A new phishing framework named GhostFrame is rapidly emerging as a serious threat, with security researchers linking it to more than one million attacks in just a short time. Developed around an ultra‑stealthy use of iframes, GhostFrame is designed to hide in plain sight, making it far harder for both users and traditional security tools to spot.

How GhostFrame works
Unlike typical phishing kits packed with obvious malicious scripts, GhostFrame starts with a simple HTML file that looks harmless to the naked eye and to many scanners. All of the dangerous behavior is tucked away inside an iframe – a small window within the page that quietly loads content from another source.
Because the outer page looks clean and legitimate, it can pass many basic checks, while the iframe silently delivers the real phishing content from elsewhere. This setup lets attackers swap out or customize phishing pages quickly – for example, to test new lures or to target specific regions – without touching the main page that distributes the kit.
Researchers note that attackers have abused iframes for years, but GhostFrame is the first full phishing framework deliberately built around this technique from the ground up. That architectural shift is a big part of what makes it so evasive.
Two‑stage attack chain
GhostFrame’s phishing campaigns typically unfold in two stages:
- Stage one: the clean‑looking page
- The victim lands on a primary page that doesn’t contain obvious phishing markers.
- The code is lightly obfuscated and dynamically generates a unique subdomain for each visitor, making it harder for defenders to block by domain alone.
- Hidden pointers in that page then load a second page inside an iframe.
- Stage two: the hidden phishing page
- The real phishing logic lives in this secondary page inside the iframe.
- It hides key components inside a feature designed for streaming very large files, helping it slip past static detection tools that look for known patterns or small payloads.
- Here, users may be prompted to enter credentials, download files, or perform other risky actions.
The result is a phishing flow where what you see on the surface often looks normal, while the real attack is happening one layer deeper.
Lures and email themes
GhostFrame campaigns use familiar, business‑themed lures to draw people in. Recent email subjects observed in the wild include:
- “Secure Contract & Proposal Notification”
- “Annual Review Reminder”
- “Invoice Attached”
- “Password Reset Request”
These topics are chosen because they blend naturally into corporate inboxes. A busy employee seeing a contract notification, HR reminder, or invoice is more likely to click without thinking, especially if the sender appears to be a known brand or internal contact.
Once the recipient clicks a link in one of these messages, they are funneled into the GhostFrame infrastructure and eventually to the hidden iframe phishing page.
Why GhostFrame is so dangerous
Several factors make GhostFrame particularly concerning for defenders:
- High volume: It has already been tied to over a million attacks, suggesting wide adoption by threat actors.
- Evasion by design: The clean outer page and iframe‑based inner page are built to evade traditional URL and content filters.
- Easy content swapping: Attackers can change phishing templates, languages, or targets without redeploying the whole kit.
- Dynamic infrastructure: Per‑visitor subdomains complicate blacklisting and reputation‑based blocking.
In practice, this means many organizations may be exposed even if they already use standard anti‑phishing defenses.
How organizations can defend themselves
Security experts stress that there is no single silver bullet against GhostFrame. Instead, they recommend a multi‑layered defense strategy that combines technology, configuration hardening, and user awareness:
- Keep browsers and plugins updated. Modern browsers increasingly add protections against malicious frames and redirects; outdated versions may lack these safeguards.
- Be wary of unsolicited links and attachments. Employees should verify unexpected invoices, HR emails, or contract notices through a second channel (for example, internal chat or a known official portal).
- Use advanced email and web security gateways. Tools that perform URL rewriting, sandboxing, and deep content inspection can help detect suspicious iframes and dynamic redirects.
- Restrict iframe use on corporate sites. Limit when and how external content can be embedded via iframes, and regularly scan your own sites for unauthorized iframe injection.
- Monitor for abnormal redirects and embedded content. Security teams should watch for patterns such as unusual subdomain generation, hidden frames, or frequent redirects to unknown domains.
- Train staff on modern phishing tactics. Awareness programs should be updated to include threats like GhostFrame that may not look like traditional fake login pages at first glance.
As GhostFrame continues to evolve, organizations that rely only on basic spam filters or user intuition will be at increasing risk. A combination of strong technical controls and informed employees offers



