<?xml version="1.0" encoding="utf-8"?>
<feed xml:lang="en-us" xmlns="http://www.w3.org/2005/Atom"><title>Simon Willison's Weblog: azaraskin</title><link href="http://simonwillison.net/" rel="alternate"/><link href="http://simonwillison.net/tags/azaraskin.atom" rel="self"/><id>http://simonwillison.net/</id><updated>2010-05-25T15:20:00+00:00</updated><author><name>Simon Willison</name></author><entry><title>A New Type of Phishing Attack</title><link href="https://simonwillison.net/2010/May/25/phishing/#atom-tag" rel="alternate"/><published>2010-05-25T15:20:00+00:00</published><updated>2010-05-25T15:20:00+00:00</updated><id>https://simonwillison.net/2010/May/25/phishing/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://www.azarask.in/blog/post/a-new-type-of-phishing-attack/#"&gt;A New Type of Phishing Attack&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
Nasty trick from Ava Raskin—detect when your evil phishing page loses focus (when the user switches to another tab, for example), then replace the page content with a phishing UI from a site such as Gmail. When the user switches back they’re much less likely to bother checking the URL. Combine with CSS history sniffing to only show a UI for a site that you know the user has visited. Combine that with timing tricks to only attack sites which the user is currently logged in to.


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/phishing"&gt;phishing&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/security"&gt;security&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/recovered"&gt;recovered&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/azaraskin"&gt;azaraskin&lt;/a&gt;&lt;/p&gt;



</summary><category term="phishing"/><category term="security"/><category term="recovered"/><category term="azaraskin"/></entry></feed>