

It emphasizes the need to check the URLs with a close eye. I suppose users might still be safe if they have 2-factor authentication enabled for their accounts, but still, this is pretty scary. The writer states that they were unable to test the phishing page with real login information, or authentication tokens, as the site was taken down by then. It is quite alarmingly similar, isn't it? Everything from the fonts, icons, and other elements on the phishing site looks identical to the original login page.īleepingComputer says it ran some tests by entering some credentials on the site, but once it accepted them, the malicious web page redirected users to the official Bitwarden site. Do you see what happens when you don't use an ad blocker? uBlock Origin is my recommendation, feel free to check AdGuard or something else that fits your bill, just make sure it's a reputable extension/app, do your homework.Īnother Bitwarden user created a thread on the company's support portal, to alert others about the website that was trying to impersonate the official website's login page. Here's a look at the malicious ad (h/t reddit), shockingly these malicious pages were placed at the top of the search results, above the legitimate URL itself.
