New Phishing Campaign Uses Browser-in-the-Browser Attacks to Target Video Gamers/Counter-Strike 2 Players

March 25, 2025, 1:20 p.m.

Description

A sophisticated phishing campaign targeting Counter-Strike 2 players has been uncovered, employing browser-in-the-browser (BitB) attacks. The campaign aims to steal Steam accounts by creating convincing fake browser pop-ups that mimic legitimate login pages. The threat actors are abusing the identity of the pro eSports team Navi and promoting their scams on platforms like YouTube. The stolen accounts are likely intended for resale on online marketplaces. The majority of the phishing sites are in English, with one Chinese site discovered. This campaign highlights the ongoing evolution of phishing techniques and the importance of vigilance when encountering login pop-ups, especially for desktop users.

Date

  • Created: March 25, 2025, 9:02 a.m.
  • Published: March 25, 2025, 9:02 a.m.
  • Modified: March 25, 2025, 1:20 p.m.

Indicators

  • 77.105.161.50
  • caserevs.com
  • simplegive.cn
  • caseneus.cfd
  • caseners.com
  • caseneiv.com
  • caseneos.com
  • casenaps.com

Attack Patterns

Additional Informations

  • China