Skip to content

Secure IT

Stay Secure. Stay Informed.

Primary Menu
  • Home
  • Sources
    • Krebs On Security
    • Security Week
    • The Hacker News
    • Schneier On Security
  • Home
  • Security Week
  • Browser Security Under Siege: The Alarming Rise of AI-Powered Phishing
  • Security Week

Browser Security Under Siege: The Alarming Rise of AI-Powered Phishing

Kevin Townsend March 20, 2025
0

Browser security cannot be ignored. It’s where people spend most of their working day, and it’s where attackers focus most of their attacks.

Statistics come from Menlo Security’s analysis of 750,000 browser-based phishing attacks targeting more than 800 entities detected over the last 12 months. This analysis reveals a 140% increase in browser phishing, including a 130% increase in zero-hour phishing attacks (effectively, a zero-day attack applied to phishing).

The reasons for the growth are multiple: our growing reliance on the browser for much of our daily work, the prevalence of zero-day vulnerabilities, the increasing sophistication of the cybercriminal underworld, and, worryingly, the growing influence of gen-AI. Gen-AI is particularly concerning, both for its use today and its potential use in the future.

“Threat actors have advanced in speed and skills. They are using the same tools and infrastructure as professional engineers,” comments Andrew Harding, VP of security strategy at Menlo Security. “We’re seeing a dangerous combination of zero-day attacks, advanced social engineering techniques, sophisticated phishing techniques, and readily available phishing-as-a-service kits, all designed to infiltrate systems and steal valuable data.”

He adds, “This trend is only poised to escalate dramatically in 2025 as attackers adopt AI to increase both scale and effectiveness.”

The relevance of gen-AI is complex. It is used by criminals to create compelling phishing sites, it is used as a lure offering fake AI services, and it is used to create and scale sophisticated phishing attacks.

“It’s very difficult for end users to identify these browser-based phishing attacks since they are mostly using trusted services,” warns Thomas Richards, red team practice director at Black Duck. “Before proceeding with account creation, or entering credentials on an unknown website, it’s best to do some research to ensure that it is the original website and not a forgery.”

Menlo’s report (PDF) says the firm detected nearly 600 incidents with imposter sites passing themselves off as gen-AI sites offering fake AI services. Gen-AI is used by criminals to create compelling deepfakes and to research individual targets for more efficient phishing. This will only increase in the future. 

Advertisement. Scroll to continue reading.

“Phishers exploit the high public interest in gen-AI by imitating popular AI platforms, banking on user curiosity and trust in cutting-edge technology,” warns Jason Soroko, senior fellow at Sectigo. “Vigilant verification of domain authenticity remains essential to avoid falling prey to these deceptive tactics – know where you are browsing.”

Interestingly, however, most gen-AI fraud was not for the purpose of credential theft (the traditional first purpose of phishing). Harding notes that the fake gen-AI sites trick people into entering personal data for the purpose, perhaps, of generating a resume. “The returned document is typically a PDF,” he explains, “where malware can hide out and be delivered.” Gen-AI is, in short, beginning to allow criminals to skip the credential theft stage of an attack and go straight to the common final stage – the delivery of ransomware in an expected PDF.

“Attackers will continue exploiting trusted platforms and using gen-AI to create more convincing phishing campaigns at unprecedented scale,” adds Stephen Kowski, field CTO at SlashNext. “The combination of speed, creativity, and automation will make these threats particularly challenging.”

This is especially relevant to the use of browsers on mobile devices. “Combining these capabilities with the form factor or mobile browsers, with their limited URL visibility and reliance on auto-login features, provides the perfect storm for attackers to steal credentials without raising suspicion,” explains Krishna Vishnubhotla, VP of product strategy at Zimperium.

Menlo also comments on the growing use of phishing-as-a-service (PhaaS) and expects this to increase. PhaaS is not solely a browser-based problem. Separately, a report from Barracuda published on the same day as Menlo’s browser-specific report (March 19, 2025) notes, “The first few months of 2025 saw a massive spike in phishing-as-a-service (PhaaS) attacks targeting organizations around the world, with more than a million attacks detected by Barracuda systems in January and February.” It adds that Tycoon 2FA was the most prominent PhaaS platform, accounting for 89% of the incidents seen in January.

“The integration of AI and large language models (LLMs) into these cybercrime services will further enhance the scale and automation of attacks, enabling cybercriminals to leverage sophisticated browser-based phishing techniques and automated social media reconnaissance for more effective phishing campaigns,” says Menlo.

About The Author

Kevin Townsend

See author's posts

Original post here

Continue Reading

Previous: Dataminr Raises $85 Million for AI-Powered Information Platform
Next: Ongoing Cyber Attacks Exploit Critical Vulnerabilities in Cisco Smart Licensing Utility

Trending Now

Oops: DanaBot Malware Devs Infected Their Own PCs Oops: DanaBot Malware Devs Infected Their Own PCs 1

Oops: DanaBot Malware Devs Infected Their Own PCs

May 22, 2025
Oops: DanaBot Malware Devs Infected Their Own PCs danabot.png 2

Oops: DanaBot Malware Devs Infected Their Own PCs

May 22, 2025
Chinese Hackers Exploit Trimble Cityworks Flaw to Infiltrate U.S. Government Networks chinese-hackers-attacking.jpg 3

Chinese Hackers Exploit Trimble Cityworks Flaw to Infiltrate U.S. Government Networks

May 22, 2025
Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise exploitss.jpg 4

Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise

May 22, 2025
Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks chinese.jpg 5

Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks

May 22, 2025
Webinar: Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program cyber-program.jpg 6

Webinar: Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program

May 22, 2025

Related Stories

Cybersecurity_News-SecurityWeek.jpg
  • Security Week

Insurance Firm Lemonade Says API Glitch Exposed Some Driver’s License Numbers

Ionut Arghire April 15, 2025 0
ransomware.jpeg
  • Security Week

Kidney Dialysis Services Provider DaVita Hit by Ransomware

Ionut Arghire April 15, 2025 0
Cybersecurity_News-SecurityWeek.jpg
  • Security Week

Conduent Says Names, Social Security Numbers Stolen in Cyberattack

Ionut Arghire April 15, 2025 0
Cybersecurity_News-SecurityWeek.jpg
  • Security Week

2.6 Million Impacted by Landmark Admin, Young Consulting Data Breaches

Ionut Arghire April 15, 2025 0
VC-Funding_China-tech.jpg
  • Security Week

China Pursuing 3 Alleged US Operatives Over Cyberattacks During Asian Games

Associated Press April 15, 2025 0
Satellite-Link-Cybersecurity.jpg
  • Security Week

Blockchain, Quantum, and IoT Firms Unite to Secure Satellite Communications Against Quantum Threats

Kevin Townsend April 15, 2025 0

Connect with Us

Social menu is not set. You need to create menu and assign it to Social Menu on Menu Settings.

Trending News

Oops: DanaBot Malware Devs Infected Their Own PCs Oops: DanaBot Malware Devs Infected Their Own PCs 1
  • Uncategorized

Oops: DanaBot Malware Devs Infected Their Own PCs

May 22, 2025
Oops: DanaBot Malware Devs Infected Their Own PCs danabot.png 2
  • Krebs On Security

Oops: DanaBot Malware Devs Infected Their Own PCs

May 22, 2025
Chinese Hackers Exploit Trimble Cityworks Flaw to Infiltrate U.S. Government Networks chinese-hackers-attacking.jpg 3
  • The Hacker News

Chinese Hackers Exploit Trimble Cityworks Flaw to Infiltrate U.S. Government Networks

May 22, 2025
Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise exploitss.jpg 4
  • The Hacker News

Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise

May 22, 2025
Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks chinese.jpg 5
  • The Hacker News

Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks

May 22, 2025
Webinar: Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program cyber-program.jpg 6
  • The Hacker News

Webinar: Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program

May 22, 2025
Unpatched Versa Concerto Flaws Let Attackers Escape Docker and Compromise Host exploit.jpg 7
  • The Hacker News

Unpatched Versa Concerto Flaws Let Attackers Escape Docker and Compromise Host

May 22, 2025

You may have missed

Oops: DanaBot Malware Devs Infected Their Own PCs
  • Uncategorized

Oops: DanaBot Malware Devs Infected Their Own PCs

Sean May 22, 2025 0
danabot.png
  • Krebs On Security

Oops: DanaBot Malware Devs Infected Their Own PCs

BrianKrebs May 22, 2025 0
chinese-hackers-attacking.jpg
  • The Hacker News

Chinese Hackers Exploit Trimble Cityworks Flaw to Infiltrate U.S. Government Networks

[email protected] The Hacker News May 22, 2025 0
exploitss.jpg
  • The Hacker News

Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise

[email protected] The Hacker News May 22, 2025 0
Copyright © 2025 All rights reserved. | MoreNews by AF themes.