Chromium Browsers Exploited for Silent Screenshots via Screensharing

 A researcher demonstrated how attackers can exploit Chromium-based browsers to silently capture screenshots by launching them with specific flags that auto-select screen sharing sources, bypassing user consent. JavaScript on a malicious webpage can use the getDisplayMedia API to take snapshots and send them to a server. The attack can run in headless mode or off-screen to remain hidden. This method doesn't require malware, making it an effective post-exploitation tool, and defenders are advised to monitor for suspicious command-line flags.

https://mrd0x.com/spying-with-chromium-browsers-screensharing

Comments

Popular posts from this blog

Secure Vibe Coding Guide: Best Practices for Writing Secure Code

KEVIntel: Real-Time Intelligence on Exploited Vulnerabilities

OWASP SAMM Skills Framework Enhances Software Security Roles