Isnt't that what CORS/same-origin policies prevent? The attacker domain can be prevented from loading the bank resources within the same context by the browser. If the request is made by the attacker domain instead and proxied to you, then it doesn't have your cookies to display the private identification.In either case, the "correct profile picture" would not load.
thaumasiotes|4 years ago
Why is that a concern? You try to log in on a phishing site. The phishing site tries to log in as you at your bank's actual website. Your bank sends the phishing site your picture. The phishing site displays your picture to you.
folmar|4 years ago
GauntletWizard|4 years ago
Okta still includes this "feature" by default, and is among the reasons I will never trust Okta or any client of theirs.
tialaramex|4 years ago
We already know how to actually solve this problem. WebAuthn.