Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Skills Shortages Trump Headcount as Critical Cyber Challenge

December 6, 2025

RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware

December 6, 2025

Louvre to Bolster Its Security, Issues €57m Public Tender

December 6, 2025
Facebook X (Twitter) Instagram
Saturday, December 6
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»New GhostFrame Phishing Framework Hits Over One Million Attacks
News

New GhostFrame Phishing Framework Hits Over One Million Attacks

Team-CWDBy Team-CWDDecember 5, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A new phishing framework named GhostFrame, built around a stealthy iframe architecture, has been linked to more than one million attacks.

The kit, discovered by cybersecurity experts at Barracuda, relies on techniques that differ from known Phishing-as-a-Service (PhaaS) offerings.

How GhostFrame Works

At the center of GhostFrame’s design is a simple HTML file that poses as a benign landing page while concealing malicious behavior within an embedded iframe.

This structure allows attackers to swap phishing content, adjust regional targets or evade scanners without changing the outward-facing page. Barracuda reported that while iframe abuse is common, this is the first time an entire phishing framework has been structured around it.

GhostFrame’s attack chain unfolds in two stages. The visible outer page carries no typical phishing markers and relies on light obfuscation plus dynamic code that generates a new subdomain for every visitor.

Hidden within are pointers that load a secondary phishing page inside the iframe. This internal page contains the actual credential-harvesting components, which are buried inside a feature meant for streaming very large files to sidestep static detection tools.

Read more on phishing attack trends: 752,000 Browser Phishing Attacks Mark 140% Increase YoY

The kit’s emails vary widely, switching between themes such as fake contract notices or HR updates. Subject lines have included “Secure Contract & Proposal Notification,” “Annual Review Reminder” and “Invoice Attached” and “Password Reset Request.”

Barracuda identified two forms of the GhostFrame source code: one obfuscated and one readable, with the latter containing developer comments.

The kit includes anti-analysis controls that disable right-click actions, block the F12 key and stop common shortcuts used to inspect page code. Even the Enter key is restricted, limiting attempts to save or examine the page.

GhostFrame also uses randomized subdomains for delivery. A loader script validates each subdomain before revealing the malicious iframe, then manages the browser environment based on messages sent from within the iframe. If scripts fail, a hard-coded fallback iframe ensures the attack continues.

Defensive Measures

To defend against similar threats, Barracuda recommends a strategy that includes:

  • Enforcing regular browser updates

  • Training staff to avoid unsolicited links and check URLs carefully

  • Deploying email gateways and web filters to spot suspicious iframes

  • Restricting iframe embedding on corporate sites and scanning for injection risks

  • Monitoring for unusual redirects or embedded content

“A multilayered approach is needed to protect emails and employees against GhostFrame and similar stealthy phishing attacks,” the company concluded.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleToddyCat’s New Hacking Tools Steal Outlook Emails and Microsoft 365 Access Tokens
Next Article JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers
Team-CWD
  • Website

Related Posts

News

Skills Shortages Trump Headcount as Critical Cyber Challenge

December 6, 2025
News

RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware

December 6, 2025
News

React.js Hit by Maximum-Severity ‘React2Shell’ Vulnerability

December 5, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest News

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views

The risks of unsupported IoT tech

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views
Our Picks

How the always-on generation can level up their cybersecurity game

September 11, 2025

AI-powered financial scams swamp social media

September 11, 2025

Beware of threats lurking in booby-trapped PDF files

October 7, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2025 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.