Browshing a new way of phishing using a malicious browser extension

  title={Browshing a new way of phishing using a malicious browser extension},
  author={G. Varshney and M. Misra and P. Atrey},
  journal={2017 Innovations in Power and Advanced Computing Technologies (i-PACT)},
  • G. Varshney, M. Misra, P. Atrey
  • Published 2017
  • Computer Science
  • 2017 Innovations in Power and Advanced Computing Technologies (i-PACT)
  • Phishing is a well-known cybercrime. It is performed using various tricks and techniques including email spoofing, exploiting browser vulnerabilities, web spoofing, DNS poisoning, etc. This paper sheds light on a new technique that can be used by attackers to perform a successful phishing attack through malicious browser extensions. Successful experiments have been performed over the Google Chrome browser and the technique has been validated. This paper will help researchers and browser… CONTINUE READING
    6 Citations

    Figures, Tables, and Topics from this paper

    Detecting Spying and Fraud Browser Extensions: Short Paper
    • 2
    A new secure authentication scheme for web login using BLE smart devices
    • G. Varshney, M. Misra, P. Atrey
    • Computer Science
    • 2017 11th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)
    • 2017
    • 3
    Architectural Vulnerabilities in Plug-and-Play Systems


    Bypassing Security Toolbars and Phishing Filters via DNS Poisoning
    • Saeed Abu-Nimeh, S. Nair
    • Computer Science
    • IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference
    • 2008
    • 30
    • PDF
    Personal Secret Information Based Authentication towards Preventing Phishing Attacks
    • 5
    Secret information display based authentication technique towards preventing phishing attacks
    • 4
    Trustworthiness testing of phishing websites: A behavior model-based approach
    • 58
    • PDF
    Enhancing web browser security against malware extensions
    • 82
    • PDF
    Phoolproof Phishing Prevention
    • 209
    • PDF
    Phishing for user security awareness
    • 220
    • PDF
    Forensic analysis of E-mail address spoofing
    • 8