Desktop control & streaming
Summary
Rather than using traditional phishing infrastructure, attackers are using remote desktop control and streaming software to trick victims into remotely accessing and entering their credential into sites rendered directly in the attacker’s browser — a bit like handing your laptop to someone and asking them to log in. This is also known as a Browser-in-the-Middle attack.
This has a few advantages from a technical perspective as it renders the webpage as a canvas element rather than showing the typical DOM structure of the page, preventing many cloned login page-type detections from firing.
It is relatively easy to detect the use of remote desktop software, but given that a number of sites use remote control and streaming tools, filtering malicious use from legitimate can be challenging.
Examples
- Example 1: EvilNoVNC — Also see this video demo
- Example 2: CuddlePhish