• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
new "doubleclickjacking" exploit bypasses clickjacking protections on major websites

New “DoubleClickjacking” Exploit Bypasses Clickjacking Protections on Major Websites

You are here: Home / General Cyber Security News / New “DoubleClickjacking” Exploit Bypasses Clickjacking Protections on Major Websites
January 1, 2025

Threat hunters have disclosed a new “widespread timing-based vulnerability class” that leverages a double-click sequence to facilitate clickjacking attacks and account takeovers in almost all major websites.

The technique has been codenamed DoubleClickjacking by security researcher Paulos Yibelo.

“Instead of relying on a single click, it takes advantage of a double-click sequence,” Yibelo said. “While it might sound like a small change, it opens the door to new UI manipulation attacks that bypass all known clickjacking protections, including the X-Frame-Options header or a SameSite: Lax/Strict cookie.”

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Cybersecurity

Clickjacking, also called UI redressing, refers to an attack technique in which users are tricked into clicking on a seemingly innocuous web page element (e.g., a button), leading to the deployment of malware or exfiltration of sensitive data.

DoubleClickjacking is a variation of this theme that exploits the gap between the start of a click and the end of the second click to bypass security controls and takeover accounts with minimal interaction.

Specifically, it involves the following steps –

  • The user visits an attacker-controlled site that either opens a new browser window (or tab) without any user interaction or at the click of a button.
  • The new window, which can mimic something innocuous like a CAPTCHA verification, prompts the user to double-click to complete the step.
  • As the double-click is underway, the parent site makes use of the JavaScript Window Location object to stealthily redirect to a malicious page (e.g., approving a malicious OAuth application)
  • At the same time, the top window is closed, allowing a user to unknowingly grant access by approving the permission confirmation dialog.

“Most web apps and frameworks assume that only a single forced click is a risk,” Yibelo said. “DoubleClickjacking adds a layer many defenses were never designed to handle. Methods like X-Frame-Options, SameSite cookies, or CSP cannot defend against this attack.”

Website owners can eliminate the vulnerability class using a client-side approach that disables critical buttons by default unless a mouse gesture or key press is detected. Services like Dropbox already employ such preventative measures, it has been found.

As long-term solutions, it’s recommended that browser vendors adopt new standards akin to X-Frame-Options to defend against double-click exploitation.

“DoubleClickjacking is a twist on a well-known attack class,” Yibelo said. “By exploiting the event timing between clicks, attackers can seamlessly swap out benign UI elements for sensitive ones in the blink of an eye.”

Cybersecurity

The disclosure arrives nearly a year after the researcher also demonstrated another clickjacking variant called cross window forgery (aka gesture-jacking) that relies on persuading a victim to press or hold down the Enter key or Space bar on an attacker-controlled website to initiate a malicious action.

On websites like Coinbase and Yahoo!, it could be abused to achieve an account takeover “if a victim that is logged into either site goes to an attacker website and holds the Enter/Space key.”

“This is possible because both sites allow a potential attacker to create an OAuth application with wide scope to access their API, and they both set a static and / or predictable ‘ID’ value to the ‘Allow/Authorize’ button that is used to authorize the application into the victim’s account.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «iranian and russian entities sanctioned for election interference using ai Iranian and Russian Entities Sanctioned for Election Interference Using AI and Cyber Tactics
Next Post: Three Russian-German Nationals Charged with Espionage for Russian Secret Service three russian german nationals charged with espionage for russian secret service»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.