SlowMist: Beware of browser history pollution attacks as malware attacks are on the rise again
BlockBeats news, on December 31, SlowMist released its Q4 2025 security incident analysis, which mentioned the emergence of a more covert phishing technique: even if users manually enter the correct official domain name, they may still be redirected to a phishing website. Some victims reported that although they entered the correct address, the browser would automatically complete it as a fake domain name forged by the attacker. This is not due to user error, but because attackers had previously polluted the browser's history through ads, social media guidance, or fake announcements. Once the phishing domain is stored in the browser's autocomplete logic, the next time users enter the address, the browser will automatically redirect them to a counterfeit website that looks almost identical to the official site.
In addition, computer malware attacks are on the rise again. Attackers often use phishing links, private messages in social tools, or so-called "resource downloads" to quietly implant malicious programs into the user's local environment. Once the device is infected, data related to wallets will be at risk.
Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.
You may also like
The U.S. Judiciary Committee opposes Section 604 of the CLARITY Act
Protect Developers or Weaken Oversight? Judiciary Committee Strongly Opposes Section 604 of the CLARITY Act
Goldman Sachs CEO: Expects a Long Road Ahead for the "CLARITY Act" to Make Progress
Space raises over $20 million in public sale, allocation process to be announced on January 20
