{"id":1770,"date":"2010-05-25T14:33:52","date_gmt":"2010-05-25T13:33:52","guid":{"rendered":"http:\/\/blog.intego.com\/?p=1770"},"modified":"2010-05-25T14:33:52","modified_gmt":"2010-05-25T13:33:52","slug":"tabnapping-phishing-with-browser-tabs","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/tabnapping-phishing-with-browser-tabs\/","title":{"rendered":"Tabnapping: Phishing with Browser Tabs"},"content":{"rendered":"<p>Aza Raskin of Mozilla has <a href=\"http:\/\/www.azarask.in\/blog\/post\/a-new-type-of-phishing-attack\/\">demonstrated a new type of phishing attack<\/a> that takes advantage of the way people user tabs in browsers. In this attack, a user visits a hacked web page. If they go away from that page for a certain amount of time &#8211; either to another tab in their browser, or to another window &#8211; the page reloads with a page that could be designed to trap users in a phishing scam. Assuming that the user has many browser tabs open, or many windows, they may return to the page and think that they had logged out of a certain service. In the above proof-of-concept example, a Gmail page is displayed, but this could be a bogus bank page, PayPal login page, or Amazon.com page. <\/p>\n<p>This proof-of-concept demonstration works in Firefox and Safari (as well as other WebKit browsers), but we have not tested it with other browsers.<\/p>\n<p>For now, there&#8217;s no way to indicate that the page has changed, and users should be extremely careful before logging into any webmail, bank or online commerce site page. Make sure to check the URL carefully if you see an unexpected login screen. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Aza Raskin of Mozilla has demonstrated a new type of phishing attack that takes advantage of the way people user tabs in browsers. In this attack, a user visits a hacked web page. If they go away from that page for a certain amount of time &#8211; either to another tab in their browser, or [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":1693,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[33,102],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Aza Raskin of Mozilla has demonstrated a new type of phishing attack that takes advantage of the way people user tabs in browsers. In this attack, a user\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/tabnapping-phishing-with-browser-tabs\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tabnapping: Phishing with Browser Tabs  - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Aza Raskin of Mozilla has demonstrated a new type of phishing attack that takes advantage of the way people user tabs in browsers. In this attack, a user\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/tabnapping-phishing-with-browser-tabs\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2010-05-25T13:33:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/03\/firefox.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"128\" \/>\n\t<meta property=\"og:image:height\" content=\"127\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/tabnapping-phishing-with-browser-tabs\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/03\/firefox.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/03\/firefox.jpg\",\"width\":\"128\",\"height\":\"127\",\"caption\":\"Firefox Security Updates\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/tabnapping-phishing-with-browser-tabs\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/tabnapping-phishing-with-browser-tabs\/\",\"name\":\"Tabnapping: Phishing with Browser Tabs - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/tabnapping-phishing-with-browser-tabs\/#primaryimage\"},\"datePublished\":\"2010-05-25T13:33:52+00:00\",\"dateModified\":\"2010-05-25T13:33:52+00:00\",\"description\":\"Aza Raskin of Mozilla has demonstrated a new type of phishing attack that takes advantage of the way people user tabs in browsers. In this attack, a user\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/tabnapping-phishing-with-browser-tabs\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/tabnapping-phishing-with-browser-tabs\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/tabnapping-phishing-with-browser-tabs\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tabnapping: Phishing with Browser Tabs\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/tabnapping-phishing-with-browser-tabs\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/tabnapping-phishing-with-browser-tabs\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"Tabnapping: Phishing with Browser Tabs\",\"datePublished\":\"2010-05-25T13:33:52+00:00\",\"dateModified\":\"2010-05-25T13:33:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/tabnapping-phishing-with-browser-tabs\/#webpage\"},\"wordCount\":201,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/tabnapping-phishing-with-browser-tabs\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/03\/firefox.jpg\",\"keywords\":[\"Browser\",\"Phishing\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Aza Raskin of Mozilla has demonstrated a new type of phishing attack that takes advantage of the way people user tabs in browsers. In this attack, a user","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/tabnapping-phishing-with-browser-tabs\/","og_locale":"en_US","og_type":"article","og_title":"Tabnapping: Phishing with Browser Tabs  - The Mac Security Blog","og_description":"Aza Raskin of Mozilla has demonstrated a new type of phishing attack that takes advantage of the way people user tabs in browsers. In this attack, a user","og_url":"https:\/\/www.intego.com\/mac-security-blog\/tabnapping-phishing-with-browser-tabs\/","og_site_name":"The Mac Security Blog","article_published_time":"2010-05-25T13:33:52+00:00","og_image":[{"width":"128","height":"127","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/03\/firefox.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/tabnapping-phishing-with-browser-tabs\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/03\/firefox.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/03\/firefox.jpg","width":"128","height":"127","caption":"Firefox Security Updates"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/tabnapping-phishing-with-browser-tabs\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/tabnapping-phishing-with-browser-tabs\/","name":"Tabnapping: Phishing with Browser Tabs - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/tabnapping-phishing-with-browser-tabs\/#primaryimage"},"datePublished":"2010-05-25T13:33:52+00:00","dateModified":"2010-05-25T13:33:52+00:00","description":"Aza Raskin of Mozilla has demonstrated a new type of phishing attack that takes advantage of the way people user tabs in browsers. In this attack, a user","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/tabnapping-phishing-with-browser-tabs\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/tabnapping-phishing-with-browser-tabs\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/tabnapping-phishing-with-browser-tabs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Tabnapping: Phishing with Browser Tabs"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/tabnapping-phishing-with-browser-tabs\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/tabnapping-phishing-with-browser-tabs\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"Tabnapping: Phishing with Browser Tabs","datePublished":"2010-05-25T13:33:52+00:00","dateModified":"2010-05-25T13:33:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/tabnapping-phishing-with-browser-tabs\/#webpage"},"wordCount":201,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/tabnapping-phishing-with-browser-tabs\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/03\/firefox.jpg","keywords":["Browser","Phishing"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/03\/firefox.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-sy","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/1770"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=1770"}],"version-history":[{"count":0,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/1770\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/1693"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=1770"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=1770"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=1770"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}