Be careful with fake links online

TABLE OF CONTENTS
Try clicking on Google's link: google.com
You think this is a link to Google?
Are not! You are wrong!
This is when I move the cursor onto the link. You see the browser's status bar displaying the actual link.
The programmer can completely show you a fake link and tell the browser about the real link when the user clicks on it.
<a href="https://www.wikipedia.org/">google.com</a>
Abusing this, many bad guys have lured people who don't have technology to click on bad links to take over accounts.
It could be a social media account or a bank account. The attack could be to create a fake website or send an email directly to the victim.
To avoid this, always be careful to check the link first in the status bar and check again in the address bar to make sure you are visiting the correct website you want.
Let's try the second example: google.com
It's still the same link as above, but when you move the cursor onto the link, the status bar still displays the exact link.
But this is when you click on the link. That is absolutely not the website we see on the interface or in the status bar.
This time, the attacker used a JavaScript code to change the address at the moment you click the mouse.
<a href="https://www.google.com/">google.com</a>
<script>
document.querySelector('a').addEventListener('click', function (e) {
e.preventDefault();
window.open('https://www.wikipedia.org/', '_blank');
});
</script>
Thanks to this, the status bar still displays an address that looks safe, but the address you were actually sent to is uncertain.
The attack scenario will be based on the 3rd party login button that you often see on websites. Also known as "BIBT" (Browser In The Browser).
For example, a fake login button Login with Google designed to take over accounts.
Have you noticed anything suspicious? Look at the link in the address bar, it looks completely real, not suspicious at all.
To test, let's try dragging it out to the browser.
You see, it is completely inside the website, it cannot be pulled out. It is designed so realistically that the buttons on the window work, you can even turn off this fake popup.
It is designed exactly like a Windows window. An attacker can even change its interface according to the victim's operating system.
For example, this is a fake popup with the MacOS interface.
To prevent this type of attack, try dragging the popup outside the website before you enter your account information.
Google login popup is just an example. In fact, an attacker can design it to target anything like Facebook accounts or bank accounts.
With how to create a new account. You almost won't see anything unusual here. I guess there are quite a few people using the same "1 password" for many different accounts. Hackers take advantage of this to collect information such as your email, phone number, and password to log in to other services. If you use the same password, you already know the result.
To help make your accounts more secure, you need to install 2-layer security (2FA). Speaking of 2-layer security, you also have to be very careful when registering an account somewhere that requires phone number authentication in the first step.
Hackers will create a very basic registration form that, at first glance, is not dangerous. Until the step of entering the phone number to receive the authentication SMS code. Instead of system authentication code, they use phone numbers to get sms codes from other services such as (social network accounts, bank accounts, coin wallets,...). Therefore, you need to pay attention to the name and address the message is sent to before entering that authentication code into the form on the website.
Please share with relatives and friends so they can know and be alert!
Related Articles