New Browser-in-the-Middle Attack Exploits Safari’s Fullscreen API to Steal Credentials

A sophisticated Browser-in-the-Middle (BitM) attack has emerged, specifically targeting users of Apple’s Safari browser by exploiting vulnerabilities in its Fullscreen API implementation. This attack enables cybercriminals to execute highly deceptive phishing campaigns, effectively stealing login credentials and sensitive information from unsuspecting users.

Understanding the Attack Mechanism

Unlike traditional phishing methods, this new BitM attack leverages Safari’s fullscreen mode to obscure malicious URLs completely. This tactic makes it exceedingly difficult for even vigilant users to detect the threat. The attack was disclosed as part of the Year of Browser Bugs (YOBB) project, highlighting its significance in the evolving landscape of browser security vulnerabilities.

Exploiting Safari’s Fullscreen API

The core of this attack lies in a fundamental flaw within Safari’s implementation of the Fullscreen API. Notably, Safari lacks adequate visual notifications when users enter fullscreen mode. While browsers like Chrome, Firefox, and Edge display explicit warning messages upon activation of fullscreen mode, Safari only presents a brief swipe animation without any clear messaging. This design oversight allows attackers to trigger fullscreen mode through seemingly benign interactions, such as clicking a fake login button embedded within a malicious webpage.

Technical Execution of the Attack

The attack utilizes the noVNC remote access framework to create an attacker-controlled browser session within the victim’s window. When combined with the Fullscreen API, the malicious content occupies the entire screen, effectively masking any indicators that could alert users to the deception. Researchers from SquareX have noted that Safari users are especially vulnerable to this attack as there is no clear visual indicator of users entering fullscreen.

The Fullscreen BitM attack operates by exploiting the loose specifications of the Fullscreen API, which only require that the user has to interact with the page or a UI element in order for this feature to work. Attackers can embed any clickable element in their phishing pages that triggers the `requestFullscreen()` method when activated. The attack sequence typically follows this pattern:

1. The victim visits a malicious webpage.

2. The page presents a clickable element, such as a fake login button.

3. Upon clicking, the page enters fullscreen mode without clear notification.

4. A fake login page is displayed, mimicking a legitimate site.

5. The victim enters their credentials, which are then captured by the attacker.

Once triggered, the attack displays a fullscreen window that perfectly mimics legitimate login pages, complete with authentic-looking URLs in the address bar. The victim believes they are interacting with a genuine service while actually providing credentials to an attacker-controlled environment. This technique represents a significant evolution from traditional BitM attacks, which previously suffered from the limitation of visible malicious URLs in the parent window.

Implications for Enterprise Security

The discovery of this attack has profound implications for enterprise security. Existing endpoint detection and response (EDR) solutions lack the capability to monitor browser-based activities effectively. SquareX researchers emphasized that EDRs have zero visibility into the browser and are proven to be obsolete when it comes to detecting any BitM attack, much less its more advanced fullscreen variant. This limitation extends to Secure Access Service Edge (SASE) and Security Service Edge (SSE) security solutions, which can be bypassed through technologies like remote browser isolation and pixel pushing techniques.

Apple’s Response and Recommendations

Apple has been formally notified of the vulnerability but has indicated no plans to address the issue, stating that Safari’s Fullscreen API behavior is working as designed. This response highlights the challenge of addressing architectural vulnerabilities that exist by design rather than implementation errors.

Security experts recommend that enterprises deploy browser-native security tools capable of monitoring in-browser activities directly. As traditional security solutions may not detect such sophisticated attacks, adopting advanced browser security measures becomes imperative.

Conclusion

The emergence of this new BitM attack exploiting Safari’s Fullscreen API underscores the evolving nature of cyber threats and the need for continuous vigilance. Users are advised to exercise caution when interacting with unfamiliar web content and to stay informed about potential vulnerabilities in the software they use daily.