{"id":3922,"date":"2026-04-01T00:00:00","date_gmt":"2026-03-31T22:00:00","guid":{"rendered":"https:\/\/certitude.consulting\/blog\/?p=3922"},"modified":"2026-04-02T14:47:38","modified_gmt":"2026-04-02T12:47:38","slug":"it-sicherheit-de-reports-on-the-discovery-of-a-new-phishing-method","status":"publish","type":"post","link":"https:\/\/certitude.consulting\/blog\/en\/it-sicherheit-de-reports-on-the-discovery-of-a-new-phishing-method\/","title":{"rendered":"it-sicherheit.de Reports on the Discovery of a New Phishing Method"},"content":{"rendered":"\n<p>Key findings from our recent research on difficult-to-detect, cross-browser phishing technique for Windows or BitLocker passwords have been picked up by the German tech news website golem.de. The article describes the techniques that silently put the user into full-screen mode to generate realistic-looking Windows login screens and forward the entered password to the attackers.<\/p>\n\n\n\n<p>The article from golem.de can be read here:<br><a href=\"https:\/\/www.golem.de\/news\/kein-patch-verfuegbar-forscher-demonstrieren-windows-passwortklau-ueber-den-browser-2603-206956.html\"><a href=\"https:\/\/it-sicherheit.de\/news\/neuartige-phishing-methode-mit-vollbild-hijacking-entdeckt\/\">Phishing method using fullscreen hijacking discovered<\/a><\/a><\/p>\n\n\n\n<p>The underlying analysis with a detailed attack scenario can be found in our research blog:<br><a href=\"https:\/\/certitude.consulting\/blog\/en\/abusing-modern-browser-features-for-phishing\/\"><a href=\"https:\/\/certitude.consulting\/blog\/en\/abusing-modern-browser-features-for-phishing\/\">Abusing Modern Browser Features for Phishing \u2013 Certitude Blog<\/a><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Key findings from our recent research on difficult-to-detect, cross-browser phishing technique for Windows or BitLocker passwords have been picked up by the German tech news website golem.de. The article describes the techniques that silently put the user into full-screen mode to generate realistic-looking Windows login screens and forward the entered password to the attackers. The [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":3913,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1,128],"tags":[782,440,784],"class_list":["post-3922","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-expertise","category-press","tag-hijacking","tag-phishing-en","tag-windows-password"],"_links":{"self":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/3922","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/comments?post=3922"}],"version-history":[{"count":4,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/3922\/revisions"}],"predecessor-version":[{"id":3929,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/3922\/revisions\/3929"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/media\/3913"}],"wp:attachment":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/media?parent=3922"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/categories?post=3922"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/tags?post=3922"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}