TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

“Serverless” Phishing Campaign

21 pointsby kencauseyalmost 4 years ago

2 comments

dmbaggettalmost 4 years ago
These are actually quite common now. They&#x27;re especially problematic because since the credential harvesting happens on localhost, there&#x27;s no bad site to take down, and no indicative URL. Often the Javascript payload is heavily obfuscated.<p>This is one reason why we (INKY) sanitize HTML to normalize character representations, remove JavaScript, XSS, etc. You can no longer rely on client-side sanitization as you could in the desktop client days (though even some of the better web services, like Fastmail actually do sanitize). It&#x27;s also why you have to be super paranoid about HTML attachments now.
评论 #27256730 未加载
pypiealmost 4 years ago
So the point is to avoid firing an async request to a server you control, since that server could be shut down? Surely SmptJS would kill the token if requested to, why is this any better?