic when Embedded browsers frameworks help users for the automated login process.

Embedded Browser Frameworks Lets Hackers Intercept the Traffic

If any users enter the Google account credentials on the phishing page that using Embedded browser frameworks will automate the login process by interacting with the original Google server.
Meanwhile, MITM attacker intercepts the communications between a user and Google in real-time to obtain the user’s credentials, and also this technique also used to bypass the 2-factor authentication.
Because we can’t differentiate between a legitimate sign in and a MITM attack on these platforms, we will be blocking sign-ins from embedded browser frameworks starting in June, Google said.
To prevent users from login based attacks, last year Google announced JavaScript to be enabled is require in your browser when users sign in so that Google can run a risk assessment whenever credentials are entered on a sign-in page and block the sign-in if we suspect an attack.
Similarly this new announcement brings more protection from credentials based phishing and Man-in-the-Middle attacks.
As an alternative method to embedded browser frameworks, Google suggested that developers use browser-based OAuth authentication, which enables users to see the full URL of the page where they’re entering their credentials.
“If you are a developer with an app that requires access to Google Account data, switch to using browser-based OAuth authentication today.”
Jonathan Skelker said.

Comments

Popular posts from this blog

Digital Marketing Services in noida

Red Securium Company Provide Digital Marketing Service In Noida Strengthen your brand positioning, awareness, revenue objectives and market share with our custom-built digital marketing services to suit their business needs. Get easily accessible to your target audience on mobiles and social networking sites across different platforms. Our cross-functional digital marketing experts offer end-to-end digital marketing solutions that are in step with your business's goals and policies. Our targeted digital marketing campaigns are custom-structured for helping you in strengthening your brand positioning, awareness, revenue objectives and market share. Digital Marketing Services  Digital Marketing Service  Social Network Marketing Service Seo Services Marketing  PPC Marketing Service  Social Media Marketing Sales Generation Services  Mobile Marketing Service  Content Marketing Service Event Marketing Service  Vide...

How To Access Notorious Dark Web Anonymously (10 Step Guide)

Are you trying to find out  how to access the dark web  and what is it? Well, look no further, we have gone and done the research so we could show you step by step the best and safest way how to access the dark net. We cover everything, from setting up Tor, how to choose a VPN , what not to do, finding the best sites to access, and extra steps to remain anonymous. It is extremely easy to access the dark web and even easier to be detected on it if you don’t take precautions. If you are new to the darknet, this guide will help you on your way. According to researchers, only 4% of the internet is visible to the general public. Meaning that the remaining 96% of the internet is made up of “The Deep Web”. Dark Web or Dark Net  is a subset of the  Deep Web  where there are sites that sell drugs, hacking software, counterfeit money and more. We explain this further down the article if you are not up to speed. If you are looking to access hidden marketpl...

Private data of almost 14,200 patients diagnosed with HIV leaked online

  The affected individuals included 14,200 individuals who had been diagnosed with HIV, of which 5,400 individuals were Singaporeans and 8,800 were foreigners. The leaked information included names, identification numbers, phone numbers, addresses, HIV test results, and other related medical information. Private data of almost 14,200 individuals who had been diagnosed with HIV up to January 2013 were leaked online. A US citizen residing in Singapore gained unauthorized access to the HIV registry and leaked the data online . Out of the 14,200 affected individuals, 5400 individuals were Singaporeans and 8,800 were foreigners. The leaked information included names, identification numbers, phone numbers, addresses, HIV test results, and other related medical information. US citizen gained illegal access to the HIV registry On 28, January 2019, Singapore's Ministry of Health confirmed in a  statement , that Mikhy K Farrera Brochez, a US citizen residing in Singapo...