Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    HONOR MagicBook Pro 14 officially available nationwide for RM4499

    AMD’s powerful AI chips can finally be unleashed on Windows PCs

    Imilab C30 Dual review: 2 lenses, 1 smart monitoring solution

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      How far will AI go to defend its own survival?

      June 2, 2025

      The internet thinks this video from Gaza is AI. Here’s how we proved it isn’t.

      May 30, 2025

      Nvidia CEO hails Trump’s plan to rescind some export curbs on AI chips to China

      May 22, 2025

      AI poses a bigger threat to women’s work, than men’s, report says

      May 21, 2025

      AMD CEO Lisa Su calls China a ‘large opportunity’ and warns against strict U.S. chip controls

      May 8, 2025
    • Business

      The EU challenges Google and Cloudflare with its very own DNS resolver that can filter dangerous traffic

      June 11, 2025

      These two Ivanti bugs are allowing hackers to target cloud instances

      May 21, 2025

      How cloud and AI transform and improve customer experiences

      May 10, 2025

      Cookie-Bite attack PoC uses Chrome extension to steal session tokens

      April 22, 2025

      Trump tariffs reignite Europe’s push for cloud sovereignty

      April 17, 2025
    • Crypto

      XRP Price Slips as Bears Tighten Grip and Short Bets Surge

      June 12, 2025

      HTX Launches TRX Options, Empowering Users with Flexible and Diversified Trading Strategies

      June 12, 2025

      Ethereum Leverage At All-Time High as BlackRock Ramps Up Accumulation

      June 12, 2025

      HBAR Price Downtrend Set To Face Volatility Explosion; Recovery Likely

      June 12, 2025

      Aura (AURA) Token Skyrockets Over 3,500%, But Analysts Urge Caution Amid Rug Pull Fears

      June 11, 2025
    • Technology

      AMD’s powerful AI chips can finally be unleashed on Windows PCs

      June 13, 2025

      Imilab C30 Dual review: 2 lenses, 1 smart monitoring solution

      June 13, 2025

      Microsoft’s AI helper, Copilot Vision, is now live

      June 13, 2025

      Microsoft throws shade at macOS Tahoe’s familiar new vista

      June 13, 2025

      WTF is sell-side decisioning?

      June 12, 2025
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Shop Now
    Tech AI Verse
    You are at:Home»Technology»Apple Safari exposes users to fullscreen browser-in-the-middle attacks
    Technology

    Apple Safari exposes users to fullscreen browser-in-the-middle attacks

    TechAiVerseBy TechAiVerseMay 29, 2025No Comments3 Mins Read0 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Apple Safari exposes users to fullscreen browser-in-the-middle attacks
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    Apple Safari exposes users to fullscreen browser-in-the-middle attacks

    A weakness in Apple’s Safari web browser allows threat actors to leverage the fullscreen browser-in-the-middle (BitM) technique to steal account credentials from unsuspecting users.

    By abusing the Fullscreen API, which instructs any content on a webpage to enter the browser’s fullscreen viewing mode, hackers can exploit the shortcoming to make guardrails less visible on Chromium-based browsers and trick victims into typing sensitive data in an attacker-controlled window.

    SquareX researchers observed an increase use of this type of malicious activity and say that such attacks are particularly dangerous for Safari users, as Apple’s browser fails to properly alert users when a browser window enters fullscreen mode.

    “SquareX’s research team has observed multiple instances of the browser’s FullScreen API being exploited to address this flaw by displaying a fullscreen BitM window that covers the parent window’s address bar, as well as a limitation specific to Safari browsers that makes fullscreen BitM attacks especially convincing,” describes the report.

    How BitM works

    A common BitM attack involves tricking users into interacting with an attacker-controlled remote browser that shows a legitimate login page. This is achieved through tools like noVNC – an open-source VNC browser client, which opens a remote browser on top of the victim’s session.

    Attacker-controlled browser opens legitimate Steam login page in BitM attack
    Source: SquareX

    Since the log in process happens in the attacker’s browser, the credentials are collected but the victim also successfully accesses their account unaware of the theft.

    The attack still requires tricking the victim into clicking on a malicious link that redirects them to a fake site impersonating the target service. However, this can be easily achieved through sponsored ads in web browsers, social media posts, or comments.

    Promoting fake Figma site through sponsored ads
    Source: SquareX

    Fullscreen deception

    If users miss the suspicious URL in the browser bar and click on the log in button, the BitM window becomes active. Until triggered, the window stayed hidden from the victim in minimized mode.

    If users miss the suspicious URL in the browser bar and click on the log in button, which activates the BitM window that was hidden from the victim in minimized mode.

    Once activated, the attacker-controlled browser window enters fullscreen mode and covers the fake website, showing to the user the legitimate website they wanted to access.

    Security solutions like EDRs or SASE/SSE won’t trigger any warnings when this happens, as the attack abuses standard browser APIs.

    The researchers explain that Firefox and Chromium-based browsers (e.g. Chrome and Edge) show an alert whenever fullscreen is active. Although many users may miss the warning, it is still a guardrail that lowers the risk of a BitM attack.

    Warning message for fullscreen mode on Firefox (left) and Chrome (right)
    Source: SquareX

    However, on Safari there is no alert and the only sign of a browser entering fullscreen mode is a “swipe” animation that can be easily missed.

    “While the attack works on all browsers, fullscreen BiTM attacks are particularly convincing on Safari browsers due to the lack of clear visual cues when going fullscreen,” SquareX researchers say.

    SquareX contacted Apple with its findings and received a “wontfix” reply, the explanation received being that the animation is present to indicate changes, and that should be enough.

    BleepingComputer has also reached out to Apple for a comment, but we are still waiting for their response.


    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleUS sanctions firm linked to cyber scams behind $200 million in losses
    Next Article Threat actors abuse Google Apps Script in evasive phishing attacks
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    AMD’s powerful AI chips can finally be unleashed on Windows PCs

    June 13, 2025

    Imilab C30 Dual review: 2 lenses, 1 smart monitoring solution

    June 13, 2025

    Microsoft’s AI helper, Copilot Vision, is now live

    June 13, 2025
    Leave A Reply Cancel Reply

    Top Posts

    New Akira ransomware decryptor cracks encryptions keys using GPUs

    March 16, 202523 Views

    OpenAI details ChatGPT-o3, o4-mini, o4-mini-high usage limits

    April 19, 202518 Views

    Rsync replaced with openrsync on macOS Sequoia

    April 7, 202514 Views

    Arizona moves to ban AI use in reviewing medical claims

    March 12, 202511 Views
    Don't Miss
    Gadgets June 13, 2025

    HONOR MagicBook Pro 14 officially available nationwide for RM4499

    HONOR MagicBook Pro 14 officially available nationwide for RM4499 HONOR has announced the general availability…

    AMD’s powerful AI chips can finally be unleashed on Windows PCs

    Imilab C30 Dual review: 2 lenses, 1 smart monitoring solution

    Microsoft’s AI helper, Copilot Vision, is now live

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    HONOR MagicBook Pro 14 officially available nationwide for RM4499

    June 13, 20250 Views

    AMD’s powerful AI chips can finally be unleashed on Windows PCs

    June 13, 20250 Views

    Imilab C30 Dual review: 2 lenses, 1 smart monitoring solution

    June 13, 20250 Views
    Most Popular

    Ethereum must hold $2,000 support or risk dropping to $1,850 – Here’s why

    March 12, 20250 Views

    Xiaomi 15 Ultra Officially Launched in China, Malaysia launch to follow after global event

    March 12, 20250 Views

    Apple thinks people won’t use MagSafe on iPhone 16e

    March 12, 20250 Views
    © 2025 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.