{"id":16464,"date":"2022-11-17T07:40:26","date_gmt":"2022-11-17T07:40:26","guid":{"rendered":"https:\/\/businessadapter.es\/browser-in-the-browser-new-cyber-attack\/"},"modified":"2024-12-11T10:44:08","modified_gmt":"2024-12-11T10:44:08","slug":"browser-in-the-browser-new-cyber-attack","status":"publish","type":"post","link":"https:\/\/businessadapter.es\/en\/browser-in-the-browser-new-cyber-attack\/","title":{"rendered":"Browser in the browser. New cyber attack"},"content":{"rendered":"\n<h2><span style=\"color: #800000;\"><strong>Browser in the browser. New cyber attack <\/strong><\/span><\/h2>\n<p>Nowadays, <a href=\"https:\/\/businessadapter.es\/ciberataque\/\">cyber-attacks <\/a>already live among us; with technological advances, new methods of appropriating other people&#8217;s property are growing.<\/p>\n<p>The best known is <a href=\"https:\/\/businessadapter.es\/proteccion-contra-phishing\/\">phishing<\/a>, which is one of the oldest techniques in terms of cyber-attacks, it is an identity theft in which legitimate people or companies are impersonated by cybercriminals, in which through a phone call or email they try to appropriate, for example, our login credentials and thus reach our credit cards or bank accounts.<a href=\"https:\/\/businessadapter.es\/ciberataque\/\"><img decoding=\"async\" class=\" wp-image-5155 alignright\" src=\"https:\/\/businessadapter.es\/wp-content\/uploads\/2020\/08\/hacker-2883632_1920-1-300x200.jpg\" alt=\"\" width=\"509\" height=\"339\" srcset=\"https:\/\/businessadapter.es\/wp-content\/uploads\/2020\/08\/hacker-2883632_1920-1-300x200.jpg 300w, https:\/\/businessadapter.es\/wp-content\/uploads\/2020\/08\/hacker-2883632_1920-1-1024x683.jpg 1024w, https:\/\/businessadapter.es\/wp-content\/uploads\/2020\/08\/hacker-2883632_1920-1-768x512.jpg 768w, https:\/\/businessadapter.es\/wp-content\/uploads\/2020\/08\/hacker-2883632_1920-1-1536x1024.jpg 1536w, https:\/\/businessadapter.es\/wp-content\/uploads\/2020\/08\/hacker-2883632_1920-1.jpg 1920w\" sizes=\"(max-width: 509px) 100vw, 509px\" \/><\/a><\/p>\n<p>In the spring of 2022 a researcher described a new phishing technique he called <strong>Browser in the browser (Bitb)<\/strong>, with this new technique cybercriminals try to trick users into believing that a fake website is legitimate.<\/p>\n<p>Increasingly, pop-up windows are used to perform logins and this is when we can be attacked.<\/p>\n<p>In traditional phishing, the website opens an additional tab or redirects us to them, in the case of <strong>Bitb<\/strong> a fake browser window opens on the same website, which gives us a sense of trust.<\/p>\n<h3><span style=\"color: #800000;\">How can we identify a Bitb<\/span><\/h3>\n<p>As indicated by <a href=\"https:\/\/www.incibe.es\/\" target=\"_blank\" rel=\"noopener\">INCIBE<\/a>, the following steps must be followed:<\/p>\n<p>&#8212; Check that a new window opens in the taskbar<strong>,<\/strong> if it is not the case we will be able to say that we are in front of a false window.<\/p>\n<p>&#8212; We will try to move the pop-up window and if it only moves through the browser window and does not go beyond it, it is possibly a fake window.<\/p>\n<p>&#8212; Check that the padlock symbol is real and not an image<strong>,<\/strong> to do this click on it and check that it has the SSL certificate.<\/p>\n<p>&#8212; We will try to resize the pop-up window if <strong> it<\/strong> does not allow us to do so, we should be suspicious.<\/p>\n<p>&#8212; <strong> We<\/strong> can also try to change the content of the address bar and if it does not allow it, we can say that the site we are visiting is not legitimate.<\/p>\n<h3><span style=\"color: #800000;\">How can we protect ourselves from these cyber attacks?<\/span><\/h3>\n<p>This type of cyber-attacks seem quite complicated to detect, but our computer can help us. To do so, it would be convenient to apply security measures, we can highlight the following: <\/p>\n<p>&#8212; Use a password manager for all our accounts<strong>,<\/strong> it will store the credentials and will only replicate them in that web with the legitimate URL in which the user was registered.<\/p>\n<p>&#8212; There are security solutions on the market that include anti-phishing protection that we can install on our devices<strong>,<\/strong> so that if it considers a website to be suspicious, we will be alerted.<\/p>\n<p>&#8212; Use the <a href=\"https:\/\/businessadapter.es\/riesgos-de-una-contrasena-debil-y-soluciones-practicas\/\">double authentication factor<\/a> whenever possible<strong>,<\/strong> as this measure will provide us with a double layer of security.<\/p>\n<h3 style=\"text-align: justify;\"><span style=\"color: #800000;\"><strong>Business Adapter\u00ae at your service  <\/strong><\/span><\/h3>\n<p>If you need to reinforce your current security measures, contact your consultant for documentation and instructions.<\/p>\n<p>If you are not yet a customer and want to comply with the Data Protection Act, let us help you. Contact us by email: <a href=\"mailto:info@businessadapter.es,%20\">info@businessadapter.es, <\/a> you can also call <a href=\"http:\/\/tel.961318804\">96 131 88 04<\/a>, or leave your message in this form:<\/p>\n<p> <\/p>\n<p><strong>[su_button url=&#8221;https:\/\/businessadapter.es\/contacto&#8221; target=&#8221;blank&#8221; background=&#8221;#f6f903&#8243; color=&#8221;#181818&#8243; size=&#8221;7&#8243; center=&#8221;yes&#8221; icon_color=&#8221;#000000&#8243;]Contact us, we will be pleased to help you.[\/su_button]<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Browser in the browser. New cyber attack Nowadays, cyber-attacks already live among us; with technological advances, new methods of appropriating [&hellip;]<\/p>\n","protected":false},"author":1373,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[75],"tags":[88,83],"class_list":["post-16464","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-cybersecurity","tag-security-measures"],"_links":{"self":[{"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/posts\/16464","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/users\/1373"}],"replies":[{"embeddable":true,"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/comments?post=16464"}],"version-history":[{"count":1,"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/posts\/16464\/revisions"}],"predecessor-version":[{"id":16465,"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/posts\/16464\/revisions\/16465"}],"wp:attachment":[{"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/media?parent=16464"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/categories?post=16464"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/tags?post=16464"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}