A type of attack when cybercriminals use limitations of the HTTP protocol. As a user opens the page, the malicious code is activated and makes the victim’s browser send a certain request to the forgers’ web-service (i.e. under the guise of uploading an image), so that the forgers can use it on their purpose.