New BlobPhish Attack Leverages Browser Blob Objects to Steal Users’ Login Credentials
Cybersecurity NewsArchived Apr 29, 2026✓ Full text saved
A sophisticated, memory-resident phishing campaign called BlobPhish, active since October 2024, that exploits browser Blob URL APIs to silently steal credentials from Microsoft 365 users, major U.S. banks, and financial platforms while remaining almost completely invisible to traditional security tools. BlobPhish is a sustained credential-phishing operation that fundamentally changes how phishing pages are delivered to […] The post New BlobPhish Attack Leverages Browser Blob Objects to Steal Use
Full text archived locally
✦ AI Summary· Claude Sonnet
HomeANY.RUN
New BlobPhish Attack Leverages Browser Blob Objects to Steal Users’ Login Credentials
By Balaji N
April 28, 2026
BlobPhish Browser-Based Phishing Attack
A sophisticated, memory-resident phishing campaign called BlobPhish, active since October 2024, that exploits browser Blob URL APIs to silently steal credentials from Microsoft 365 users, major U.S. banks, and financial platforms while remaining almost completely invisible to traditional security tools.
BlobPhish is a sustained credential-phishing operation that fundamentally changes how phishing pages are delivered to victims.
Rather than hosting fake login pages on attacker-controlled servers and serving them over standard HTTP, BlobPhish generates phishing pages entirely inside the victim’s browser using JavaScript Blob objects.
The result is a phishing payload that exists only in memory, leaving no file on disk, no cache artifact, and no suspicious HTTP request in proxy logs for security tools to flag.
Close the gap before it becomes business risk. Give your SOC full visibility into suspicious activity.
Blobphish attack detonated in the sandbox
First observed in October 2024, the campaign has run uninterrupted for over 18 months and recorded a significant spike in activity in February 2026, confirming it as a mature, well-maintained threat operation rather than a short-lived opportunistic attack.
Accelerate investigations and stop incidents earlier. Leverage threat intelligence to improve threat visibility.
BlobPhish kill chain
The BlobPhish kill chain is elegantly designed to defeat both network-based and file-based defenses:
Initial Access: The victim receives a phishing email — often mimicking a financial alert, invoice, or document share — containing a link to a trusted-looking service such as DocSend or a shortened URL via t.co. PDF attachments carrying QR codes that lead to malicious JavaScript pages have also been observed, particularly in energy-sector campaigns.
Loader Execution: Clicking the link redirects the victim to an attacker-controlled HTML page hosting a JavaScript loader. Using jQuery, the loader invisibly creates a hidden <a> anchor element, Base64-decodes a bundled phishing payload using atob(), constructs a Blob object of type text/html, generates a blob:https:// URL via window.URL.createObjectURL(), and forces the browser to navigate to it — all without any visible user interaction.
Code responsible for blob object download
Evidence Destruction: Immediately after navigation, the loader calls window.URL.revokeObjectURL() and removes the anchor element from the DOM, destroying any remaining in-memory trace of the loader’s operation.
Code responsible for blob object download
Credential Harvest: The victim is presented with a convincing replica of a Microsoft 365, Chase, Capital One, or other financial service login page. The browser address bar shows a blob:https:// URL, which can appear legitimate to an untrained eye. A failed-login counter forces victims to re-enter credentials multiple times, maximizing harvest accuracy. Captured data is exfiltrated via HTTP POST to attacker-controlled endpoints matching the pattern */res.php, */tele.php, or */panel.php — hosted predominantly on compromised legitimate WordPress sites.
Data exfiltration patterns
BlobPhish Evades Conventional Defenses
BlobPhish impersonates a broad list of high-value platforms, including Microsoft 365, OneDrive, SharePoint, Chase, Capital One, FDIC, E*TRADE, Charles Schwab, Morgan Stanley/Merrill Lynch, American Express, PayPal, and Intuit.
Phishing form imitating Chase Banking login page
Although financial and cloud-productivity lures dominate, victim organizations span Finance, Manufacturing, Education, Government, Transport, and Telecommunications sectors.
Geographically, approximately one-third of observed victims are U.S.-based, with additional activity recorded across Germany, Poland, Spain, Switzerland, the UK, Australia, South Korea, Saudi Arabia, Qatar, Jordan, India, and Pakistan.
The blob:https:// scheme is the campaign’s core evasion innovation. Because the phishing page is never transmitted over the network as a standalone HTTP response:
URL reputation engines cannot block it — no external URL to scan.
Proxy logs show no suspicious requests for the phishing page itself.
Secure Email Gateways (SEGs) miss the payload, which materializes only after delivery.
File-based endpoint solutions find nothing — no file is ever written to disk.
Cache forensics return empty — the Blob URL is revoked before investigators can inspect it.
A single successful BlobPhish compromise can cascade into Business Email Compromise (BEC) fraud, full Microsoft 365 tenant takeover, unauthorized wire transfers, investment account manipulation, and ransomware deployment following lateral movement.
Regulatory consequences, including GDPR 72-hour breach notification, SEC cybersecurity incident disclosure, and FFIEC authentication guidance, add material legal exposure on top of operational damage.
Key Indicators of Compromise (IOCs)
IOC Type Example
Loader URL hxxps[://]mtl-logistics[.]com/blb/blob[.]html
Exfiltration endpoint hxxps[://]mtl-logistics[.]com/css/sharethepoint/point/res[.]php
Capital One exfil hxxps[://]wajah4dslot[.]com/wp-includes/certificates/tmp//res[.]php
Chase Banking exfil hxxps[://]hnint[.]net/cgi-bin/peacemind//res[.]php
E*TRADE exfil hxxps[://]ftpbd[.]net/wp-content/plugins/cgi-/trade/trade//res[.]php
tele.php variant hxxps[://]_wildcard_[.]gonzalezlawnandlandscaping[.]com/…/tele[.]php
Additional compromised domains include larva888[.]com, riobeautybrazil[.]com, i-seotools[.]com, and mts-egy[.]net.
Defensive Recommendations
Security teams should take the following priority actions:
Deploy sandbox analysis capable of executing JavaScript in real browsers to detonate blob-based payloads safely before they reach end users
Hunt proactively using the BlobPhishLoaderHTML YARA rule and URL pivot queries (url:"/res.php$", url:"*/blob.html$") in threat intelligence platforms
Enforce phishing-resistant MFA (FIDO2/hardware keys) on all Microsoft 365 and banking portals to limit post-compromise blast radius
Integrate live TI feeds that push BlobPhish IOCs into firewalls, proxies, and SIEM rules automatically as attacker infrastructure rotates
Train employees to recognize unexpected blob:https:// URLs in browser address bars as a red flag
BlobPhish demonstrates that the phishing threat has outpaced perimeter and static-signature defenses.
Effective protection now demands dynamic behavioral analysis, continuous threat hunting, and automated intelligence propagation operating at the speed of attacker infrastructure rotation.
Prevent high-stakes credential attacks with enterprise-grade intelligence. Reduce risk, not just response time.
Copy URL
Linkedin
Twitter
ReddIt
Telegram
Balaji N
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.
Trending News
Multiple OpenClaw Vulnerabilities Enables Policy Bypass and Host Override
Hackers Use Lotus Wiper to Destroy Drives and Delete Files in Energy Sector Attack
Unauthorized Group Gains Access to Anthropic’s Exclusive Cyber Tool Mythos
New Android Banking Malware Abuses Fake KYC Workflow and WhatsApp Delivery to Hijack Accounts
Chinese Silk Typhoon Hacker Extradited to the U.S. from Italy
Latest News
Cyber Security
Microsoft Confirms Remote Desktop Warnings May Display Incorrectly After April Update
Cyber Security News
Checkmarx Confirms GitHub Repository Data Published on Dark Web
Cyber Security News
Critical LiteLLM SQL Injection Vulnerability Exploited in the Wild
Cyber Security News
Chinese Silk Typhoon Hacker Extradited to the U.S. from Italy
cloud
WhatsApp Testing Own Cloud Backup Provider for Default End-to-End Encryption