Cyber Security News

Zero-Hour Phishing Attacks Exploiting Browser Vulnerabilities Increases by 130%

Recent cybersecurity data reveals an alarming 130% surge in zero-hour phishing attacks targeting previously unknown browser vulnerabilities.

These sophisticated attacks leverage unpatched security flaws in popular browsers to deploy malicious payloads before security teams can implement countermeasures, leaving users and organizations extremely vulnerable in the critical first hours of an attack campaign.

The dramatic increase has been primarily observed in attacks exploiting JavaScript rendering engines and browser extension APIs, with Chrome, Firefox, and Edge users facing the highest risk profiles.

Threat actors are increasingly utilizing obfuscated code and DOM manipulation techniques to bypass traditional security controls while harvesting credentials and deploying secondary payloads.

Menlo Security researchers detected that these zero-hour phishing campaigns frequently employ dynamic code loading techniques to evade detection.

Their analysis revealed that attackers are using sophisticated browser fingerprinting to identify vulnerable targets before deploying their exploits, significantly increasing success rates compared to traditional phishing methods.

The most concerning aspect of this trend is the speed at which compromised systems are being monetized.

According to incident response data, the average time between initial browser compromise and credential exfiltration has dropped to just 27 minutes, giving security teams minimal time to detect and respond to active breaches before damage occurs.

These attacks typically begin with specially crafted emails containing links to malicious websites that appear legitimate but contain obfuscated JavaScript code that exploits browser parsing vulnerabilities to execute arbitrary code.

Exploitation Mechanisms

The most prevalent attack vector involves exploiting CVE-2023-45812, a type confusion vulnerability in JavaScript engines that allows attackers to bypass same-origin policies.

When a user visits a compromised site, the following code is typically injected to exploit the vulnerability:-

function triggerVulnerability() {
  const vulnerableObj = {"prop": document.createElement("iframe")};
  const proxyObj = new Proxy(vulnerableObj, {
    get: function(target, prop) {
      if (prop === "prop") {
        // Type confusion triggered here
        Object.defineProperty(target, "prop", {value: {}});
        return document.domain;
      }
      return target[prop];
    }
  });

  setTimeout(() => {
    // Execute arbitrary code with elevated privileges
    proxyObj.prop.innerHTML = '';
  }, 100);
}

This code leverages race conditions in the browser’s garbage collection and property access mechanisms to break out of the browser sandbox.

Once executed, the malicious code can access sensitive browser data, including stored credentials and session information.

Security teams should immediately implement Content Security Policies with strict-dynamic directives and ensure all browsers are updated to the latest versions.

Additionally, implementing browser isolation technologies can provide effective protection by executing web content in secured containers separated from endpoint devices.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Tushar Subhra Dutta

Tushar is a senior cybersecurity and breach reporter. He specializes in covering cybersecurity news, trends, and emerging threats, data breaches, and malware attacks. With years of experience, he brings clarity and depth to complex security topics.

Recent Posts

Top 10 Best Supply Chain Intelligence Security Companies in 2025

The digital world continues to face growing threats around software vulnerabilities, data breaches, and cyber…

2 hours ago

Scattered LAPSUS$ Hunters Announced Salesforce Breach List On New Onion Site

A cybercrime collective known as Scattered LAPSUS$ Hunters has launched a new data leak site…

2 hours ago

Renault UK Suffers Cyberattack – Hackers Stolen Users Customers Personal Data

Renault UK has notified customers of a data breach after a cyberattack on one of…

2 hours ago

Top 10 Best Fraud Prevention Companies in 2025

In 2025, digital transactions are at an all-time high, but so are the risks of…

4 hours ago

New Android Spyware Attacking Android Users Mimic as Signal and ToTok Apps

In recent months, security teams have observed a surge in Android spyware campaigns that prey…

5 hours ago

Threat Actors Pose as Government Officials to Attack Organizations with StallionRAT

In recent months, a sophisticated campaign dubbed Cavalry Werewolf has emerged, targeting government and critical…

6 hours ago