Zero-Hour Phishing Attacks Exploiting Browser Vulnerabilities Increases by 130%

Recent cybersecurity data reveals an alarming 130% surge in zero-hour phishing attacks targeting previously unknown browser vulnerabilities.

These sophisticated attacks leverage unpatched security flaws in popular browsers to deploy malicious payloads before security teams can implement countermeasures, leaving users and organizations extremely vulnerable in the critical first hours of an attack campaign.

The dramatic increase has been primarily observed in attacks exploiting JavaScript rendering engines and browser extension APIs, with Chrome, Firefox, and Edge users facing the highest risk profiles.

Threat actors are increasingly utilizing obfuscated code and DOM manipulation techniques to bypass traditional security controls while harvesting credentials and deploying secondary payloads.

Menlo Security researchers detected that these zero-hour phishing campaigns frequently employ dynamic code loading techniques to evade detection.

Their analysis revealed that attackers are using sophisticated browser fingerprinting to identify vulnerable targets before deploying their exploits, significantly increasing success rates compared to traditional phishing methods.

The most concerning aspect of this trend is the speed at which compromised systems are being monetized.

According to incident response data, the average time between initial browser compromise and credential exfiltration has dropped to just 27 minutes, giving security teams minimal time to detect and respond to active breaches before damage occurs.

These attacks typically begin with specially crafted emails containing links to malicious websites that appear legitimate but contain obfuscated JavaScript code that exploits browser parsing vulnerabilities to execute arbitrary code.

Exploitation Mechanisms

The most prevalent attack vector involves exploiting CVE-2023-45812, a type confusion vulnerability in JavaScript engines that allows attackers to bypass same-origin policies.

When a user visits a compromised site, the following code is typically injected to exploit the vulnerability:-

function triggerVulnerability() {
  const vulnerableObj = {"prop": document.createElement("iframe")};
  const proxyObj = new Proxy(vulnerableObj, {
    get: function(target, prop) {
      if (prop === "prop") {
        // Type confusion triggered here
        Object.defineProperty(target, "prop", {value: {}});
        return document.domain;
      }
      return target[prop];
    }
  });

  setTimeout(() => {
    // Execute arbitrary code with elevated privileges
    proxyObj.prop.innerHTML = '';
  }, 100);
}

This code leverages race conditions in the browser’s garbage collection and property access mechanisms to break out of the browser sandbox.

Once executed, the malicious code can access sensitive browser data, including stored credentials and session information.

Security teams should immediately implement Content Security Policies with strict-dynamic directives and ensure all browsers are updated to the latest versions.

Additionally, implementing browser isolation technologies can provide effective protection by executing web content in secured containers separated from endpoint devices.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

The post Zero-Hour Phishing Attacks Exploiting Browser Vulnerabilities Increases by 130% appeared first on Cyber Security News.