Our company has noticed an increased volume of phishing attempts involving the execution of Javascript in bookmarks.
Scammers trick users, through social engineering, to drag and drop a picture button into their bookmark browser area, then to open a tab on a service they are logged in and to click the bookmark button. The social engineering story is about performing a "verify you are not a robot" control, and the picture button texts something akin to "Anti-bot Checker".
The Javascript then sends secret tokens extracted from cookies or localStorage to 3rd party malicious websites where they are up for grab by the scammers - simple GET request with the secrets in parameters.
Example for you to test:1. Create a blank HTML file and put in the following content:
<a href="javascript:window.alert(document.cookie);"><img src="
https://ssl.gstatic.com/ui/v1/icons/mail/rfr/logo_gmail_lockup_default_2x_r5.png" alt="ANTIBOT CHECK"></img></a>
2. Save locally and open the file
3. Drag and drop the picture into your bookmark bar
4. Open this discussion tab again and click on the shortcut.
I can understand that having Javascript actions in bookmarks can prove useful to developers, however the feature is increasingly being leveraged as an attack vector.
Non tech-savvy users do not need to execute Javascript in Bookmarks.
I recommend Javascript execution in bookmark addresses to be disabled by default, and an option to be added should users want to enable the feature again.I hope this post gets some attention, let me know of your feedback.
Regards