{"id":25323,"date":"2026-03-04T18:34:52","date_gmt":"2026-03-04T14:34:52","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/?p=25323"},"modified":"2026-03-04T18:34:52","modified_gmt":"2026-03-04T14:34:52","slug":"browser-in-the-browser-phishing-facebook","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/browser-in-the-browser-phishing-facebook\/25323\/","title":{"rendered":"Browser-in-the-browser attacks: from theory to reality"},"content":{"rendered":"<p>In 2022, we dived deep into an attack method called <a href=\"https:\/\/www.kaspersky.com\/blog\/browser-in-the-browser-attack\/44163\/\" target=\"_blank\" rel=\"noopener nofollow\">browser-in-the-browser<\/a> \u2014 originally developed by the cybersecurity researcher known as <em>mr.d0x<\/em>. Back then, no actual examples existed of this model being used in the wild. Fast-forward four years, and browser-in-the-browser attacks have graduated from the theoretical to the real: attackers are now using them in the field. In this post, we revisit what exactly a browser-in-the-browser attack is, show how hackers are deploying it, and, most importantly, explain how to keep yourself from becoming its next victim.<\/p>\n<h2>What is a browser-in-the-browser (BitB) attack?<\/h2>\n<p>For starters, let\u2019s refresh our memories on what <a href=\"https:\/\/mrd0x.com\/browser-in-the-browser-phishing-attack\/\" target=\"_blank\" rel=\"noopener nofollow\"><em>mr.d0x<\/em> actually cooked up<\/a>. The core of the attack stems from his observation of just how advanced modern web development tools \u2014 HTML, CSS, JavaScript, and the like \u2014 have become. It\u2019s this realization that inspired the researcher to come up with a particularly elaborate phishing model.<\/p>\n<p>A browser-in-the-browser attack is a sophisticated form of phishing that uses web design to craft fraudulent websites imitating login windows for well-known services like Microsoft, Google, Facebook, or Apple that look just like the real thing. The researcher\u2019s concept involves an attacker building a legitimate-looking site to lure in victims. Once there, users can\u2019t leave comments or make purchases unless they \u201csign in\u201d first.<\/p>\n<p>Signing in seems easy enough: just click the <em>Sign in with <\/em><em>{popular service name}<\/em> button. And this is where things get interesting: instead of a genuine authentication page provided by the legitimate service, the user gets a fake form rendered inside the malicious site, looking exactly like\u2026 a browser pop-up. Furthermore, the address bar in the pop-up, also rendered by the attackers, displays a <em>perfectly legitimate<\/em> URL. Even a close inspection won\u2019t reveal the trick.<\/p>\n<p>From there, the unsuspecting user enters their credentials for Microsoft, Google, Facebook, or Apple into this rendered window, and those details go straight to the cybercriminals. For a while this scheme remained a theoretical experiment by the security researcher. Now \u2014 real-world attackers have added it to their arsenals.<\/p>\n<h2>Facebook credential theft<\/h2>\n<p>Attackers have put their own spin on <em>mr.d0x\u2019s<\/em> original concept: recent browser-in-the-browser hits <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/facebook-login-thieves-now-using-browser-in-browser-trick\/\" target=\"_blank\" rel=\"noopener nofollow\">have been kicking off with emails<\/a> designed to alarm recipients. For instance, one phishing campaign posed as a law firm informing the user they\u2019d committed a copyright violation by posting something on Facebook. The message included a credible-looking link allegedly to the offending post.<\/p>\n<div id=\"attachment_55378\" style=\"width: 1610px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2026\/03\/04181241\/browser-in-the-browser-phishing-facebook-1.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-55378\" class=\"wp-image-55378 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2026\/03\/04181241\/browser-in-the-browser-phishing-facebook-1.jpg\" alt=\"Phishing email masquerading as a legal notice \" width=\"1600\" height=\"589\"><\/a><p id=\"caption-attachment-55378\" class=\"wp-caption-text\">Attackers sent messages on behalf of a fake law firm alleging copyright infringement \u2014 complete with a link supposedly to the problematic Facebook post. <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/facebook-login-thieves-now-using-browser-in-browser-trick\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>Interestingly, to lower the victim\u2019s guard, clicking the link didn\u2019t immediately open a fake Facebook login page. Instead, they were first greeted by a bogus Meta CAPTCHA. Only after passing it was the victim presented with the fake authentication pop-up.<\/p>\n<div id=\"attachment_55379\" style=\"width: 1610px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2026\/03\/04181246\/browser-in-the-browser-phishing-facebook-2.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-55379\" class=\"wp-image-55379 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2026\/03\/04181246\/browser-in-the-browser-phishing-facebook-2.jpg\" alt=\"Fake login window rendered directly inside the webpage \" width=\"1600\" height=\"783\"><\/a><p id=\"caption-attachment-55379\" class=\"wp-caption-text\">This isn\u2019t a real browser pop-up; it\u2019s a website element mimicking a Facebook login page \u2014 a ruse that allows attackers to display a perfectly convincing address. <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/facebook-login-thieves-now-using-browser-in-browser-trick\/\" target=\"_blank\" rel=\"nofollow noopener\"> Source <\/a><\/p><\/div>\n<p>Naturally, the fake Facebook login page followed <em>mr.d0x\u2019s<\/em> blueprint: it was built entirely with web design tools to harvest the victim\u2019s credentials. Meanwhile, the URL displayed in the forged address bar pointed to the real Facebook site \u2014 www.facebook.com.<\/p>\n<h2>How to avoid becoming a victim<\/h2>\n<p>The fact that scammers are now deploying browser-in-the-browser attacks just goes to show that their bag of tricks is constantly evolving. But don\u2019t despair \u2014 there\u2019s a way to tell if a login window is legit. A <a href=\"https:\/\/me-en.kaspersky.com\/password-manager?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">password manager<\/a>\u00a0is your friend here, which, among other things, acts as a reliable security litmus test for any website.<\/p>\n<p>That\u2019s because when it comes to auto-filling credentials, a password manager looks at the actual URL, not what the address bar <em>appears<\/em> to show, or what the page itself looks like. Unlike a human user, a <a href=\"https:\/\/me-en.kaspersky.com\/password-manager?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">password manager<\/a>\u00a0can\u2019t be fooled with browser-in-the-browser tactics, or any other tricks, like domains having a slightly different address (typosquatting) or phishing forms buried in ads and pop-ups. There\u2019s a simple rule: if your password manager offers to auto-fill your login and password, you\u2019re on a website you\u2019ve previously saved credentials for. If it stays silent, something\u2019s fishy.<\/p>\n<p>Beyond that, following our time-tested advice will help you defend against various phishing methods, or at least minimize the fallout if an attack succeeds:<\/p>\n<ul>\n<li><strong>Enable two-factor authentication (2FA)<\/strong> for every account that supports it. Ideally, use one-time codes <a href=\"https:\/\/www.kaspersky.com\/blog\/kaspersky-password-manager-authenticator\/48841\/\" target=\"_blank\" rel=\"noopener nofollow\">generated by a dedicated authenticator app<\/a> as your second factor. This helps you dodge phishing schemes designed to intercept confirmation codes sent via SMS, messaging apps, or email. You can read more about one-time-code 2FA in <a href=\"https:\/\/www.kaspersky.com\/blog\/authenticator-apps-and-security\/47426\/\" target=\"_blank\" rel=\"noopener nofollow\">our dedicated post<\/a>.<\/li>\n<li><strong>Use passkeys.<\/strong> The option to sign in with this method can also serve as a signal that you\u2019re on a legitimate site. You can learn all about what passkeys are and how to start using them in our <a href=\"https:\/\/www.kaspersky.com\/blog\/full-guide-to-passkeys-in-2025-part-1\/53688\/\" target=\"_blank\" rel=\"noopener nofollow\">deep dive into the technology<\/a>.<\/li>\n<li><strong>Set unique, complex passwords for all your accounts.<\/strong> Whatever you do, never reuse the same password across different accounts. We recently covered what makes a password truly strong <a href=\"https:\/\/www.kaspersky.com\/blog\/international-password-day-2025\/53355\/\" target=\"_blank\" rel=\"noopener nofollow\">on our blog<\/a>. To generate unique combinations \u2014 without needing to remember them \u2014 <a href=\"https:\/\/me-en.kaspersky.com\/password-manager?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">Kaspersky Password Manager<\/a>\u00a0is your best bet. As an added bonus, it can also generate one-time codes for two-factor authentication, store your passkeys, and synchronize your passwords and files across your various devices.<\/li>\n<\/ul>\n<p>Finally, this post serves as yet another reminder that theoretical attacks described by cybersecurity researchers often find their way out into the wild. So, keep an eye on our blog, and <a href=\"https:\/\/t.me\/+hfDEDRUTiLJlOGE8\" target=\"_blank\" rel=\"noopener nofollow\">subscribe to our Telegram channel<\/a>\u00a0to stay up to speed on the latest threats to your digital security and how to shut them down.<\/p>\n<blockquote><p>Read about other inventive phishing techniques scammers are using day in day out:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/spam-and-phishing-2025\/55295\/\" target=\"_blank\" rel=\"noopener nofollow\">Phishing and spam: the wildest campaigns of 2025<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/what-happens-to-data-after-phishing\/54968\/\" target=\"_blank\" rel=\"noopener nofollow\">What happens to data stolen using phishing?<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/ai-phishing-and-scams\/54445\/\" target=\"_blank\" rel=\"noopener nofollow\">How phishers and scammers use AI<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/turnkey-phishing\/51614\/\" target=\"_blank\" rel=\"noopener nofollow\">Turnkey phishing<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/phishing-with-progressive-web-apps\/51496\/\" target=\"_blank\" rel=\"noopener nofollow\">Progressive phishing: how PWAs can be used to steal passwords<\/a><\/li>\n<\/ul>\n<\/blockquote>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kpm-download\">\n","protected":false},"excerpt":{"rendered":"<p>A browser-in-the-browser attack, theoretically described in 2022, has been adopted in real-world phishing. We break down how it works, and how to spot a fake authentication window.<\/p>\n","protected":false},"author":2726,"featured_media":25327,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1486,9],"tags":[1047,111,1636,2457,20,2707,187,76,131,2794],"class_list":{"0":"post-25323","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"category-tips","9":"tag-2fa","10":"tag-attacks","11":"tag-browsers","12":"tag-captcha","13":"tag-facebook","14":"tag-passkeys","15":"tag-passwords","16":"tag-phishing","17":"tag-tips-2","18":"tag-two-factor-authentication"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/browser-in-the-browser-phishing-facebook\/25323\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/browser-in-the-browser-phishing-facebook\/30246\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/browser-in-the-browser-phishing-facebook\/13239\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/browser-in-the-browser-phishing-facebook\/30119\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/browser-in-the-browser-phishing-facebook\/31895\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/browser-in-the-browser-phishing-facebook\/30510\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/browser-in-the-browser-phishing-facebook\/41406\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/browser-in-the-browser-phishing-facebook\/14329\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/browser-in-the-browser-phishing-facebook\/55374\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/browser-in-the-browser-phishing-facebook\/23677\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/browser-in-the-browser-phishing-facebook\/33253\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/browser-in-the-browser-phishing-facebook\/30377\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/browser-in-the-browser-phishing-facebook\/36003\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/browser-in-the-browser-phishing-facebook\/35660\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/phishing\/","name":"phishing"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/25323","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2726"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=25323"}],"version-history":[{"count":3,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/25323\/revisions"}],"predecessor-version":[{"id":25329,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/25323\/revisions\/25329"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/25327"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=25323"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=25323"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=25323"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}