A bug found in all major browsers could make it easier for criminals to steal online banking credentials using a new type of attack called "in-session phishing", according to researchers at security vendor Trusteer.
In-session phishing (pdf) gives cybercriminals a solution to the biggest problem facing phishers these days: how to reach new victims. In a traditional phishing attack, the scammers send out millions of phoney email messages disguised to look like they come from legitimate companies, such as banks or online payment companies.
Those messages are often blocked by spam-filtering software, but with in-session phishing, the email message is taken out of the equation, replaced by a pop-up browser window.
See Security Advisor for more PC security news and reviews
Here's how an attack would work: cybercriminals would hack a legitimate website and plant HTML code that looks like a pop-up security alert window. The pop-up would then ask the victim to enter password and login information, and possibly answer other security questions used by the banks to verify the identity of their customers.
Until then, criminals who discover the flaw could write code that checks whether Web surfers are logged into, for example, a predetermined list of 100 banking sites. "Instead of just popping up this random phishing message, an attacker can get more sophisticated by probing and finding out whether the user is currently logged into one of 100 financial institution websites," he said.
"The fact that you're currently in-session lends a lot of credibility to the phishing message," he added.
Security researchers have developed other ways to determine whether a victim is logged into a certain site, but they are not always reliable. Klein said his technique doesn't always work but it can be used on many sites including banks, on-line retailers, gaming and social networking sites.