Attack Techniques

What Is Blob URI Phishing?

Blob URI phishing is a credential harvesting attack that exploits browser Blob objects (binary large objects) to render phishing pages locally within a user's browser, evading email security gateways and detection systems.

Alway Automate, Nothing To Manage

Always automated.

Nothing to manage.

Leave Training & Simulated Phishing to us.

Blob URI phishing is a credential harvesting attack that exploits browser Blob objects (binary large objects) to render phishing pages locally within a user's browser, evading email security gateways and detection systems. A Blob URI (also called a Blob URL or Object URL) is generated by a browser to reference temporary binary data stored in memory that only that specific browser instance can access. Attackers abuse this mechanism through HTML smuggling—embedding Base64-encoded HTML phishing pages directly in email or via redirects—which are decoded and rendered locally at blob:http:// or blob:https:// URIs that cannot be scanned remotely.

How does Blob URI phishing work?

Blob URI phishing follows a multi-step delivery chain that exploits the local nature of browser blob objects.

The attack begins with email or link delivery. According to Cofense, attackers send phishing emails containing a link to a malicious or compromised HTML page that bypasses email security gateways. The initial email link often appears legitimate and may use trusted sender spoofing techniques.

An initial redirect chain follows. The email link may redirect through a legitimate, allowlisted service such as OneDrive, SharePoint, or another trusted domain to evade URL filtering. Security gateways see only the initial legitimate URL and allow the email to pass.

HTML smuggling is the core technique. The attacker's controlled page contains JavaScript that decodes a Base64-encoded HTML string—the actual phishing page—using the atob() function. This encoded string is embedded directly in the HTML and is not accessible to remote scanners.

Blob creation happens client-side. JavaScript creates a Blob object from the decoded HTML and generates a local Blob URI reference, such as blob:https://example.com/12345678-abcd. According to LevelBlue, this URI references data stored in the browser's memory, not on a remote server.

Local rendering displays the credential phishing page directly in memory at the Blob URI. The page appears legitimate but is not accessible remotely by security scanners. Users see what appears to be a legitimate login page for Office 365, DocuSign, or other services.

Credential capture completes the attack. Users enter credentials on the spoofed login page, which are exfiltrated via JavaScript or form submission to attacker infrastructure. According to SANS ISC and Technical Outcast, the credentials are typically sent to attacker-controlled servers immediately upon submission.

The technical advantage is significant. Since Blob URIs reference local browser memory, not network locations, traditional URL filtering cannot scan the final phishing page content. Email security gateways see only the initial redirect URL, which is often legitimized through trusted services. Automated analysis systems cannot reach or analyze blob content remotely, and no server-side malware is involved—the attack executes entirely client-side.

How does Blob URI phishing differ from related attacks?

Aspect

Blob URI Phishing

Traditional Phishing

QR Code Phishing

Delivery

Base64 HTML in email/redirect

Direct URL to phishing server

QR code image in email

Rendering

Local browser memory

Remote server

Local app scan

URL Visible

blob:https:// in address bar

Direct phishing domain

URL hidden until scan

Scannable

Not remotely

Yes, by SEGs

Only after QR decode

Evasion Mechanism

Local execution, memory-based

URL obfuscation, domain spoofing

ASCII encoding of QR data

Detection Difficulty

Very High

Medium

Medium-High

Blob URI phishing differs fundamentally from traditional phishing in its rendering mechanism. Traditional phishing hosts the phishing page on a remote server that email security gateways and URL scanners can access and analyze. Blob URI phishing renders the page locally in browser memory, making remote scanning impossible.

QR code phishing shares some characteristics with Blob URI phishing—both hide the final destination until local execution. However, QR codes require the user to scan the code with a mobile device, while Blob URI phishing executes automatically in the browser when the initial link is clicked.

The detection difficulty for Blob URI phishing is very high. According to Barracuda (2024), traditional email security gateways struggle to detect blob URIs because the phishing page is not remotely accessible. The initial email link may be completely legitimate, and the blob is created client-side through JavaScript execution.

One distinguishing characteristic is that the blob: prefix is visible in the browser address bar. According to Cofense (2022), educated users can identify blob:https:// URLs as highly suspicious, but most users do not examine the address bar carefully.

Why does Blob URI phishing matter?

Blob URI phishing represents an evolution in phishing techniques specifically designed to evade email security controls.

Cofense Intelligence first detected Blob URI phishing in mid-2022. By 2024, Barracuda identified it as a growing novel phishing evolution that is increasingly combined with other evasion techniques such as ASCII-based QR codes for multi-layer evasion.

According to Technical Outcast (2024), targeted industries include Office 365, DocuSign, and other SaaS services where credential harvesting provides immediate access to valuable business systems and data.

The technique is particularly concerning for security teams because it bypasses the primary email defense layer. Most email security gateways cannot scan Blob URIs because they are not remotely accessible—the phishing content only exists in the victim's browser memory after JavaScript execution.

Blob URI phishing is often paired with other evasion techniques. Barracuda (2024) reports that attackers combine blob URIs with ASCII-based QR codes, creating multi-layer evasion that defeats both traditional URL scanning and QR code detection.

The attack requires minimal infrastructure. Attackers do not need to maintain phishing servers that can be taken down or blocked. The phishing page is embedded in the initial HTML payload, reducing operational overhead and detection opportunities.

While specific infection rate statistics are not publicly available, the technique's adoption by sophisticated threat actors and its identification as a novel evolution by major security vendors indicates it is an emerging threat that organizations should address.

What are the limitations of Blob URI phishing?

Blob URI phishing faces several technical and operational constraints that limit its effectiveness.

The Blob URI address—blob:https://—is visible in the browser address bar. According to Cofense, users can identify suspicious URIs by examining the address bar, though most users do not check this consistently. Security awareness training can improve user detection of blob URIs.

The attack requires JavaScript enabled in the browser. Some email clients disable or sandbox JavaScript, preventing the blob creation step. According to Barracuda and LevelBlue, email clients with strict JavaScript policies can block this attack vector entirely.

The phishing page must be contained entirely in the email or initial redirect HTML. Size limits on email attachments or HTML content may constrain the sophistication of phishing pages. Highly detailed phishing pages with extensive graphics may exceed size limitations.

There is no persistence beyond the current browser session. According to Cofense and Technical Outcast, cookie theft or session hijacking requires additional techniques beyond the basic blob phishing mechanism. Once the browser is closed, the blob URI and associated content are destroyed.

The attack relies on user clicking the link and entering credentials. There is no passive infection vector—the user must take action. Multi-factor authentication defeats credential-only compromise even if the attack succeeds in capturing passwords.

Defense gaps remain significant. Most email security gateways cannot scan Blob URIs because they are not remotely accessible. Client-side JavaScript analysis tools have not yet widely deployed blob detection capabilities. Traditional email gateway sandbox evasion techniques such as timing delays or geofencing may apply to blob attacks as well.

However, two-factor authentication bypass is not inherent to blob attacks. According to Technical Outcast, MFA still protects credentials even if they are captured through blob phishing. Without a second factor, captured credentials cannot be used for unauthorized access.

How can organizations defend against Blob URI phishing?

Organizations should implement multiple defensive layers to detect and prevent Blob URI phishing attacks.

Email Security Gateway Enhancement should deploy gateways that can decode and analyze Base64-encoded HTML. According to Cofense and Barracuda, advanced email security solutions flag suspicious blob: URIs in redirect chains before delivery to user mailboxes. Organizations should evaluate whether their current email security can detect HTML smuggling techniques.

URL Filtering should block suspicious redirect chains through legitimate services. According to LevelBlue, unusual OneDrive or SharePoint share links that redirect through multiple intermediaries can indicate blob phishing attempts. Organizations should monitor for anomalous use of legitimate file-sharing services.

Browser Configuration can disable JavaScript in email clients where possible. Browser extensions can warn users about Blob URIs. According to Cofense, some browser security extensions detect and alert on blob: URLs, providing an additional detection layer.

User Training should educate users to recognize blob:https:// in the address bar as highly suspicious. According to Barracuda and SANS ISC, training should teach verification of URL legitimacy before credential entry. Users should be instructed to navigate directly to services rather than clicking email links when accessing sensitive accounts.

Multi-Factor Authentication should be enforced on all sensitive services including Office 365, DocuSign, and SSO systems. According to Technical Outcast (2024), MFA prevents credential-only compromise even when passwords are captured. Organizations should deploy phishing-resistant MFA where possible.

Phishing Detection Tools should deploy machine learning models to detect suspicious HTML patterns and Base64 encoding in emails. According to Cofense and LevelBlue, anomaly detection can identify emails containing embedded HTML content that may indicate smuggling attempts.

Incident Response procedures should monitor for spikes in failed password attempts and review audit logs for credential abuse post-detection. Organizations should assume some blob phishing attempts will succeed and implement detection for credential misuse.

Email Policy restrictions can favor plain-text emails over HTML or disable JavaScript rendering in email clients. According to SANS ISC, organizations with high security requirements can restrict HTML email to reduce the attack surface for HTML smuggling.

Content Disarm and Reconstruction tools strip or sanitize suspicious HTML and JavaScript before delivery. CDR tools can neutralize blob phishing by removing the Base64-encoded content or JavaScript that creates the blob object.

Browser Security requires keeping browsers updated and enabling sandboxing and Site Isolation features to limit local blob access. According to Cofense, modern browsers include protections that can limit blob abuse, but these protections must be enabled and maintained through regular updates.

FAQs

What is a Blob URI and how is it different from a normal URL?

A Blob URI, such as blob:https://example.com/12345, references binary data stored locally in browser memory, not on a remote server. According to Cofense (2022), because it is local, it cannot be accessed remotely by security scanners, making it harder to detect phishing content. Normal URLs reference resources on remote servers that can be scanned and analyzed by security tools. Blob URIs are temporary and exist only for the current browser session, while normal URLs persist as long as the remote resource exists.

Can email security gateways block Blob URI phishing?

Traditional email security gateways struggle to detect blob URIs because the phishing page is not remotely accessible. According to Barracuda (2024), the initial email link may be completely legitimate, and the blob is created client-side through JavaScript execution after the email is delivered. Enhanced detection tools that analyze Base64-encoded HTML content can identify potential blob phishing attempts, but many traditional gateways lack this capability. Organizations should evaluate their email security solutions for HTML smuggling detection capabilities.

How do attackers get the phishing page into the Blob URI?

Attackers Base64-encode the HTML phishing page and embed it in an initial redirect link delivered via email or through a legitimate service. According to Cofense and LevelBlue, when the user clicks the link, JavaScript decodes the Base64 string using the atob() function and creates a Blob object, which is rendered locally in the browser. The entire phishing page travels within the initial HTML payload, requiring no external server to host the phishing content.

Is MFA effective against Blob URI phishing?

Yes. According to Technical Outcast (2024), while blob URIs help attackers bypass email filters, multi-factor authentication still protects compromised credentials from unauthorized access. Without a second factor, captured credentials cannot be used to access protected accounts. Organizations should deploy MFA on all sensitive systems and services, with preference for phishing-resistant MFA methods such as FIDO2 security keys or biometric authentication that cannot be captured through credential phishing.

What browsers are vulnerable to Blob URI phishing?

All modern browsers—Chrome, Firefox, Safari, Edge—support Blob URIs as part of standard web functionality. According to Cofense (2022), the attack is browser-agnostic. Vulnerability depends on the user falling for the phishing page, not on the browser version. Blob URIs are a legitimate browser feature; the vulnerability lies in the social engineering that convinces users to enter credentials on the locally rendered phishing page. Browser updates and security features can limit blob abuse, but no browser is immune to the technique.

Alway Automate, Nothing To Manage

Always automated.

Nothing to manage.

Always automated.

Nothing to manage.

Leave Training & Simulated Phishing to us.

Leave Training & Simulated Phishing to us.

Alway Automate, Nothing To Manage

Always automated.

Nothing to manage.

Leave Training & Simulated Phishing to us.

© 2026 Kinds Security Inc. All rights reserved.

© 2026 Kinds Security Inc. All rights reserved.

© 2026 Kinds Security Inc. All rights reserved.