{"id":3910,"date":"2026-03-26T14:00:00","date_gmt":"2026-03-26T12:00:00","guid":{"rendered":"https:\/\/certitude.consulting\/blog\/?p=3910"},"modified":"2026-04-10T10:59:43","modified_gmt":"2026-04-10T08:59:43","slug":"golem-de-reports-on-certitude-researchs-full-screen-phishing","status":"publish","type":"post","link":"https:\/\/certitude.consulting\/blog\/en\/golem-de-reports-on-certitude-researchs-full-screen-phishing\/","title":{"rendered":"Golem.de reports on Certitude Research&#8217;s full-screen phishing"},"content":{"rendered":"\n<p>Key findings from our recent research on difficult-to-detect, cross-browser phishing technique for Windows or BitLocker passwords have been picked up by the German tech news website golem.de. The article describes the techniques that silently put the user into full-screen mode to generate realistic-looking Windows login screens and forward the entered password to the attackers.<\/p>\n\n\n\n<p>The article from golem.de can be read here:<br><a href=\"https:\/\/www.golem.de\/news\/kein-patch-verfuegbar-forscher-demonstrieren-windows-passwortklau-ueber-den-browser-2603-206956.html\">Kein Patch verf\u00fcgbar: Forscher demonstrieren Windows-Passwortklau \u00fcber den Browser &#8211; Golem.de<\/a><\/p>\n\n\n\n<p>The underlying analysis with a detailed attack scenario can be found in our research blog:<br><a href=\"https:\/\/certitude.consulting\/blog\/en\/abusing-modern-browser-features-for-phishing\/\">Abusing Modern Browser Features for Phishing \u2013 Certitude Blog<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"676\" height=\"836\" src=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2026\/03\/Golem-Teil-1-Neu-1.png\" alt=\"\" class=\"wp-image-3945\" srcset=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2026\/03\/Golem-Teil-1-Neu-1.png 676w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2026\/03\/Golem-Teil-1-Neu-1-243x300.png 243w\" sizes=\"auto, (max-width: 676px) 100vw, 676px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Key findings from our recent research on difficult-to-detect, cross-browser phishing technique for Windows or BitLocker passwords have been picked up by the German tech news website golem.de. The article describes the techniques that silently put the user into full-screen mode to generate realistic-looking Windows login screens and forward the entered password to the attackers. The [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":3913,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[128],"tags":[778,780,440],"class_list":["post-3910","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-press","tag-bitlocker","tag-full-screen-mode","tag-phishing-en"],"_links":{"self":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/3910","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/comments?post=3910"}],"version-history":[{"count":3,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/3910\/revisions"}],"predecessor-version":[{"id":3946,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/3910\/revisions\/3946"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/media\/3913"}],"wp:attachment":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/media?parent=3910"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/categories?post=3910"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/tags?post=3910"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}