Paul,
All log in systems would suffer from this same problem. Since the secured phase of the session has not yet begun, there is no way to protect the user (save the limited case of ip/machine verification with intranet only log in - must be rare these days).
The fake site could run a script on the back end that connects to the legitimate log in screen and scrapes the form details, then feeds those to the user's browser.
The protection against this is user education; Before entering your username and passphrase, verify the site is legitimate.
'Log in with a new device' alerts may provide a clue to the user, but would require user education to be effective.
A second factor will go a long way in preventing compromised credentials from being used by a bad actor.
Ray
On Thu, 2021-04-22 at 09:12 -0700, Paul Roemer wrote:
Notice: This message was sent from outside the University of Victoria email system. Please be cautious with links and sensitive information.