52
you are viewing a single comment's thread
view the rest of the comments
[-] subignition@fedia.io 7 points 1 week ago

This is somewhat clever, but if you're phished into attempting to login on a malicious page, you've already lost

[-] Catoblepas@piefed.blahaj.zone 4 points 1 week ago

Per the article, the attack works by making you think you’re clicking CAPTCHAs and reduces the opacity of the auto login buttons you’re actually pressing.

[-] subignition@fedia.io 1 points 1 week ago
[-] Catoblepas@piefed.blahaj.zone 6 points 1 week ago

Then I guess your comment confused me because the attack doesn’t require the user to attempt to log in. Completing a CAPTCHA on a random page isn’t internet idiot behavior, it’s what we’ve been trained to expect is the norm.

[-] subignition@fedia.io 3 points 1 week ago

I think I meant to reply to the user who was talking about KeePass. If you have brought the user to a malicious page, you can already just impersonate the login form and something like KeePass that doesn't offer to autofill passwords will be none the wiser (because the user initiates the paste / autotype)

In the XSS case, I think this would be occurring on a page the user trusts but has been compromised by an external script (via an ad or other means). If it's at a domain the user has saved credentials for, odds are high it's a login page, but I think you're right that an attacker could probably add their own input field to provoke the password manager overlay, with an innocuous-looking fake captcha or cookie banner over it.

this post was submitted on 21 Aug 2025
52 points (100.0% liked)

Linux and Tech News

2171 readers
1 users here now

This is where all the News about Linux and Linux adjacent things goes. We'll use some of the articles here for the show! You can watch or listen at:

You can also get involved at our forum here on Lemmy:

Or just get the most recent episode of the show here:

founded 2 years ago
MODERATORS