Security researchers warned this week of a vulnerability in most web browsers which could potentially allow scammers to launch phishing attacks from pop-up windows on trusted websites.
The vulnerability arises when an internet user opens browser windows for both a legitimate website and a malicious site at the same time. Because of an old functionality that exists in most browsers, the malicious site can potentially display information in a pop-up window from the trusted site, according to Secunia Research.
The vulnerability has yet to be exploited but could present a very effective method for launching online fraud scams, known as phishing.
While most users do not intentionally visit malicious websites, they often stumble upon them by following links, making it relatively common for Net surfers to have browser windows open for both legitimate and malicious sites at the same time.
This could be a particularly dangerous situation if exploited to display misleading information on a pop-up window from a legitimate bank website, for example, he warned. Even if savvy users check for a the yellow "lock" icon on a website, signifying encryption, the pop-up could still display content from the malicious site.
The vulnerability affects almost all browsers, including Internet Explorer, Mozilla, Firefox, Opera, Konqueror, Safari and Netscape, the researcher says.
Secunia, based in Copenhagen, went public with its warning Wednesday, after saying that it had alerted browser vendors of the vulnerability months ago.
Microsoft says that it has investigated the report, and customers who use Windows XP SP2 and follow its advice on spoofing attacks are at a reduced risk.
The functionality described in the report allows a website to open or re-use a window without displaying the address bar. However, SP2 users will see a status bar in the pop-up window, allowing them to look for the yellow lock icon and confirm that the site is valid, Microsoft says.
Opera has also included measures to mitigate the vulnerability in the latest beta version of its software, Kristensen says.
He acknowledges that by going public with the warning he was also alerting internet scammers to a new opportunity, but says that he feels the public should be aware of the threat since not all browser vendors had been responsive.
"We thought it would be better to openly talk about this and we are giving advice on how to mitigate it," Kristensen says.