Hackers are cracking mobile browsers to bypass security - here's how they do it and how to stay safe

Mobile Security
(Image credit: Shutterstock.com)

  • Cybercriminals are increasingly exploiting mobile browsers
  • Compromised WordPress sites lead to the installation of malicious PWAs
  • Both site owners and users can mitigate the threat

There is a growing trend in client-side attacks, as cybercriminals are increasingly exploiting mobile browsers to bypass traditional security controls.

This is according to the latest “Client-Side Attack Report Q2 2025”, published by security researchers c/side. A “client-side” attack is a type of security breach that occurs on the user’s device (typically on their browser or mobile app), rather than on the server.

Based on extensive research of the market (compromised domains, autonomous crawling, AI-driven script analysis, and behavioral review of third-party JavaScript dependencies), the report says cybercriminals are injecting malicious code into service workers and the Progressive Web App (PWA) logic of popular WordPress themes.

Weaker sandboxing

Once a mobile user visits an infected site, the browser viewport is hijacked using a full-screen iframe. The victim is then lured into installing a fake PWA, often disguised as an adult-themed APK or a crypto app, hosted on rotating subdomains.

Primarily, the apps are designed to persist on the device beyond the browser session and act as a long-term foothold. However, they can also steal login credentials (by spoofing login pages or browser prompts), intercept cryptocurrency wallet interactions, and drain assets by injecting malicious scripts. In some cases, the apps can hijack session tokens, as well.

The criminals are using different techniques to evade detection, including fingerprinting and cloaking techniques that prevent the payload from being triggered in sandboxed environments, or by automated scanners.

The mobile platform is being increasingly targeted because web browsers have weaker sandboxing and limited runtime visibility, which makes them more vulnerable and susceptible to attacks. At the same time, c/side says users are more likely to trust full-screen prompts, or install suggested apps, without suspecting anything.

To mitigate the risk, there are things both developers and end-users can do, c/side says. Devs and site operators should monitor and secure third-party scripts, since these are a common delivery mechanism for malicious payloads. C/side also advocates for real-time visibility into what scripts are executing in the browser, rather than relying solely on server-side protections.

Users, on the other hand, should be careful when installing Progressive Web Apps from unfamiliar sources, and should be skeptical of unexpected login flows, particularly those that seem to come from Google.

You might also like

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

You must confirm your public display name before commenting

Please logout and then login again, you will then be prompted to enter your display name.